By Topic

How quantization based schemes can be used in steganographic context

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Braci, S. ; Lab. des Signaux et Syst. (L2S), Univ. Paris-Sud XI (UPS), Gif-sur-Yvette, France ; Delpha, C. ; Boyer, R.

The quantization based embedding systems are usually used in the information hiding domain, thanks to their efficiency and simplicity. In other hand, they are known to be insecure in steganography context (according to Cachins' security definition) because they distort the stego-signal density function. In this paper, we show that an important kind of quantization based systems (those resulting from the combination with the spread transform and classical data hiding schemes based on quantization ) preserve the probability density function of the stego-signal. We prove the undetectability theoretically and show how the spread transform makes the stego-message statistically non-dectectable in the real case.

Published in:

Multimedia Signal Processing, 2009. MMSP '09. IEEE International Workshop on

Date of Conference:

5-7 Oct. 2009