#### Filter Results:

#### Publication Year

2002

2012

#### Publication Type

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

- Yun Q. Shi, Guorong Xuan, Dekun Zou, Jianjiong Gao, Chengyun Yang, Zhenping Zhang +3 others
- ICME
- 2005

In this paper, a general blind image steganalysis system is proposed, in which the statistical moments of characteristic functions of the prediction-error image, the test image, and their wavelet subbands are selected as features. Artificial neural network is utilized as the classifier. The performance of the proposed steganalysis system is significantly… (More)

This paper describes a method for applying a watermark directly to an entropy coded H.264/AVC stream. This method can be applied when the stream, or at least the I-frames, is entropy coded with CAVLC. Most of the hard work goes into building an embedding table during an analysis stage. This table identifies small segments of data in the encoded stream that… (More)

This paper presents a new lossless data hiding method for digital images using integer wavelet transform and threshold embedding technique. Data are embedded into the least significant bit-plane (LSB) of high frequency CDF (2,2) integer wavelet coefficients whose magnitudes are smaller than a certain predefined threshold. Histogram modification is applied… (More)

A steganalysis system based on 2-D Markov chain of thresholded prediction-error image is proposed in this paper. Image pixels are predicted with their neighboring pixels, and the prediction-error image is generated by subtracting the prediction value from the pixel value and then thresholded with a predefined threshold. The empirical transition matrixes of… (More)

This paper describes a watermarking method to directly embed information into a CABAC entropy coded H.264/AVC stream. In theory, modification of a part of an arithmetically coded stream will cause the rest of the stream to be misinterpreted and thus become undecodable. However, the method presented in this paper exploits a feature in the fixed-point integer… (More)

— This paper presents a novel steganalysis scheme to effectively attack the JPEG steganographic schemes. The proposed method exploits the correlations between block-DCT coefficients in both intra-block and inter-block sense. We use Markov empirical transition matrices to capture these dependencies. The experimental results demonstrate that the proposed… (More)

- Guorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang +3 others
- Information Hiding
- 2005

In this paper 1 , a steganalysis scheme based on multiple features formed by statistical moments of wavelet characteristic functions is proposed. Our theoretical analysis has pointed out that the defined n-th statistical moment of a wavelet characteristic function is related to the n-th derivative of the corresponding wavelet histogram, and hence is… (More)

- Dekun Zou, Yun Q. Shi
- ISCAS
- 2005

— In this paper, a novel formatted text document data hiding algorithm, called Inter-word Space Modulation (ISM) scheme, is proposed in which the spaces between neighboring words are modulated to hide data. In contrast to prior arts, this method does not require original documents for hidden data extraction. The hidden data are robust to printing, copying… (More)