The square root law of steganographic capacity

@inproceedings{Ker2008TheSR,
  title={The square root law of steganographic capacity},
  author={Andrew D. Ker and Tom{\'a}s Pevn{\'y} and Jan Kodovsk{\'y} and Jessica J. Fridrich},
  booktitle={MM&Sec},
  year={2008}
}
There are a number of recent information theoretic results demonstrating (under certain conditions) a sublinear relationship between the number of cover objects and their total steganographic capacity. In this paper we explain how these results may be adapted to the steganographic capacity of a single cover object, which under the right conditions should be proportional to the square root of the cover size. Then we perform some experiments using three genuine steganography methods in digital… CONTINUE READING
Highly Cited
This paper has 89 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 52 extracted citations

Subset selection circumvents the square root law

Media Forensics and Security • 2010
View 5 Excerpts
Highly Influenced

Stealthy Protocols: Metrics and Open Problems

Concurrency, Security, and Puzzles • 2017
View 3 Excerpts
Highly Influenced

HYSA: HYbrid steganographic approach using multiple steganography methods

Security and Communication Networks • 2011
View 12 Excerpts
Highly Influenced

An Epistemological Approach to Steganography

Information Hiding • 2009
View 5 Excerpts
Highly Influenced

Steganalyzing Images of Arbitrary Size with CNNs

Media Watermarking, Security, and Forensics • 2018
View 1 Excerpt

An embedding mechanism for natural steganography after down-sampling

2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) • 2017

90 Citations

051015'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 90 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…