Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Steganographic key recovery for adaptive steganography under “known-message attacks”
Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and ...
-
Article
Stego key searching for LSB steganography on JPEG decompressed image
At present, steganalysis research focuses on detecting the existence of a hidden message. However, extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in c...