메뉴 건너뛰기




Volumn , Issue , 2004, Pages 4-15

Perturbed Quantization steganography with wet paper codes

Author keywords

Adaptive; Multimedia; Quantizer; Security; Steganalysis; Steganography

Indexed keywords

ADAPTIVE; MULTIMEDIA; QUANTIZERS; SECURITY; STEGANALYSIS; STEGANOGRAPHY;

EID: 14844321910     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (157)

References (37)
  • 2
    • 20444372785 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • Toronto, CA, May 23-35
    • th Information Hiding Workshop, Toronto, CA, May 23-35, 2004.
    • (2004) th Information Hiding Workshop
    • Fridrich, J.1
  • 3
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • August 22-24
    • G.J. Simmons, The Prisoners' Problem and the Subliminal Channel, CRYPTO83 - Advances in Cryptology, August 22-24, pp. 51-67, 1984.
    • (1984) CRYPTO83 - Advances in Cryptology , pp. 51-67
    • Simmons, G.J.1
  • 5
    • 0032070303 scopus 로고    scopus 로고
    • On the limits of steganography
    • Special Issue on Copyright and Privacy Protection
    • R.J. Anderson and F.A.P. Petitcolas, "On the Limits of Steganography", IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, vol. 16(4), pp. 474-481, 1998.
    • (1998) IEEE Journal of Selected Areas in Communications , vol.16 , Issue.4 , pp. 474-481
    • Anderson, R.J.1    Petitcolas, F.A.P.2
  • 6
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • nd International Workshop. Springer-Verlag, New York
    • nd International Workshop. Lecture Notes in Computer Science, Vol. 1525. Springer-Verlag, New York, pp. 306-318, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 8
    • 0036030621 scopus 로고    scopus 로고
    • Defining security in steganographic systems
    • Watermarking of Multimedia Contents IV. 4675, Electronic Imaging 2000, San Jose, CA
    • S. Katzenbeisser and F.A.P. Petitcolas, "Defining Security in Steganographic Systems", SPIE Security and Watermarking of Multimedia Contents IV, Vol. 4675, Electronic Imaging 2000, San Jose, CA, pp. 50-56, 2002.
    • (2002) SPIE Security and , pp. 50-56
    • Katzenbeisser, S.1    Petitcolas, F.A.P.2
  • 9
    • 35248889376 scopus 로고    scopus 로고
    • Steganography preserving statistical properties
    • th International Workshop. Springer-Verlag, Berlin Heidelberg New York
    • th International Workshop. Lecture Notes in Computer Science, Vol. 2578. Springer-Verlag, Berlin Heidelberg New York, pp. 278-294, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 278-294
    • Franz, E.1
  • 10
    • 84940448623 scopus 로고    scopus 로고
    • Secure steganographic methods for palette images
    • nd International Workshop, Springer-Verlag, New York
    • nd International Workshop. Lecture Notes in Computer Science, Vol. 1768, Springer-Verlag, New York, pp. 47-60. 2000.
    • (2000) Lecture Notes in Computer Science , vol.1768 , pp. 47-60
    • Fridrich, J.1    Du, R.2
  • 11
    • 14844321260 scopus 로고    scopus 로고
    • A hierarchical protocol for increasing the stealthiness of steganographic methods
    • to appear Magdeburg, Germany, September 20-21
    • M. Karahan, U. Topkara, M. Atallah, C. Taskiran, E. Lin, E. Delp, "A Hierarchical Protocol for Increasing the Stealthiness of Steganographic Methods", to appear in Proc. ACM Multimediam Workshop, Magdeburg, Germany, September 20-21,2004.
    • (2004) Proc. ACM Multimediam Workshop
    • Karahan, M.1    Topkara, U.2    Atallah, M.3    Taskiran, C.4    Lin, E.5    Delp, E.6
  • 13
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5-A steganographic algorithm)
    • th International Workshop on Information Hiding. Springer-Verlag, New York
    • th International Workshop on Information Hiding, LNCS, Vol. 2137. Springer-Verlag, New York, pp. 289-302, 2001.
    • (2001) LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 14
    • 14844285173 scopus 로고    scopus 로고
    • Some notes on steganography
    • posted on
    • R. Crandall, "Some Notes on Steganography", posted on Steganography Mailing List, http://os.inf.tu-dresden.de/̃westfeld/crandall. pdf, 1998.
    • (1998) Steganography Mailing List
    • Crandall, R.1
  • 16
    • 0020752342 scopus 로고
    • Writing on dirty paper
    • May
    • M. H. M. Costa, "Writing on dirty paper," IEEE Trans. Inform. Theory, vol. IT-29(3), pp. 439-441, May 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , Issue.3 , pp. 439-441
    • Costa, M.H.M.1
  • 17
    • 0020821981 scopus 로고
    • On the capacity of computer memory with defects
    • C. Heegard and A. El-Gamal, "On the Capacity of Computer Memory with Defects," IEEE Trans. Inform. Theory, vol. IT-29, pp. 731-739, 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.IT-29 , pp. 731-739
    • Heegard, C.1    El-Gamal, A.2
  • 18
    • 0036611624 scopus 로고    scopus 로고
    • Nested linear/lattice codes for structured multiterminal binning
    • R. Zamir, S. Shamai, U. Erez, "Nested Linear/Lattice Codes for Structured Multiterminal Binning", IEEE Trans. Inf. Th., vol. 48(6), pp. 1250-1276, 2002.
    • (2002) IEEE Trans. Inf. Th. , vol.48 , Issue.6 , pp. 1250-1276
