메뉴 건너뛰기




Volumn 9, Issue 3, 2003, Pages 303-311

A mathematical framework for active steganalysis

Author keywords

Independent component analysis; Security; Steganalysis; Steganography

Indexed keywords

ALGORITHMS; COSINE TRANSFORMS; EMBEDDED SYSTEMS; INDEPENDENT COMPONENT ANALYSIS; INFORMATION MANAGEMENT; RANDOM PROCESSES; SECURITY OF DATA; VECTORS; WATERMARKING;

EID: 1442357605     PISSN: 09424962     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00530-003-0101-8     Document Type: Article
Times cited : (67)

References (28)
  • 2
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Proceedings of the 2nd international workshop on information hiding, Berlin, April 1998. Springer, Berlin Heidelberg New York
    • Cachin C (1998) An information-theoretic model for steganography. Proceedings of the 2nd international workshop on information hiding, Berlin, April 1998. Lecture notes in computer science, vol 1525. Springer, Berlin Heidelberg New York, pp 306-318
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 3
    • 0031122399 scopus 로고    scopus 로고
    • Infomax and maximum likelihood for source separation
    • Cardoso JF (1997) Infomax and maximum likelihood for source separation. IEEE Signal Process Lett (4): 112-114
    • (1997) IEEE Signal Process Lett , Issue.4 , pp. 112-114
    • Cardoso, J.F.1
  • 4
    • 0032187518 scopus 로고    scopus 로고
    • Blind signal separation: Statistical principles
    • Cardoso JF (1998) Blind signal separation: statistical principles. Proc IEEE 90(8):2009-2026
    • (1998) Proc IEEE , vol.90 , Issue.8 , pp. 2009-2026
    • Cardoso, J.F.1
  • 9
    • 0028416938 scopus 로고
    • Independent component analysis - A new concept?
    • Comon P (1994) Independent component analysis - a new concept? Signal Process 36:287-314
    • (1994) Signal Process , vol.36 , pp. 287-314
    • Comon, P.1
  • 15
    • 0032072064 scopus 로고    scopus 로고
    • Watermarking of uncompressed and compressed video
    • Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283-301
    • (1998) Signal Process , vol.66 , Issue.3 , pp. 283-301
    • Hartung, F.1    Girod, B.2
  • 17
    • 1442285759 scopus 로고    scopus 로고
    • URL http://www.digimarc.com
  • 18
    • 1442334722 scopus 로고    scopus 로고
    • URL http://www.jpeg.org
  • 19
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • Springer, Berlin Heidelberg New York
    • Johnson NF, Jajodia S (1998) Steganalysis of images created using current steganography software. Lecture notes on computer science, vol 1525. Springer, Berlin Heidelberg New York, pp 273-289
    • (1998) Lecture Notes on Computer Science , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 21
    • 0041308536 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Noordwijkerhout, The Netherlands
    • Lyu S, Fand H (2002) Detecting hidden messages using higher-order statistics and support vector machines. Proceedings of the 5th international workshop on information hiding, Noordwijkerhout, The Netherlands (available at http://www.cs.dartmouth.edu/farid/)
    • (2002) Proceedings of the 5th International Workshop on Information Hiding
    • Lyu, S.1    Fand, H.2
  • 23
    • 84860464383 scopus 로고    scopus 로고
    • Detecting steganographic content on the Internet
    • San Diego, February 2002
    • Proves N, Honeyman P (2002) Detecting steganographic content on the Internet. Proceedings of ISOC NDSS'02, San Diego, February 2002 (available at http://www.citi.umich.edu/u/provos/)
    • (2002) Proceedings of ISOC NDSS'02
    • Proves, N.1    Honeyman, P.2
  • 24
    • 0001217738 scopus 로고
    • Prisoners' problem and the subliminal channel
    • Santa Barbara, August 1984
    • Simmons GJ (1984) Prisoners' problem and the subliminal channel. Proceedings of CRYPTO83 - Advances incryptology, Santa Barbara, August 1984, pp 51-67
    • (1984) Proceedings of CRYPTO83 - Advances Incryptology , pp. 51-67
    • Simmons, G.J.1
  • 25
    • 84955564864 scopus 로고    scopus 로고
    • Modulation and information hiding in images
    • Proceedings of the 1st information hiding workshop, Springer, Berlin Heidelberg New York
    • Smith JR, Comiskey BO (1996) Modulation and information hiding in images. Proceedings of the 1st information hiding workshop, Lecture notes in computer science, vol 1174, Springer, Berlin Heidelberg New York, pp 207-226
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 207-226
    • Smith, J.R.1    Comiskey, B.O.2
  • 26
    • 0035368528 scopus 로고    scopus 로고
    • Analysis of digital watermarks subjected to optimum linear filtering and additive noise
    • Su JK, Eggers JJ, Girod B (2001) Analysis of digital watermarks subjected to optimum linear filtering and additive noise. Signal Process 81(6):1141-1175
    • (2001) Signal Process , vol.81 , Issue.6 , pp. 1141-1175
    • Su, J.K.1    Eggers, J.J.2    Girod, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.