JPEG2000 Steganography Possibly Secure Against Histogram-Based Attack.
Hideki NodaYohsuke TsukamizuMichiharu NiimiPublished in: PCM (2006)
Keyphrases
- jpeg images
- key exchange protocol
- authentication mechanism
- quantization table
- security measures
- authentication protocol
- block cipher
- image coding
- information hiding
- image compression
- compression algorithm
- countermeasures
- image quality
- reed solomon codes
- key agreement
- step size
- information leakage
- compressed images
- data encryption
- compressed domain
- secret key
- security mechanisms
- diffie hellman
- secret information
- coding method
- security requirements
- data hiding
- dct coefficients
- information security
- compression ratio
- security issues
- key management
- encryption scheme
- low bit rate
- data embedding
- ciphertext
- standard model
- security analysis
- discrete cosine transform
- lossless compression
- spread spectrum
- encryption algorithm
- public key
- bit plane
- jpeg compression