Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks.
Li LiWeiming ZhangKejiang ChenNenghai YuPublished in: IEEE Trans. Multim. (2020)
Keyphrases
- security analysis
- countermeasures
- smart card
- jpeg images
- least significant bit
- authentication scheme
- data hiding
- spatial domain
- security mechanisms
- password guessing
- information security
- information hiding
- watermarking technique
- security requirements
- public key
- secret key
- watermarking scheme
- authentication protocol
- high security
- image encryption
- user authentication
- discrete cosine transform
- digital images
- jpeg compression
- error correction
- hidden information
- digital watermarking
- encryption scheme
- defense mechanisms
- secret data
- watermarking algorithm
- watermark embedding
- lossy compression
- dct domain
- spread spectrum
- compression algorithm
- frequency domain
- data embedding
- private key
- image watermarking
- cover image
- security protocols
- dct coefficients
- intrusion detection