    • Zamir, R.1    Shamai, S.2    Erez, U.3
  • 19
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • March
    • P. Moulin and J. A. O'Sullivan, "Information-Theoretic Analysis of Information Hiding," IEEE Trans. on Inf. Th, vol. 49(3), pp. 563-593, March 2003.
    • (2003) IEEE Trans. on Inf. Th , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 20
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. Wornell, Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding", IEEE Trans, on Inf. Th., vol. 47(4), May 2001.
    • (2001) IEEE Trans, on Inf. Th. , vol.47 , Issue.4
    • Chen, B.1    Wornell, G.2
  • 21
    • 38249018454 scopus 로고
    • Applications of coding theory to communication combinatorial problems
    • G. Cohen, "Applications of coding theory to communication combinatorial problems. Discrete Math. 83 (2-3), pp. 237-248, 1990.
    • (1990) Discrete Math. , vol.83 , Issue.2-3 , pp. 237-248
    • Cohen, G.1
  • 22
    • 0038137157 scopus 로고    scopus 로고
    • Random krylov spaces over finite fields
    • R.P. Brent, S. Gao, A.G.B. Lauder, "Random Krylov Spaces Over Finite Fields", SIAMJ. Discrete Math. 16(2), pp. 276-287, 2003.
    • (2003) SIAMJ. Discrete Math. , vol.16 , Issue.2 , pp. 276-287
    • Brent, R.P.1    Gao, S.2    Lauder, A.G.B.3
  • 24
    • 0034387168 scopus 로고    scopus 로고
    • On the rank of random matrices
    • C. Cooper, "On the Rank of Random Matrices", Random Structures and Algorithms 16(2), pp. 209-232, 2000.
    • (2000) Random Structures and Algorithms , vol.16 , Issue.2 , pp. 209-232
    • Cooper, C.1
  • 25
    • 84988216913 scopus 로고
    • Solving large sparse linear systems over finite fields
    • Menezes, A.J., and Vanstone, S.A. (eds.): Advances in Cryptology - CRYPTO '90, Springer Verlag
    • B.A. LaMacchia and A.M. Odlyzko, "Solving Large Sparse Linear Systems over Finite Fields", In: Menezes, A.J., and Vanstone, S.A. (eds.): Advances in Cryptology - CRYPTO '90, Springer Verlag, Lecture Notes in Computer Science vol. 537, pp. 109-133, 1991.
    • (1991) Lecture Notes in Computer Science , vol.537 , pp. 109-133
    • Lamacchia, B.A.1    Odlyzko, A.M.2
  • 26
    • 0022583143 scopus 로고
    • Solving sparse linear equations over finite fields
    • D.H. Wiedemann, "Solving Sparse Linear Equations Over Finite Fields", IEEE Transactions on Information Theory, IT-32(1), pp. 54-62, 1986.
    • (1986) IEEE Transactions on Information Theory , vol.IT-32 , Issue.1 , pp. 54-62
    • Wiedemann, D.H.1
  • 29
    • 1442360452 scopus 로고    scopus 로고
    • Quantitative steganalysis: Estimating secret message length
    • Special issue on Multimedia Security
    • J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, "Quantitative Steganalysis: Estimating Secret Message Length", ACM Multimedia Systems Journal. Special issue on Multimedia Security, 9(3), 288-302, 2003.
    • (2003) ACM Multimedia Systems Journal , vol.9 , Issue.3 , pp. 288-302
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3    Soukal, D.4
  • 30
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • th International Workshop. Springer-Verlag, Berlin Heidelberg New York
    • th International Workshop. Lecture Notes in Computer Science, Vol. 2578. Springer-Verlag, Berlin Heidelberg New York, pp. 340-354, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 340-354
    • Farid, H.1    Siwei, L.2
  • 32
    • 33847714243 scopus 로고    scopus 로고
    • Estimation of primary quantization matrix in double compressed JPEG images
    • Cleveland, OH, August 5-8
    • J. Lukáš and J. Fridrich, "Estimation of Primary Quantization Matrix in Double Compressed JPEG Images", Proc. of DFRWS 2003, Cleveland, OH, August 5-8, 2003.
    • (2003) Proc. of DFRWS 2003
    • Lukáš, J.1    Fridrich, J.2
  • 33
    • 0033688392 scopus 로고    scopus 로고
    • Semi-fragile watermarking for authenticating JPEG visual content
    • Electronic Imaging 2000, San Jose, CA
    • Ching-Yung Lin and Shih-Fu Chang, "Semi-Fragile Watermarking for Authenticating JPEG Visual Content", SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, Electronic Imaging 2000, San Jose, CA, pp. 140-151, 2000.
    • (2000) SPIE Security and Watermarking of Multimedia Contents II , vol.3971 , pp. 140-151
    • Lin, C.-Y.1    Chang, S.-F.2
  • 34
    • 35048819204 scopus 로고    scopus 로고
    • Model based steganography
    • T. Kalker, I.J. Cox, Yong Man Ro (Eds.), International Workshop on Digital Watermarking. Springer Verlag New York
    • P. Sallee, "Model Based Steganography", In: T. Kalker, I.J. Cox, Yong Man Ro (Eds.), International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol. 2939. Springer Verlag New York, pp. 154-167, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 35
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington, DC
    • N. Provos, Defending Against Statistical Steganalysis, 10th USENIX Security Symposium. Washington, DC 2001.
    • (2001) 10th USENIX Security Symposium
    • Provos, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.