Sorry, you need to enable JavaScript to visit this website.

Watermarking and Steganography

3D STEGANALYSIS USING THE EXTENDED LOCAL FEATURE SET


3D steganalysis aims to find the changes embedded through steganographic or information hiding algorithms into 3D models. This research study proposes to use new 3D features, such as the edge vectors, represented in both Cartesian and Laplacian coordinate systems, together with other steganalytic features, for improving the results of 3D steganalysers. In this way the local feature vector used by the steganalyzer is extended to 124 dimensions.

Paper Details

Authors:
Daofu Gong, Fenlin Liu
Submitted On:
4 October 2018 - 5:27pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

3D Steganalysis

(59)

Subscribe

[1] Daofu Gong, Fenlin Liu, "3D STEGANALYSIS USING THE EXTENDED LOCAL FEATURE SET", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3466. Accessed: Jul. 22, 2019.
@article{3466-18,
url = {http://sigport.org/3466},
author = {Daofu Gong; Fenlin Liu },
publisher = {IEEE SigPort},
title = {3D STEGANALYSIS USING THE EXTENDED LOCAL FEATURE SET},
year = {2018} }
TY - EJOUR
T1 - 3D STEGANALYSIS USING THE EXTENDED LOCAL FEATURE SET
AU - Daofu Gong; Fenlin Liu
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3466
ER -
Daofu Gong, Fenlin Liu. (2018). 3D STEGANALYSIS USING THE EXTENDED LOCAL FEATURE SET. IEEE SigPort. http://sigport.org/3466
Daofu Gong, Fenlin Liu, 2018. 3D STEGANALYSIS USING THE EXTENDED LOCAL FEATURE SET. Available at: http://sigport.org/3466.
Daofu Gong, Fenlin Liu. (2018). "3D STEGANALYSIS USING THE EXTENDED LOCAL FEATURE SET." Web.
1. Daofu Gong, Fenlin Liu. 3D STEGANALYSIS USING THE EXTENDED LOCAL FEATURE SET [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3466

A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection_Poster


In this paper, we propose the first joint watermarking-encryption-compression scheme for the protection of medical images. Its originality is twofold. In a first time, it allows the access to watermarking-based security services from the encrypted and the compressed bitstreams without having to parse them even partially. It becomes possible to trace images and control their reliability (i.e. integrity and authenticity) from both the encrypted and compressed domains.

Paper Details

Authors:
Sahar HADDAD, Gouenou COATRIEUX, Michel COZIC
Submitted On:
4 October 2018 - 9:32am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Poster of "A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection"

(73)

Subscribe

[1] Sahar HADDAD, Gouenou COATRIEUX, Michel COZIC, "A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection_Poster", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3408. Accessed: Jul. 22, 2019.
@article{3408-18,
url = {http://sigport.org/3408},
author = {Sahar HADDAD; Gouenou COATRIEUX; Michel COZIC },
publisher = {IEEE SigPort},
title = {A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection_Poster},
year = {2018} }
TY - EJOUR
T1 - A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection_Poster
AU - Sahar HADDAD; Gouenou COATRIEUX; Michel COZIC
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3408
ER -
Sahar HADDAD, Gouenou COATRIEUX, Michel COZIC. (2018). A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection_Poster. IEEE SigPort. http://sigport.org/3408
Sahar HADDAD, Gouenou COATRIEUX, Michel COZIC, 2018. A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection_Poster. Available at: http://sigport.org/3408.
Sahar HADDAD, Gouenou COATRIEUX, Michel COZIC. (2018). "A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection_Poster." Web.
1. Sahar HADDAD, Gouenou COATRIEUX, Michel COZIC. A New Joint Watermarking-Encryption-JPEG-LS Compression Method for a Priori & a Posteriori Image Protection_Poster [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3408

Watermarking and rank metric codes


This paper presents a different way to improve the resistance of digital watermarking. Using the well known Lattice QIM in the spatial domain, we analyze the interest of using a different kind of error correcting codes: rank metric codes. These codes are already used in communications for network coding but not used in the context of watermarking. In this article, we show how this metric permits to correct errors with a specific structure and is adapted to specific image attacks. We propose a first study to validate the concept of rank metric for watermarking process.

