References
Liu J F, Tian Y G, Han T, et al. Stego key searching for LSB steganography on JPEG decompressed image. Sci China Inf Sci, 2016, 59: 032105
Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70–82
Ker A D. Locating steganographic payload via WS residuals. In: Proceedings of 10th Workshop on Multimedia and Security, Oxford, 2008. 27–31
Ker A D, Lubenko I. Feature reduction and payload location with WAM steganalysis. In: Proceedings of SPIE 7254, Media Forensics and Security, San Jose, 2009. 72540A
Quach T T. Optimal cover estimation methods and steganographic payload location. IEEE Trans Inform Forensic Secur, 2011, 6: 1214–1222
Quach T T. Cover estimation and payload location using Markov random fields. In: Proceedings of SPIE 9028, Electronic Imaging, Media Watermarking, Security, and Forensics, San Francisco, 2014. 90280H
Liu J F, Tian Y G, Han T, et al. LSB steganographic payload location for JPEG-decompressed images. Digital Signal Process, 2015, 38: 66–76
Huang Y F, Tao H Z, Xiao B, et al. Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys. Sci China Technol Sci, 2017, 60: 1585–1596
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61302159, 61401512, 61772549, 61379151, 61602508, U1736214) and Science and Technology Research Project of Henan Province, China (Grant No. 152102210005).
Author information
Authors and Affiliations
Corresponding authors
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Yang, C., Luo, X., Lu, J. et al. Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci. China Inf. Sci. 61, 119103 (2018). https://doi.org/10.1007/s11432-017-9328-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9328-2