publication . Preprint . 2017

An improvement on LSB+ method

Qazanfari, Kazem; Ghaemmaghami, Shahrokh;
Open Access English
  • Published: 20 Sep 2017
The Least Significant Bit (LSB) substitution is an old and simple data hiding method that could almost effortlessly be implemented in spatial or transform domain over any digital media. This method can be attacked by several steganalysis methods, because it detectably changes statistical and perceptual characteristics of the cover signal. A typical method for steganalysis of the LSB substitution is the histogram attack that attempts to diagnose anomalies in the cover image's histogram. A well-known method to stand the histogram attack is the LSB+ steganography that intentionally embeds some extra bits to make the histogram look natural. However, the LSB+ method ...
ACM Computing Classification System: ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION
free text keywords: Computer Science - Cryptography and Security
Download from

[15] F.J. Gonz´alez-Serrano, H.Y. Molina-Bulla, and J.J. Murillo-Fuentes.", Independent component analysis applied to digital watermarking", International Conference on Acoustic, Speech and SignalProcessing (ICASSP), volume 3, pages 1997-2000, May 2001.

[16] S. Bounkong, B. Toch, D. Saad, D. Lowe, " ICA for watermarking digital images", J. Mach. Learn. Res. 4 pp 1471-14 7, 2004.

[17] A. J. Bell and T. J. Sejnowski, ―The Independent Components' of Natural Scenes are Edge Filters‖, Vision Research, 37(23):3327-3338, 1997. [OpenAIRE]

[18] W. Lu, J.Zhang, X.Sun, K.Okada "A Digital Watermarking Technique Based on ICA Image Features " ICA 2004, LNCS 3195, pp. 906-913, 2004.

[36] Killian, J., Leighton, F.T., Matheson, L.R., Shamoon, T., Tarjan," Resistance of watermarked documents to collusional attacks", Technical report, NEC Research Institute, Princeton, NJ , 1997.

[37] 87. Linnartz, van Dijk, " Analysis of the sensitivity attack against electronic watermarks in images", Aucsmith, D., ed.: 2nd InternationalWorkshop on Information Hiding, IH'98. Volume 1525 of Lecture Notes in Computer Science.,Portland, OR, USA, Springer Verlag , PP 258- 272,1998.

[38] Cox, Linnartz ,"Public watermarks and resistance to tampering" ,Proc. IEEE Int. Conf. on Image Processing. Volume 3., Santa Barbara, California,USA , 1997.

[39] L.P´erez-Freire, P. Comesa˜na, J. Troncoso-Pastoriza, F.P´erez-Gonz´alez ," Watermarking Security: A Survey",Transactions on DHMS I, LNCS 4300, pp. 41- 72, 2006.

[40] Cayre, Fontaine, Furon, " Watermarking security: Theory and practice. IEEE Trans. Signal Processing 53,PP 3976- 3987,2005. [OpenAIRE]

[41] I. Cox, J. Kilian, T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing 6 (12), PP 1673-1687 , 1997.

[42] P. Bas and J. Hurri "Steganography And Digital Watermarking Vulnerability Of Dm Watermarking Of Non-Iid Host Signals To Attacks Utilising The Statistics Of Independent Components", IEE Proc.-Inf. Secur., Vol. 153, No. 3, September 2006.

[43] Chen , Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding", IEEE Trans. Inf. Theory, 47, (4), pp. 1423-1443, 2001.

[44] M.C. Jones and R. Sibson. What is projection pursuit ? J. of the Royal Statistical Society, ser. A,150:1_36, 1987. [OpenAIRE]

Any information missing or wrong?Report an Issue