About
12
Publications
977
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
271
Citations
Publications
Publications (12)
Recently Zhang et al. described an algorithm for the detection of ±1 LSB steganography based on the statistics of the amplitudes of local extrema in the grey-level histogram. Experimental results demonstrated performance comparable or superior to other state-of-the-art algorithms. In this paper, we describe improvements to this algorithm to (i) red...
We tackle the problem of the steganalysis of images produced by different sources. We first use a classifier to try to understand the image source and then use a version of the steganalyzer that has been explicitly trained to work with images belonging to the correct class. These classifiers are widely available from the image forensics literature...
The large variety of signal processing tools available today permits to anyone to easily modify digital multimedia objects
like audio, still images or video without leaving any perceptible trace of the modifications. Even though these tools are
extremely useful in several scenarios, e.g. to increase the perceived quality of multimedia contents, the...
The main goal of any steganographic algorithm is that of hiding a message within an innocuous signal in such a way that the very presence of the hidden message remains secret. The opposite effort of determining the presence of a hidden message within a cover signal is carried out by steganalyzer programs. Blind steganalyzers do not know the stegano...
Recently Zhang et al. described an algorithm for the detection of ±1 LSB steganography based on the statistics of the amplitudes of local extrema in the grey-level histogram. Experimental results demonstrated performance comparable or superior to other state-of-the-art algorithms. In this paper, we describe improvements to this algorithm to (i) red...
In this paper we describe a robust watermarking scheme for image tampering identification and localization. A compact representation of the image is first produced by assembling a feature vector consisting of pseudo-random projections of the decimated image. Then, the quantized projections are encoded to form a hash, which is robustly embedded as a...
The possibility of using redundant basis expansion to securely hide a message within a cover color image is explored by improving previous attempts in this sense in terms of security and payload. The stability and computational complexity problems of previous works are solved by introducing new selection and update rules working entirely in the int...
We compare the performance of three steganalysis system for detection of plus/minus 1 steganography. We examine the relative performance of each system on three commonly used image databases. Experimental results clearly demonstrate that both absolute and relative performance of all three algorithms vary considerably across databases. This sensitiv...
Recently Zhang et al described an algorithm for the detection of plusmn1 LSB steganography based on the statistics of the amplitudes of local extrema in the greylevel histogram. Experimental results demonstrated performance comparable or superior to other state-of-the-art algorithms. In this paper, we describe improvements to this algorithm to (i)...
A new steganographic algorithm for color images (MPSteg-color) is presented based on Matching Pursuit (MP) decomposition of
the host image. With respect to previous works operating in the MP domain, the availability of three color bands is exploited
to avoid the instability of the decomposition path and to randomize it for enhanced security. A sele...
In this paper we propose a new steganographic algorithm based on Matching Pursuit image decomposition. Many modern approaches to detect the presence of hidden messages are based on statistical analysis, preferably on the analysis of higher-order statistical regularities. The idea behind this work is to adaptively choose the elements of a redundant...