{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:41:18Z","timestamp":1775230878139,"version":"3.50.1"},"reference-count":27,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>This article describes how to overcome the shortage of steganalysis for small capacity-based embedding. A slight modification method is proposed to break steganography. For a given image, traditional steganalysis methods are first used to achieve a preliminary result. For the \u201cclear\u201d image judged by steganalysis, it is still suspicious because of the incompleteness of steganalysis for small capacity. Thus, slight modifications are made to break the possibility of covert communication. The modifications are made on the locations with minimal distortion to guarantee high quality of the modified image. To this end, a proposed distortion minimization based algorithm using slight modification. Experimental results show that the error rate of secret data extraction is around 50% after implementation, which indicates that the covert communication of steganography is destroyed completely.<\/jats:p>","DOI":"10.4018\/ijdcf.2019010109","type":"journal-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T20:19:21Z","timestamp":1539289161000},"page":"114-125","source":"Crossref","is-referenced-by-count":11,"title":["Breaking Steganography"],"prefix":"10.4018","volume":"11","author":[{"given":"Zhenxing","family":"Qian","sequence":"first","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"given":"Zichi","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Institute for Advanced Communication and Data Science, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai, China"}]},{"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"given":"Guorui","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019010109-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"IJDCF.2019010109-1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084302"},{"key":"IJDCF.2019010109-2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555281"},{"key":"IJDCF.2019010109-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077629"},{"key":"IJDCF.2019010109-4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"IJDCF.2019010109-5","doi-asserted-by":"crossref","unstructured":"Frdrich, J., & Soukal, D. (2006). Matrix Embedding for Large Payloads. in Proc. International Society for Optics and Photonics (pp. 60721W-60721W-12). San Jose, CA, Feb. 2006.","DOI":"10.1117\/12.639933"},{"key":"IJDCF.2019010109-6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"IJDCF.2019010109-7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2312817"},{"key":"IJDCF.2019010109-8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473815"},{"key":"IJDCF.2019010109-9","first-page":"234","article-title":"Designing Steganographic Distortion Using Directional Filters.","author":"V.Holub","year":"2012","journal-title":"Proc. IEEE International Workshop on Information Forensics and Security,"},{"key":"IJDCF.2019010109-10","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482514"},{"key":"IJDCF.2019010109-11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2364918"},{"key":"IJDCF.2019010109-12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"IJDCF.2019010109-13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"IJDCF.2019010109-14","doi-asserted-by":"crossref","unstructured":"Sedighi, V., Fridrich, J., & Cogranne, R. (2015). Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. In Proc. International Society for Optics and Photonics, San Francisco, CA.","DOI":"10.1117\/12.2080272"},{"key":"IJDCF.2019010109-15","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756608"},{"issue":"4","key":"IJDCF.2019010109-16","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TIFS.2015.2507159","article-title":"Adaptive steganalysis based on embedding probabilities of pixels.","volume":"11","author":"W.Tang","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"IJDCF.2019010109-17","doi-asserted-by":"publisher","DOI":"10.1109\/97.995823"},{"key":"IJDCF.2019010109-18","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"IJDCF.2019010109-19","article-title":"Distortion Function for JPEG Steganography Based on Image-Texture and Correlation in DCT Domain.","author":"Z. C.Wang","journal-title":"IETE Technical Review"},{"key":"IJDCF.2019010109-20","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.25.5.050501"},{"key":"IJDCF.2019010109-21","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2575100"},{"key":"IJDCF.2019010109-22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_5"},{"key":"IJDCF.2019010109-23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"IJDCF.2019010109-24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"},{"key":"IJDCF.2019010109-25","first-page":"21","article-title":"Behavior Steganography in Social Network.","author":"X. P.Zhang","year":"2016","journal-title":"Proc. the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,"},{"key":"IJDCF.2019010109-26","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.060863"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=215326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T22:38:12Z","timestamp":1693953492000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019010109"}},"subtitle":["Slight Modification with Distortion Minimization"],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":27,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019010109","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}