메뉴 건너뛰기




Volumn , Issue , 2004, Pages 16-24

A hierarchical protocol for increasing the stealthiness of steganographic methods

Author keywords

Digital watermarking; Quad tree structure; Statistical attacks; Steganalysis; Steganography; Upper bound on detectability

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; DIGITAL SIGNAL PROCESSING; DIGITAL WATERMARKING; EMBEDDED SYSTEMS; HEURISTIC METHODS; INFORMATION TECHNOLOGY; NATURAL LANGUAGE PROCESSING SYSTEMS; RANDOM PROCESSES; STATISTICAL METHODS; TREES (MATHEMATICS);

EID: 14844321260     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1022431.1022436     Document Type: Conference Paper
Times cited : (11)

References (21)
  • 3
    • 0032637701 scopus 로고    scopus 로고
    • Copyright protection for electronic distribution of text documents
    • J. T. Brassil, S. Low, and N. F. Maxemchuk. Copyright protection for electronic distribution of text documents. Proceedings of the IEEE (USA), 87(7):1181-1196, 1999.
    • (1999) Proceedings of the IEEE (USA) , vol.87 , Issue.7 , pp. 1181-1196
    • Brassil, J.T.1    Low, S.2    Maxemchuk, N.F.3
  • 5
    • 0004064292 scopus 로고    scopus 로고
    • Detecting steganographic message in digital images
    • Darmouth College, Computer Science, Hanover, NH, USA
    • H. Farid. Detecting Steganographic Message in Digital Images. Technical Report TR2001-412, Darmouth College, Computer Science, Hanover, NH, USA, 2001.
    • (2001) Technical Report , vol.TR2001-412
    • Farid, H.1
  • 6
    • 14844316498 scopus 로고    scopus 로고
    • Steganography preserving statistical properties
    • LNCS, Noordwijkerhout, The Netherlands, October Springer-Verlag
    • E. Franz. Steganography Preserving Statistical Properties. In Fifth Information Hiding Workshop, volume LNCS, 2578, Noordwijkerhout, The Netherlands, October 2002. Springer-Verlag.
    • (2002) Fifth Information Hiding Workshop , vol.2578
    • Franz, E.1
  • 15
    • 14844301480 scopus 로고    scopus 로고
    • An image watermarking scheme based on information theoretic principles
    • HPL Technical Report, January
    • A. Levy and N. Merhav. An image watermarking scheme based on information theoretic principles. Technical Report HPL-2001-13, HPL Technical Report, January 2001.
    • (2001) Technical Report , vol.HPL-2001-13
    • Levy, A.1    Merhav, N.2
  • 16
    • 0041308536 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • LNCS, Noordwijkerhout, The Netherlands, October. Springer-Verlag
    • S. Lyu and H. Farid. Detecting Hidden Messages using Higher-Order Statistics and Support Vector Machines. In Proceedings of the Fifth Information Hiding Workshop, volume LNCS, 2578, Noordwijkerhout, The Netherlands, October, 2002. Springer-Verlag.
    • (2002) Proceedings of the Fifth Information Hiding Workshop , vol.2578
    • Lyu, S.1    Farid, H.2
  • 17
    • 0001849187 scopus 로고    scopus 로고
    • Attacks on steganographic systems
    • LNCS, Dresden, Germany. Springer-Verlag
    • A. Pfitzmann and A. Westfeld. Attacks on steganographic systems. In Third Information Hiding Workshop, volume LNCS, 1768, pages 61-76, Dresden, Germany, 1999. Springer-Verlag.
    • (1999) Third Information Hiding Workshop , vol.1768 , pp. 61-76
    • Pfitzmann, A.1    Westfeld, A.2
  • 20
    • 84937814312 scopus 로고    scopus 로고
    • F5-A steganographic algorithm: High capacity despite better steganalysis
    • LNCS, Pittsburgh, USA, April. Springer-Verlag
    • A. Westfeld. F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Fourth Information Hiding Workshop, volume LNCS, 2137, pages 289-302, Pittsburgh, USA, April 2001. Springer-Verlag.
    • (2001) Fourth Information Hiding Workshop , vol.2137 , pp. 289-302
    • Westfeld, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.