Paper Details

Authors:
Pascal Lefèvre, Philippe Carré, Philippe Gaborit
Submitted On:
19 April 2018 - 8:54pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

icassp2018_poster.pdf

(135)

Subscribe

[1] Pascal Lefèvre, Philippe Carré, Philippe Gaborit, "Watermarking and rank metric codes", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3046. Accessed: Jul. 22, 2019.
@article{3046-18,
url = {http://sigport.org/3046},
author = {Pascal Lefèvre; Philippe Carré; Philippe Gaborit },
publisher = {IEEE SigPort},
title = {Watermarking and rank metric codes},
year = {2018} }
TY - EJOUR
T1 - Watermarking and rank metric codes
AU - Pascal Lefèvre; Philippe Carré; Philippe Gaborit
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3046
ER -
Pascal Lefèvre, Philippe Carré, Philippe Gaborit. (2018). Watermarking and rank metric codes. IEEE SigPort. http://sigport.org/3046
Pascal Lefèvre, Philippe Carré, Philippe Gaborit, 2018. Watermarking and rank metric codes. Available at: http://sigport.org/3046.
Pascal Lefèvre, Philippe Carré, Philippe Gaborit. (2018). "Watermarking and rank metric codes." Web.
1. Pascal Lefèvre, Philippe Carré, Philippe Gaborit. Watermarking and rank metric codes [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3046

Yedrouj-Net: An efficient CNN for spatial steganalysis Results Conclusions • An efficient approach based on deep learning (CNN) for steganalysis. • Our method outperforms the state-of-the-art and others CNN-based models with and without taking extra measu


For about 10 years, detecting the presence of a secret message hidden
in an image was performed with an Ensemble Classifier trained
with Rich features. In recent years, studies such as Xu et al. have
indicated that well-designed Convolutional Neural Networks(CNN)
can achieve comparable performance to the two-step machine learning
approaches.
In this paper we propose a CNN that outperforms the state-ofthe-
art in terms of error probability. The proposition is in the continuity
of what has been recently proposed and it is a clever fusion

Paper Details

Authors:
Frédéric COMBY , Marc CHAUMONT
Submitted On:
12 April 2018 - 11:57am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

ICASSP -final.pdf

(15)

Subscribe

[1] Frédéric COMBY , Marc CHAUMONT, "Yedrouj-Net: An efficient CNN for spatial steganalysis Results Conclusions • An efficient approach based on deep learning (CNN) for steganalysis. • Our method outperforms the state-of-the-art and others CNN-based models with and without taking extra measu", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/2424. Accessed: Jul. 22, 2019.
@article{2424-18,
url = {http://sigport.org/2424},
author = {Frédéric COMBY ; Marc CHAUMONT },
publisher = {IEEE SigPort},
title = {Yedrouj-Net: An efficient CNN for spatial steganalysis Results Conclusions • An efficient approach based on deep learning (CNN) for steganalysis. • Our method outperforms the state-of-the-art and others CNN-based models with and without taking extra measu},
year = {2018} }
TY - EJOUR
T1 - Yedrouj-Net: An efficient CNN for spatial steganalysis Results Conclusions • An efficient approach based on deep learning (CNN) for steganalysis. • Our method outperforms the state-of-the-art and others CNN-based models with and without taking extra measu
AU - Frédéric COMBY ; Marc CHAUMONT
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/2424
ER -
Frédéric COMBY , Marc CHAUMONT. (2018). Yedrouj-Net: An efficient CNN for spatial steganalysis Results Conclusions • An efficient approach based on deep learning (CNN) for steganalysis. • Our method outperforms the state-of-the-art and others CNN-based models with and without taking extra measu. IEEE SigPort. http://sigport.org/2424
Frédéric COMBY , Marc CHAUMONT, 2018. Yedrouj-Net: An efficient CNN for spatial steganalysis Results Conclusions • An efficient approach based on deep learning (CNN) for steganalysis. • Our method outperforms the state-of-the-art and others CNN-based models with and without taking extra measu. Available at: http://sigport.org/2424.
Frédéric COMBY , Marc CHAUMONT. (2018). "Yedrouj-Net: An efficient CNN for spatial steganalysis Results Conclusions • An efficient approach based on deep learning (CNN) for steganalysis. • Our method outperforms the state-of-the-art and others CNN-based models with and without taking extra measu." Web.
1. Frédéric COMBY , Marc CHAUMONT. Yedrouj-Net: An efficient CNN for spatial steganalysis Results Conclusions • An efficient approach based on deep learning (CNN) for steganalysis. • Our method outperforms the state-of-the-art and others CNN-based models with and without taking extra measu [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/2424

A watermarking technique to secure printed QR-Codes


The QR (Quick Response) code is a two-dimensional barcode, which was designed for storage information and high speed reading applications. Being cheap to produce and fast to read, it becomes actually a popular solution for product labeling.
Ones try to make QR code a solution against counterfeiting. We present a novel technique that permits to create a secure printed QR code which is robust

