Compatibility and Timing Attacks for JPEG Steganalysis.
Etienne LevecquePatrick BasJan ButoraPublished in: IH&MMSec (2023)
Keyphrases
- jpeg images
- bit plane
- discrete cosine transform
- jpeg compression
- image compression
- dct coefficients
- lossy compression
- data hiding
- compression algorithm
- image coding
- watermarking algorithm
- watermarking scheme
- information hiding
- countermeasures
- watermark embedding
- image watermarking
- watermarking technique
- compressed images
- compressed domain
- transform domain
- low complexity
- security protocols
- coded images
- coding method
- ddos attacks
- wavelet coefficients
- signal processing
- low bit rate
- error correction
- bitstream
- information security
- image processing