Skip to main content

and
  1. No Access

    Article

    Steganographic key recovery for adaptive steganography under “known-message attacks”

    Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and ...

    Hansong Du, Jiufen Liu, Yuguo Tian, **angyang Luo in Multimedia Tools and Applications (2022)

  2. No Access

    Article

    Stego key searching for LSB steganography on JPEG decompressed image

    At present, steganalysis research focuses on detecting the existence of a hidden message. However, extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in c...

    Jiufen Liu, Yuguo Tian, Tao Han, Junchao Wang in Science China Information Sciences (2016)