Paper Details

Authors:
Hoai Phuong Nguyen, Angès Delahaies, Florent Retraint, Dục Huy Nguyen, Marc Pic, Frédéric Morain-Nicolier
Submitted On:
14 November 2017 - 9:39pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

poster-final.pdf

(204)

poster-final.pdf

(189)

Subscribe

[1] Hoai Phuong Nguyen, Angès Delahaies, Florent Retraint, Dục Huy Nguyen, Marc Pic, Frédéric Morain-Nicolier, "A watermarking technique to secure printed QR-Codes", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/2266. Accessed: Jul. 22, 2019.
@article{2266-17,
url = {http://sigport.org/2266},
author = {Hoai Phuong Nguyen; Angès Delahaies; Florent Retraint; Dục Huy Nguyen; Marc Pic; Frédéric Morain-Nicolier },
publisher = {IEEE SigPort},
title = {A watermarking technique to secure printed QR-Codes},
year = {2017} }
TY - EJOUR
T1 - A watermarking technique to secure printed QR-Codes
AU - Hoai Phuong Nguyen; Angès Delahaies; Florent Retraint; Dục Huy Nguyen; Marc Pic; Frédéric Morain-Nicolier
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/2266
ER -
Hoai Phuong Nguyen, Angès Delahaies, Florent Retraint, Dục Huy Nguyen, Marc Pic, Frédéric Morain-Nicolier. (2017). A watermarking technique to secure printed QR-Codes. IEEE SigPort. http://sigport.org/2266
Hoai Phuong Nguyen, Angès Delahaies, Florent Retraint, Dục Huy Nguyen, Marc Pic, Frédéric Morain-Nicolier, 2017. A watermarking technique to secure printed QR-Codes. Available at: http://sigport.org/2266.
Hoai Phuong Nguyen, Angès Delahaies, Florent Retraint, Dục Huy Nguyen, Marc Pic, Frédéric Morain-Nicolier. (2017). "A watermarking technique to secure printed QR-Codes." Web.
1. Hoai Phuong Nguyen, Angès Delahaies, Florent Retraint, Dục Huy Nguyen, Marc Pic, Frédéric Morain-Nicolier. A watermarking technique to secure printed QR-Codes [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/2266

A NEW BLIND COLOR IMAGE WATERMARKING BASED ON A PSYCHOVISUAL MODEL AND QUANTIZATION APPROACHES

Paper Details

Authors:
Submitted On:
16 September 2017 - 5:40am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

slides_lefevre_pascal_icip2017.pdf

(203)

Subscribe

[1] , "A NEW BLIND COLOR IMAGE WATERMARKING BASED ON A PSYCHOVISUAL MODEL AND QUANTIZATION APPROACHES", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/2186. Accessed: Jul. 22, 2019.
@article{2186-17,
url = {http://sigport.org/2186},
author = { },
publisher = {IEEE SigPort},
title = {A NEW BLIND COLOR IMAGE WATERMARKING BASED ON A PSYCHOVISUAL MODEL AND QUANTIZATION APPROACHES},
year = {2017} }
TY - EJOUR
T1 - A NEW BLIND COLOR IMAGE WATERMARKING BASED ON A PSYCHOVISUAL MODEL AND QUANTIZATION APPROACHES
AU -
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/2186
ER -
. (2017). A NEW BLIND COLOR IMAGE WATERMARKING BASED ON A PSYCHOVISUAL MODEL AND QUANTIZATION APPROACHES. IEEE SigPort. http://sigport.org/2186
, 2017. A NEW BLIND COLOR IMAGE WATERMARKING BASED ON A PSYCHOVISUAL MODEL AND QUANTIZATION APPROACHES. Available at: http://sigport.org/2186.
. (2017). "A NEW BLIND COLOR IMAGE WATERMARKING BASED ON A PSYCHOVISUAL MODEL AND QUANTIZATION APPROACHES." Web.
1. . A NEW BLIND COLOR IMAGE WATERMARKING BASED ON A PSYCHOVISUAL MODEL AND QUANTIZATION APPROACHES [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/2186

RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY: INCREASING ITS RESISTANCE TO STEGANALYSIS


3D steganography is used in order to embed or hide information into 3D objects without causing visible or machine detectable modifications. In this paper we rethink about a high capacity 3D steganography based on the Hamiltonian path quantization, and increase its resistance to steganalysis. We analyze the parameters that may influence the distortion of a 3D shape as well as the resistance of the steganography to 3D steganalysis. According to the experimental results, the proposed high capacity 3D steganographic method has an increased resistance to steganalysis.

