Skip to Main content Skip to Navigation
New interface
Conference papers

Extracting relevant features of steganographic schemes by feature selection techniques

Abstract : This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed em- bedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the wa- termarked contents only attack (WOA) setup, the watermarked data-set exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaus- sian noise (AWGN).
Complete list of metadata

Cited literature [21 references]  Display  Hide  Download
Contributor : Patrick Bas Connect in order to contact the contributor
Submitted on : Wednesday, August 8, 2007 - 2:58:01 PM
Last modification on : Tuesday, October 19, 2021 - 11:22:39 PM
Long-term archiving on: : Friday, April 9, 2010 - 12:30:36 AM


Files produced by the author(s)


  • HAL Id : hal-00166700, version 1


Yoan Miche, Patrick Bas, Christian Jutten, Amaury Lendasse, Olli Simula. Extracting relevant features of steganographic schemes by feature selection techniques. WaCHa 2007 - Third Wavila Challenge, Jun 2007, Saint-Malo, France. pp.electronic version. ⟨hal-00166700⟩



Record views


Files downloads