{"title":"一种有效的F5断裂算法","authors":"Hong Cai, S. Agaian, Yufeng Wang","doi":"10.1109/MMSP.2005.248568","DOIUrl":null,"url":null,"abstract":"By thwarting visual and chi2 attacks, the F5 steganographic algorithm is viewed as a challenge to steganalysis. This paper presents a novel algorithm that can break F5, even with low embedding rates. The test results show that the proposed method can accurately break F5 when relatively short messages (82 bytes) are embedded into a 256times256 gray image","PeriodicalId":191719,"journal":{"name":"2005 IEEE 7th Workshop on Multimedia Signal Processing","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"An Effective Algorithm for Breaking F5\",\"authors\":\"Hong Cai, S. Agaian, Yufeng Wang\",\"doi\":\"10.1109/MMSP.2005.248568\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By thwarting visual and chi2 attacks, the F5 steganographic algorithm is viewed as a challenge to steganalysis. This paper presents a novel algorithm that can break F5, even with low embedding rates. The test results show that the proposed method can accurately break F5 when relatively short messages (82 bytes) are embedded into a 256times256 gray image\",\"PeriodicalId\":191719,\"journal\":{\"name\":\"2005 IEEE 7th Workshop on Multimedia Signal Processing\",\"volume\":\"92 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 IEEE 7th Workshop on Multimedia Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MMSP.2005.248568\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 IEEE 7th Workshop on Multimedia Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MMSP.2005.248568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
By thwarting visual and chi2 attacks, the F5 steganographic algorithm is viewed as a challenge to steganalysis. This paper presents a novel algorithm that can break F5, even with low embedding rates. The test results show that the proposed method can accurately break F5 when relatively short messages (82 bytes) are embedded into a 256times256 gray image