Paper Details

Authors:
Sébastien Beugnon, William Puech, Adrian G. Bors
Submitted On:
24 August 2017 - 6:17am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

ICIP2017_HPQR.pdf

(233)

Subscribe

[1] Sébastien Beugnon, William Puech, Adrian G. Bors, "RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY: INCREASING ITS RESISTANCE TO STEGANALYSIS", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1806. Accessed: Jul. 22, 2019.
@article{1806-17,
url = {http://sigport.org/1806},
author = {Sébastien Beugnon; William Puech; Adrian G. Bors },
publisher = {IEEE SigPort},
title = {RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY: INCREASING ITS RESISTANCE TO STEGANALYSIS},
year = {2017} }
TY - EJOUR
T1 - RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY: INCREASING ITS RESISTANCE TO STEGANALYSIS
AU - Sébastien Beugnon; William Puech; Adrian G. Bors
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1806
ER -
Sébastien Beugnon, William Puech, Adrian G. Bors. (2017). RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY: INCREASING ITS RESISTANCE TO STEGANALYSIS. IEEE SigPort. http://sigport.org/1806
Sébastien Beugnon, William Puech, Adrian G. Bors, 2017. RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY: INCREASING ITS RESISTANCE TO STEGANALYSIS. Available at: http://sigport.org/1806.
Sébastien Beugnon, William Puech, Adrian G. Bors. (2017). "RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY: INCREASING ITS RESISTANCE TO STEGANALYSIS." Web.
1. Sébastien Beugnon, William Puech, Adrian G. Bors. RETHINKING THE HIGH CAPACITY 3D STEGANOGRAPHY: INCREASING ITS RESISTANCE TO STEGANALYSIS [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1806

STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE

Paper Details

Authors:
Tomas Denemark, Jessica Fridrich
Submitted On:
11 March 2017 - 8:47pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

ICASSP_2017_v1.2.pdf

(240)

Subscribe

[1] Tomas Denemark, Jessica Fridrich, "STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1658. Accessed: Jul. 22, 2019.
@article{1658-17,
url = {http://sigport.org/1658},
author = {Tomas Denemark; Jessica Fridrich },
publisher = {IEEE SigPort},
title = {STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE},
year = {2017} }
TY - EJOUR
T1 - STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE
AU - Tomas Denemark; Jessica Fridrich
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1658
ER -
Tomas Denemark, Jessica Fridrich. (2017). STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. IEEE SigPort. http://sigport.org/1658
Tomas Denemark, Jessica Fridrich, 2017. STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. Available at: http://sigport.org/1658.
Tomas Denemark, Jessica Fridrich. (2017). "STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE." Web.
1. Tomas Denemark, Jessica Fridrich. STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1658

Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code

Paper Details

Authors:
Submitted On:
19 March 2016 - 5:08am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

icassp16.pdf

(376)

Subscribe

[1] , "Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/793. Accessed: Jul. 22, 2019.
@article{793-16,
url = {http://sigport.org/793},
author = { },
publisher = {IEEE SigPort},
title = {Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code},
year = {2016} }
TY - EJOUR
T1 - Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code
AU -
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/793
ER -
. (2016). Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code. IEEE SigPort. http://sigport.org/793
, 2016. Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code. Available at: http://sigport.org/793.
. (2016). "Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code." Web.
1. . Benchmarking of Scoring Functions for Bias-Based Fingerprinting Code [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/793

Checking Up the Health of Multimedia Security


The terminology "multimedia security" gained a new popularity in the mid-90s with the rapid rise of digital watermarking in an attempt to combat piracy of copyrighted content. This milestone incarnates the mutation of content protection techniques from conventional cryptography to signal processing techniques. Today, multimedia security encompasses a much wider range of techniques such as multimedia encryption, content fingerprinting, anti-camcording, passive forensic analysis.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:38pm
Short Link:
Type:

Document Files

multimediaSecurity_INRIA2014.pdf

(522)

Subscribe

[1] , "Checking Up the Health of Multimedia Security", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/230. Accessed: Jul. 22, 2019.
@article{230-15,
url = {http://sigport.org/230},
author = { },
publisher = {IEEE SigPort},
title = {Checking Up the Health of Multimedia Security},
year = {2015} }
TY - EJOUR
T1 - Checking Up the Health of Multimedia Security
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/230
ER -
. (2015). Checking Up the Health of Multimedia Security. IEEE SigPort. http://sigport.org/230
, 2015. Checking Up the Health of Multimedia Security. Available at: http://sigport.org/230.
. (2015). "Checking Up the Health of Multimedia Security." Web.
1. . Checking Up the Health of Multimedia Security [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/230

Pages