All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Exploring Non-Additive Distortion in Steganography

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F18%3A00323929" target="_blank" >RIV/68407700:21230/18:00323929 - isvavai.cz</a>

  • Result on the web

    <a href="https://dl.acm.org/citation.cfm?id=3206015" target="_blank" >https://dl.acm.org/citation.cfm?id=3206015</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1145/3206004.3206015" target="_blank" >10.1145/3206004.3206015</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Exploring Non-Additive Distortion in Steganography

  • Original language description

    Leading steganography systems make use of the Syndrome-Trellis Code (STC) algorithm to minimize a distortion function while encoding the desired payload, but this constrains the distortion function to be additive. The Gibbs Embedding algorithm works for a certain class of non-additive distortion functions, but has its own limitations and is highly complex. In this short paper we show that it is possible to modify the STC algorithm in a simple way, to minimize a non-additive distortion function suboptimally. We use it for two examples. First, applying it to the S-UNIWARD distortion function, we show that it does indeed reduce distortion, compared with minimizing the additive approximation currently used in image steganography, but that it makes the payload more -- not less -- detectable. This parallels research attempting to use Gibbs Embedding for the same task. Second, we apply it to distortion defined by the output of a specific detector, as a counter-move in the steganography game. However, unless the Warden is forced to move first (by fixing the detector) this is highly detectable.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    O - Projekt operacniho programu

Others

  • Publication year

    2018

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security

  • ISBN

    978-1-4503-5625-1

  • ISSN

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    109-114

  • Publisher name

    ACM

  • Place of publication

    New York

  • Event location

    Innsbruck

  • Event date

    Jun 20, 2018

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article