Publication | Closed Access
Batch steganography in the real world
57
Citations
15
References
2012
Year
Unknown Venue
Data HidingImage AnalysisEngineeringData ScienceSteganalysisInformation SecurityInformation HidingData PrivacyInformation ForensicsBlind SteganalysisSteganographyComputer ScienceBatch SteganographyMultimedia SecurityUniversal SteganalyzerData SecurityCryptography
We examine the universal pooled steganalyzer of in two respects. First, we confirm that the method is applicable to a number of different steganographic embedding methods. Second, we consider the converse problem of how to spread payload between multiple covers, by testing different payload allocation strategies against the universal steganalyzer. We focus on practical options which can be implemented without new software or expert knowledge, and we test on real-world data. Concentration of payload into the minimal number of covers is consistently the least detectable option. We present additional investigations which explain this phenomenon, uncovering a nonlinear relationship between embedding distortion and payload. We conjecture that this is an unavoidable consequence of blind steganalysis. This is significant for both batch steganography and pooled steganalysis.
| Year | Citations | |
|---|---|---|
Page 1
Page 1