메뉴 건너뛰기




Volumn 2, Issue 1, 2005, Pages 50-70

A new blind method for detecting novel steganography

Author keywords

Blind classification; Geometric clustering; Jpeg; Steganalysis; Steganography

Indexed keywords

ALGORITHMS; COMPUTER CRIME; DATA REDUCTION; IMAGE PROCESSING; INTERNET; SOCIETIES AND INSTITUTIONS;

EID: 14544299158     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2005.01.003     Document Type: Note
Times cited : (41)

References (27)
  • 4
    • 14544278675 scopus 로고    scopus 로고
    • Fisher's linear discriminant
    • [accessed 24 Jan 2004]
    • Michael Brown Fisher's linear discriminant Web document 1999 〈http://www.cse.ucsc.edu/research/compbio/genex/genexTR2html/node12. html〉 2004 [accessed 24 Jan 2004]
    • (2004) Web Document 1999
    • Brown, M.1
  • 7
    • 14544305815 scopus 로고    scopus 로고
    • Nothing new
    • Storage Networking Industry Association
    • Roger Cummings Nothing new. An introduction to the history of cryptography 2002 Storage Networking Industry Association Available from: 〈http://www.snia.org/apps/group_public/download.php/1627/ History_of_Cryptography_Introduction.pdf〉
    • (2002) An Introduction to the History of Cryptography
    • Cummings, R.1
  • 8
  • 9
    • 84954462362 scopus 로고    scopus 로고
    • Higher-order wavelet statistics and their application to digital forensics
    • Madison, Wisconsin; June
    • Faird Hany, Siwei Lyu. Higher-order wavelet statistics and their application to digital forensics. IEEE Workshop on statistical analysis in computer vision, Madison, Wisconsin; June 2003.
    • (2003) IEEE Workshop on Statistical Analysis in Computer Vision
    • Faird, H.1    Siwei, L.2
  • 10
    • 0347390531 scopus 로고    scopus 로고
    • Steganalysis of JPEG images: Breaking the F5 algorithm
    • Noordwijkerhout, The Netherlands; October
    • Fridrich Jessica, Goljan Miroslav, Hogea Dorin. Steganalysis of JPEG images: breaking the F5 algorithm. Fifth information hiding workshop, Noordwijkerhout, The Netherlands; October 2002.
    • (2002) Fifth Information Hiding Workshop
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 11
    • 0242497150 scopus 로고    scopus 로고
    • New methodology for breaking steganographic techniques for JPEGs
    • Jessica Fridrich, Goljan Miroslav, and Hogea Dorin New methodology for breaking steganographic techniques for JPEGs Proceedings of the EI SPIE Jan 2003 Santa Clara, CA; Jan 2003. p.143-55
    • (2003) Proceedings of the EI SPIE
    • Fridrich, J.1    Miroslav, G.2    Dorin, H.3
  • 13
    • 14544295986 scopus 로고    scopus 로고
    • Society for Imaging Science and Technology, Springfield, VA [accessed on 15 Jan 2004]
    • Jpeg Tutorial. Society for Imaging Science and Technology, Springfield, VA. 〈http://www.imaging.org/resources/jpegtutorial/index.cfm〉 2004 [accessed on 15 Jan 2004].
    • (2004) Jpeg Tutorial
  • 15
    • 14544276203 scopus 로고    scopus 로고
    • Allan Latham JPHide Version 0.51, IBM, 158k, Computer Software 1999
    • (1999) JPHide
    • Latham, A.1
  • 17
    • 0036643059 scopus 로고    scopus 로고
    • Decision region connectivity analysis: A method for analyzing high-dimensional classifiers
    • O. Melnik Decision region connectivity analysis: a method for analyzing high-dimensional classifiers Machine Learning 48 1/2/3 2002
    • (2002) Machine Learning , vol.48 , Issue.123
    • Melnik, O.1
  • 18
    • 14544306332 scopus 로고    scopus 로고
    • unpublished undergraduate presentation [accessed 10 Jan 2004]
    • Nguyen Hoa, Melnik Ofer, Nissim Kobbi. Explaining high-dimensional data, unpublished undergraduate presentation. 〈 http://dimax.rutgers.edu/ ~hnguyen/GOAL.ppt〉 2004 [accessed 10 Jan 2004].
    • (2004) Explaining High-dimensional Data
    • Nguyen, H.1    Melnik, O.2    Nissim, K.3
  • 19
    • 0003845382 scopus 로고    scopus 로고
    • 2nd ed. Cambridge University Press Cambridge, England
    • J. O'Rourke Computational geometry in C 2nd ed. 1998 Cambridge University Press Cambridge, England
    • (1998) Computational Geometry in C
    • O'Rourke, J.1
  • 20
    • 78651538207 scopus 로고    scopus 로고
    • Neils Provos Outguess Version 0.2, Linux. 215k Computer Software 2001
    • (2001) Outguess
    • Provos, N.1
  • 21
    • 0011994605 scopus 로고    scopus 로고
    • Detecting steganographic content on the Internet
    • Provos Neils, Honeyman Peter. Detecting steganographic content on the Internet. CITI Technical Report 01-11; 2001.
    • (2001) CITI Technical Report , vol.1 , Issue.11
    • Provos, N.1    Honeyman, P.2
  • 22
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography
    • May/June
    • Neils Provos, and Peter Honeyman Hide and seek: an introduction to steganography IEEE Security & Privacy Magazine May/June 2003 Available from: 〈http://niels.xtdnet.nl/papers/practical.pdf〉
    • (2003) IEEE Security & Privacy Magazine
    • Provos, N.1    Honeyman, P.2
  • 23
  • 24
    • 10444262110 scopus 로고    scopus 로고
    • Derek Upham Jsteg Version 4, IBM. 92k, Computer Software 1997
    • (1997) Jsteg
    • Upham, D.1
  • 25
    • 14544288047 scopus 로고    scopus 로고
    • Andreas Westfeld F5 Version 1.2 beta, Java, 48k Computer Software 2001
    • (2001) F5
    • Westfeld, A.1
  • 26
    • 10044237408 scopus 로고    scopus 로고
    • Java Programs for Machine Learning. Hamilton, New Zealand: University of Waikato
    • I.H. Witten, and E. Frank WEKA Version 3.2.3, Java Programs for Machine Learning 2002 University of Waikato Hamilton, New Zealand Available from: 〈www.cs.waikato.ac.nz〉
    • (2002) WEKA. Version 3.2.3
    • Witten, I.H.1    Frank, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.