[   Steganography   |   Steganalysis   |   Watermarking   ]

In StegoLab you can find implementations of different techniques used in steganography, steganalysis and watermarking.

Steganography


Codes:

Cost functions:


Steganalysis



Watermarking


  • E-Blind: Blind embedding and Linear Correlation Detection. This method simply adds a pattern to the image. The method is based on “System 1” proposed in the book Digital Watermarking and Steganography de I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich y T. Kalker.

  • E-Fixed-LC: Fixed Linear Correlation Embedder (informed embedding) and Linear Correlation Detection. This method adjusts the strength of the watermark to ensure that the watermarked image has a specified linear correlation. The method is based on “System 2” proposed in the book Digital Watermarking and Steganography de I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich y T. Kalker.

  • E-blk-Blind: Block-based blind embedding and correlation coefficient detection. This method works in a similar way to the E-Blind method. The method is based on “System 3” proposed in the book Digital Watermarking and Steganography de I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich y T. Kalker.

  • E-Simple-8: 8-bit blind embedder and 8-bit detector. This method is a version of E-Blind modified to embed 8-bits. The method is based on “System 4” proposed in the book Digital Watermarking and Steganography de I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich y T. Kalker.

  • E-Trellis-8: Trellis-coding embedder and Viterbi detector. This method embeds 8-bit messages using trellis-coded modulation. The method is based on “System 4” proposed in the book Digital Watermarking and Steganography de I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich y T. Kalker.





Comments

There are currently no comments on this article.


Add a Comment