메뉴 건너뛰기




Volumn 25, Issue 3, 2004, Pages 331-339

Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security

Author keywords

Histogram analysis; Pixel value differencing; Steganalysis; Steganography

Indexed keywords

IMAGE ANALYSIS; SENSITIVITY ANALYSIS; VISION;

EID: 0347355319     PISSN: 01678655     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patrec.2003.10.014     Document Type: Article
Times cited : (218)

References (10)
  • 2
    • 0036034444 scopus 로고    scopus 로고
    • Practical steganalysis of digital images--state of the art
    • Proc. SPIE, San Jose, USA, January 2002
    • Fridrich, J., Goljan, M., 2002. Practical steganalysis of digital images--state of the art. In: Security and Watermarking of Multimedia Contents IV, Proc. SPIE, San Jose, USA, vol. 4675, January 2002, pp. 1-13
    • (2002) Security and Watermarking of Multimedia Contents IV , vol.4675 , pp. 1-13
    • Fridrich, J.1    Goljan, M.2
  • 4
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG image: Breaking the F5 algorithm
    • Hiding, Noordwijkerhout, Netherlands, October 2002
    • Fridrich, J., Goljan, M., Hogea, D., 2002. Steganalysis of JPEG image: breaking the F5 algorithm. In: 5th Internat. Workshop on Inform. Hiding, Noordwijkerhout, Netherlands, October 2002, pp. 310-323
    • (2002) 5th Internat. Workshop on Inform , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 5
    • 0242576328 scopus 로고    scopus 로고
    • Steganalysis of additive noise modelable information hiding
    • Santa Clara, January 2003. Available from
    • Harmsen, J.J., Pearlman, W.A., 2003. Steganalysis of additive noise modelable information hiding. In: SPIE Electronics Imaging, Santa Clara, January 2003. Available from
    • (2003) SPIE Electronics Imaging
    • Harmsen, J.J.1    Pearlman, W.A.2
  • 7
    • 84870653559 scopus 로고    scopus 로고
    • Cyber warfare--steganography vs. steganalysis
    • in press
    • Wang, H., Wang, S., in press. Cyber warfare--steganography vs. steganalysis. Comm. ACM
    • Comm. ACM
    • Wang, H.1    Wang, S.2
  • 8
    • 0001849187 scopus 로고    scopus 로고
    • Attacks on steganographic systems
    • Lecture Notes in Computer Science Springer
    • Westfeld A. Pfitzmann A. Attacks on steganographic systems 3rd Internat. Workshop on Inform. Hiding Lecture Notes in Computer Science vol. 1768 1999 61-76 Springer
    • (1999) 3rd Internat. Workshop on Inform. Hiding , vol.1768 , pp. 61-76
    • Westfeld, A.1    Pfitzmann, A.2
  • 9
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • Wu D.C. Tsai W.H. A steganographic method for images by pixel-value differencing Pattern Recognition Lett. 24 2003 1613-1626
    • (2003) Pattern Recognition Lett. , vol.24 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.