Analysis of perturbed quantization stegosystems
Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 26-28.

Voir la notice de l'article provenant de la source Math-Net.Ru

In the paper, we provide the analysis of perturbed quantization steganography applied to JPEG images. The ability of determining so-called changeable coefficients is discussed and an approach for that is proposed. This approach allows to create stegosystem that would take advantage of properties of perturbed quantization steganography but would use images in JPEG format as cover images.
@article{PDM_2009_10_a12,
     author = {E. V. Razinkov and R. Kh. Latypov},
     title = {Analysis of perturbed quantization stegosystems},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {26--28},
     publisher = {mathdoc},
     number = {10},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_10_a12/}
}
TY  - JOUR
AU  - E. V. Razinkov
AU  - R. Kh. Latypov
TI  - Analysis of perturbed quantization stegosystems
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 26
EP  - 28
IS  - 10
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_10_a12/
LA  - ru
ID  - PDM_2009_10_a12
ER  - 
%0 Journal Article
%A E. V. Razinkov
%A R. Kh. Latypov
%T Analysis of perturbed quantization stegosystems
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 26-28
%N 10
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_10_a12/
%G ru
%F PDM_2009_10_a12
E. V. Razinkov; R. Kh. Latypov. Analysis of perturbed quantization stegosystems. Prikladnaâ diskretnaâ matematika, no. 10 (2009), pp. 26-28. http://geodesic.mathdoc.fr/item/PDM_2009_10_a12/

[1] Simmons G. J., “The PrisonersṔroblem and the Subliminal Channel”, CRYPTO83 – Advances in Cryptology, Springer, New York, 1984, 51–67 | MR

[2] Wayner P., Disappearing Cryptography, Second Edition – Information Hiding: Steganography and Watermarking, Morgan Kaufmann, San Francisco, 2002, 413 pp.

[3] Fridrich J., Goljan M., Soukal D., “Perturbed Quantization Steganography”, Multimedia Systems, 11:2 (2005), 98–107 | DOI

[4] Fridrich J., Goljan M., Soukal D., “Perturbed Quantization Steganography with Wet Paper Codes”, ACM Multimedia and Security Workshop, ACM Press, New York, 2004, 4–15

[5] Fridrich J., Pevny T., Kodovsky J., “Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities”, ACM Multimedia and Security Workshop, ACM Press, New York, 2007, 3–14

[6] Fridrich J., Goljan M., Lisonek P., Soukal D., “Writing on Wet Paper”, IEEE Trans. on Sig. Proc., 53 (2005), 3923–3935, Special Issue on Media Security | DOI | MR

[7] Sullivan K., Madhow U., Chandrasekaran S., Manjunath B. S., “Steganalysis for Markov cover data with applications to images”, IEEE Transactions on Information Forensics and Security, 1:2 (2006), 275–287 | DOI