메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 717-724

Fingerprinted secret sharing steganography for robustness against image cropping attacks

Author keywords

Data compression; Data embedding capacity; Information hiding; Secret sharing scheme; Steganography

Indexed keywords

DATA EMBEDDING CAPACITY; INFORMATION HIDING; SECRET SHARING SCHEME; STEGANOGRAPHY;

EID: 33845305770     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INDIN.2005.1560463     Document Type: Conference Paper
Times cited : (32)

References (22)
  • 3
    • 20444372785 scopus 로고    scopus 로고
    • Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • Toronto, Canada, May 23-25, 2004
    • Fridrich, J., "Feature Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes" 2004. In Proc. 6th Information Hiding Workshop, Toronto, Canada, May 23-25, 2004.
    • (2004) Proc. 6th Information Hiding Workshop
    • Fridrich, J.1
  • 6
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG images: Breaking the F5 algorithm
    • Noordwijkerhout, The Netherlands, 7-9 October 2002
    • Fridrich, J., Goljan, M., Hogea, D., 2002. "Steganalysis of JPEG Images: Breaking the F5 Algorithm", 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, 7-9 October 2002, pp. 310-323.
    • (2002) 5th Information Hiding Workshop , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 8
    • 25844475939 scopus 로고    scopus 로고
    • Derek Upham
    • Derek Upham, 1999. "Jsteg Steganographic Algorithm" Available on the internet ftp://ftp.funet.fi/pub/crypt/steganography/
    • (1999) Jsteg Steganographic Algorithm
  • 12
    • 35248875661 scopus 로고    scopus 로고
    • A steganographic embedding undetectable by JPEG compatibility steganalysis
    • Petitcolas (Ed.): Noordwijkerhout, The Netherlands, October 7-9, 2002 LNCS Springer Verlag
    • Newman, R. E., Moskowitz, I. S., Chang, L., Brahmadesam M. M., 2002 "A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis". In: Petitcolas (Ed.): Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002 LNCS Springer Verlag 258-277.
    • (2002) Information Hiding, 5th International Workshop, IH 2002 , pp. 258-277
    • Newman, R.E.1    Moskowitz, I.S.2    Chang, L.3    Brahmadesam, M.M.4
  • 14
    • 84873468996 scopus 로고    scopus 로고
    • Hiding text cryptography using image cryptography
    • Plymouth, U.K. July 6-9
    • Potdar V, Chang E. 'Hiding Text Cryptography using Image Cryptography", 4th International Networking Conference, Plymouth, U.K. July 6-9, 2004
    • (2004) 4th International Networking Conference
    • Potdar, V.1    Chang, E.2
  • 18
    • 0001217738 scopus 로고
    • The prisoner's problem and the subliminal channel
    • D. Chaum, ed., Plenum Press, 1984
    • Simmons, G. J., 1984. "The prisoner's problem and the subliminal channel" In Advances in Cryptology - CRYPTO '83", D. Chaum, ed., Plenum Press, 1984, 51-67.
    • (1984) Advances in Cryptology - CRYPTO '83 , pp. 51-67
    • Simmons, G.J.1
  • 19
    • 0141527376 scopus 로고    scopus 로고
    • Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images
    • Soo-Chang, P, Jing-Ming, G., 2003. Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images. In IEEE Transactions on Circuits and Systems for Video Technology. 13(8), 867-884.
    • (2003) IEEE Transactions on Circuits and Systems for Video Technology , vol.13 , Issue.8 , pp. 867-884
    • Soo-Chang, P.1    Jing-Ming, G.2
  • 20
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5-A steganographic algorithm)
    • Moskowitz, I.S. (eds.): LNCS, Vol. 2137. Springer-Verlag, New York, 2001
    • Westfeld, A., 2001. "High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm)", In: Moskowitz, I.S. (eds.): 4th International Workshop on Information Hiding, LNCS, Vol. 2137. Springer-Verlag, New York, pp. 289-302, 2001.
    • (2001) 4th International Workshop on Information Hiding , pp. 289-302
    • Westfeld, A.1
  • 21
    • 84892764719 scopus 로고    scopus 로고
    • Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - And Some Lessons Learned
    • Springer-Verlag, Berlin, 2000, pp.
    • Westfeld, A., Pfitzmann A., 2000. "Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - and Some Lessons Learned". Lecture Notes in Computer Science, vol.1768, Springer-Verlag, Berlin, 2000, pp.
    • (2000) Lecture Notes in Computer Science , vol.1768
    • Westfeld, A.1    Pfitzmann, A.2
  • 22
    • 0037410595 scopus 로고    scopus 로고
    • A Steganographic method for images by pixel-value differencing
    • Wu, D.C. and Tsai, W.H., 2003. A Steganographic method for images by pixel-value differencing. In Pattern Recognition Letters. 24(9-10), pp. 1613-1626.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.