Further study on YASS: steganography based on randomized embedding to resist blind steganalysis

@inproceedings{Sarkar2008FurtherSO,
  title={Further study on YASS: steganography based on randomized embedding to resist blind steganalysis},
  author={Anindya Sarkar and Kaushal Solanki and B. S. Manjunath},
  booktitle={Security, Forensics, Steganography, and Watermarking of Multimedia Contents},
  year={2008}
}
We present further extensions of yet another steganographic scheme (YASS), a method based on embedding data in randomized locations so as to resist blind steganalysis. YASS is a JPEG steganographic technique that hides data in the discrete cosing transform (DCT) coefficients of randomly chosen image blocks. Continuing to focus on JPEG image steganography, we present, in this paper, a further study on YASS with the goal of improving the rate of embedding. Following are the two main improvements… CONTINUE READING
Highly Influential
This paper has highly influenced 10 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 52 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 35 extracted citations

An Improved YASS Approach Using Irregular Host-Blocks and Modified Quantization Index Modulation

2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing • 2012
View 7 Excerpts
Highly Influenced

HYSA: HYbrid steganographic approach using multiple steganography methods

Security and Communication Networks • 2011
View 5 Excerpts
Highly Influenced

A high-performance YASS-like scheme using randomized big-blocks

2010 IEEE International Conference on Multimedia and Expo • 2010
View 7 Excerpts
Highly Influenced

Steganalysis of YASS

IEEE Transactions on Information Forensics and Security • 2008
View 6 Excerpts
Highly Influenced

JPEG Image Steganalysis Using Multivariate PDF Estimates With MRF Cliques

IEEE Transactions on Information Forensics and Security • 2013
View 7 Excerpts
Highly Influenced

An Experimental Study on the Security Performance of YASS

IEEE Transactions on Information Forensics and Security • 2010
View 3 Excerpts
Highly Influenced

Calibration revisited

View 4 Excerpts
Highly Influenced

52 Citations

051015'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 52 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 21 references

A Capacity Result for Batch Steganography

IEEE Signal Processing Letters • 2007

Kodovsky, “Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities,

J. Fridrich, T. Pevny
in Proc. ACM, • 2007

Merging Markov and DCT features for multi-class JPEG steganalysis

Security, Steganography, and Watermarking of Multimedia Contents • 2007

Multi-class blind steganalysis for JPEG images

Security, Steganography, and Watermarking of Multimedia Contents • 2006

Similar Papers

Loading similar papers…