Steganography via Cover-Source Switching
Document type :
Communication dans un congrès avec actes
Title :
Steganography via Cover-Source Switching
Author(s) :
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]

Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Conference title :
WIFS
City :
Abu Dabi
Country :
Émirats arabes unis
Start date of the conference :
2016-12-04
HAL domain(s) :
Sciences de l'ingénieur [physics]/Traitement du signal et de l'image [eess.SP]
English abstract : [en]
—This paper proposes a new steganographic scheme relying on the principle of " cover-source switching " , the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, ...
Show more >—This paper proposes a new steganographic scheme relying on the principle of " cover-source switching " , the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography considers the sensor noise naturally present in the raw images and uses the principle that, by the addition of a specific noise the steganographic embedding tries to mimic a change of ISO sensitivity. The embedding methodology consists in 1) designing the stego-signal that enable to switch from one source to another the raw domain, 2) computing the statistical distribution of the stego-signal in the processed domain, 3) embedding the payload in the processed domain. We show that this methodology is easily tractable whenever the processes are known and enables to embed large and undetectable payloads.Show less >
Show more >—This paper proposes a new steganographic scheme relying on the principle of " cover-source switching " , the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography considers the sensor noise naturally present in the raw images and uses the principle that, by the addition of a specific noise the steganographic embedding tries to mimic a change of ISO sensitivity. The embedding methodology consists in 1) designing the stego-signal that enable to switch from one source to another the raw domain, 2) computing the statistical distribution of the stego-signal in the processed domain, 3) embedding the payload in the processed domain. We show that this methodology is easily tractable whenever the processes are known and enables to embed large and undetectable payloads.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.archives-ouvertes.fr/hal-01386190/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-01386190/document
- Open access
- Access the document
- https://hal.archives-ouvertes.fr/hal-01386190/document
- Open access
- Access the document
- document
- Open access
- Access the document
- wifs2016_camera_ready.pdf
- Open access
- Access the document