메뉴 건너뛰기




Volumn 5150 III, Issue , 2003, Pages 1884-1894

Wavelet-based steganalysis using a computational immune system approach

Author keywords

Computational immune systems; Genetic algorithm; Steganalysis; Steganography; Wavelet transforms

Indexed keywords

COMPUTATIONAL METHODS; GENETIC ALGORITHMS; IMAGE SENSORS; WAVELET TRANSFORMS;

EID: 0141607645     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.502800     Document Type: Conference Paper
Times cited : (2)

References (28)
  • 2
    • 0039430385 scopus 로고    scopus 로고
    • Terror groups hide behind web encryption
    • 5 Feb
    • J. Kelley, "Terror groups hide behind web encryption," USA Today, 5 Feb 2001.
    • (2001) USA Today
    • Kelley, J.1
  • 3
    • 84891395253 scopus 로고    scopus 로고
    • Bin laden: Steganography master?
    • 7 Feb; Accessed on 23 February 2002
    • D. McCullaugh, "Bin laden: Steganography master?," Wired News, 7 Feb 2001. Available at: http://www.wired.com/new/politics/0,1283,41658,html, Accessed on 23 February 2002.
    • (2001) Wired News
    • McCullaugh, D.1
  • 4
    • 0141818515 scopus 로고    scopus 로고
    • Boehlert secures an additional $20 million for rome lab; defense budget bill awaits senate action
    • Accessed on 16 February
    • J. Philipps, "Boehlert secures an additional $20 million for rome lab; defense budget bill awaits senate action." Available at: http://www.house.gov/boehlert/defenseapprops03.htm, Accessed on 16 February 2003.
    • (2003)
    • Philipps, J.1
  • 8
    • 35248889634 scopus 로고    scopus 로고
    • An evolutionary programming approach for detecting novel computer network attacks
    • IEEE Service Center, (Piscataway, NJ)
    • K. P. Anchor, G. B. Lamont, and G. H. Gunsch, "An evolutionary programming approach for detecting novel computer network attacks," in Proceedings of the 2002 Congress on Evolutionary Computation, pp. 1027-1032, IEEE Service Center, (Piscataway, NJ), 2002.
    • (2002) Proceedings of the 2002 Congress on Evolutionary Computation , pp. 1027-1032
    • Anchor, K.P.1    Lamont, G.B.2    Gunsch, G.H.3
  • 9
    • 0004064292 scopus 로고    scopus 로고
    • Detecting steganographic messages in digital images
    • Tech. Rep. TR2001-412, Dartmouth College, Hanover, NH
    • H. Farid, "Detecting steganographic messages in digital images," Tech. Rep. TR2001-412, Dartmouth College, Hanover, NH, 2001.
    • (2001)
    • Farid, H.1
  • 10
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," Lecture Notes in Computer Science 2578, pp. 340-354, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 340-354
    • Lyu, S.1    Farid, H.2
  • 12
    • 0141818512 scopus 로고    scopus 로고
    • Jpeg-jsteg. Computer software - Modification of the independent JPEG group's JPEG software (release 4) for 2-bit steganography in JFIF output files
    • Accessed on 23 February
    • D. Upham, "Jpeg-jsteg." Computer Software - Modification of the Independent JPEG Group's JPEG software (release 4) for 2-bit steganography in JFIF output files. Available at: ftp://ftp.funet.fi/pub/crypt/steganography, Accessed on 23 February 2002.
    • (2002)
    • Upham, D.1
  • 14
    • 84892764719 scopus 로고    scopus 로고
    • Attacks on steganographic systems - Breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools - and some lessons learned
    • A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems - breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools - and some lessons learned," Lecture Notes in Computer Science 1768, pp. 61-75, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1768 , pp. 61-75
    • Westfeld, A.1    Pfitzmann, A.2
  • 15
    • 33847721963 scopus 로고    scopus 로고
    • Outguess
    • Computer Software; Accessed on 23 February 2002
    • N. Provos, "Outguess." Computer Software. Available at: http://www.outguess.org, Accessed on 23 February 2002.
    • Provos, N.1
  • 17
    • 4243533991 scopus 로고    scopus 로고
    • Ezstego and stego
    • Computer Software; Accessed on 23 February
    • R. Machado, "Ezstego and stego." Computer Software. Available at: http://www.stego.com, Accessed on 23 February 2002.
    • (2002)
    • Machado, R.1
  • 20
    • 0026239193 scopus 로고
    • Wavelets and signal processing
    • Oct.
    • O. Rioul and M. Vetterli, "Wavelets and signal processing," IEEE SP Magazine, pp. 14-38, Oct. 1991.
    • (1991) IEEE SP Magazine , pp. 14-38
    • Rioul, O.1    Vetterli, M.2
  • 21
    • 0006399417 scopus 로고    scopus 로고
    • Wavelet-based audio embedding and audio/video compression
    • Master's thesis, Department and Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright Patterson Air Force Base, OH, Mar
    • M. J. Mendenhall, "Wavelet-based audio embedding and audio/video compression," Master's thesis, Department and Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright Patterson Air Force Base, OH, Mar. 2001.
    • (2001)
    • Mendenhall, M.J.1
  • 24
    • 0009896497 scopus 로고    scopus 로고
    • A distributed agent architecture for a computer virus immune system
    • Master's thesis, Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright Patterson Air Force Base, OH, Mar.
    • P. K. Harmer, "A distributed agent architecture for a computer virus immune system," Master's thesis, Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Wright Patterson Air Force Base, OH, Mar. 2000.
    • (2000)
    • Harmer, P.K.1
  • 28
    • 0003913211 scopus 로고    scopus 로고
    • T. Back, D. B. Fogel, and Z. Michalewicz, eds.; Institute of Physics Publishers
    • T. Back, D. B. Fogel, and Z. Michalewicz, eds., Evolutionary Computation 1: Basic Algorithms and Operators, Institute of Physics Publishers, 2000.
    • (2000) Evolutionary Computation 1: Basic Algorithms and Operators


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.