loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jean-François Couchot 1 ; Raphaël Couturier 1 ; Yousra Ahmed Fadil 2 and Christophe Guyeux 1

Affiliations: 1 FEMTO-ST Institute and University of Franche-Comté, France ; 2 FEMTO-ST Institute, University of Franche-Comté, College of Engineering and University of Diyala, France

Keyword(s): Steganography, Information Hiding, Second Order Partial Derivative, Gradient, Steganalyse.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Information Assurance ; Information Hiding

Abstract: Steganography schemes are designed with the objective of minimizing a defined distortion function. In most existing state of the art approaches, this distortion function is based on image feature preservation. Since smooth regions or clean edges define image core, even a small modification in these areas largely modifies image features and is thus easily detectable. On the contrary, textures, noisy or chaotic regions are so difficult to model that the features having been modified inside these areas are similar to the initial ones. These regions are characterized by disturbed level curves. This work presents a new distortion function for steganography that is based on second order derivatives, which are mathematical tools that usually evaluate level curves. Two methods are explained to compute these partial derivatives and have been completely implemented. The first experiments show that these approaches are promising.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.235.199.19

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Couchot, J.; Couturier, R.; Fadil, Y. and Guyeux, C. (2016). A Second Order Derivatives based Approach for Steganography. In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - SECRYPT; ISBN 978-989-758-196-0; ISSN 2184-3236, SciTePress, pages 424-431. DOI: 10.5220/0005966804240431

@conference{secrypt16,
author={Jean{-}Fran\c{C}ois Couchot. and Raphaël Couturier. and Yousra Ahmed Fadil. and Christophe Guyeux.},
title={A Second Order Derivatives based Approach for Steganography},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - SECRYPT},
year={2016},
pages={424-431},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005966804240431},
isbn={978-989-758-196-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - SECRYPT
TI - A Second Order Derivatives based Approach for Steganography
SN - 978-989-758-196-0
IS - 2184-3236
AU - Couchot, J.
AU - Couturier, R.
AU - Fadil, Y.
AU - Guyeux, C.
PY - 2016
SP - 424
EP - 431
DO - 10.5220/0005966804240431
PB - SciTePress