Compatibility and Timing Attacks for JPEG Steganalysis.
Etienne LevecquePatrick BasJan ButoraPublished in: CoRR (2023)
Keyphrases
- jpeg images
- discrete cosine transform
- bit plane
- jpeg compression
- watermarking algorithm
- watermarking scheme
- countermeasures
- lossy compression
- image compression
- compression algorithm
- watermark embedding
- image watermarking
- information hiding
- dct coefficients
- data hiding
- low complexity
- digital watermark
- compressed images
- spatial domain
- image coding
- compressed domain
- watermarking technique
- rate distortion
- coded images
- signal processing
- dct domain
- security protocols
- bit rate
- image quality