메뉴 건너뛰기




Volumn 15, Issue 4, 2006, Pages

Performance study of common image steganography and steganalysis techniques

Author keywords

[No Author keywords available]

Indexed keywords

STEGANALYSIS; STEGANOGRAPHY;

EID: 33847679624     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.2400672     Document Type: Article
Times cited : (77)

References (21)
  • 1
    • 21844447330 scopus 로고    scopus 로고
    • Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, Singapore
    • M. Kharrazi, H. T. Sencar, and N. Memon, Image Steganography: Concepts and Practice, Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, Singapore (2004).
    • (2004) Image Steganography: Concepts and Practice
    • Kharrazi, M.1    Sencar, H.T.2    Memon, N.3
  • 3
    • 0041308536 scopus 로고    scopus 로고
    • "Detecting hidden messages using higher-order statistics and support vector machines"
    • S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop on Information Hiding (2002).
    • (2002) Proc. 5th Int. Workshop on Information Hiding
    • Lyu, S.1    Farid, H.2
  • 4
    • 8844256156 scopus 로고    scopus 로고
    • "Steganalysis using color wavelet statistics and one-class support vector machines"
    • S. Lyu and H. Farid, "Steganalysis using color wavelet statistics and one-class support vector machines," Proc. SPIE 5306, 35-45 (2004).
    • (2004) Proc. SPIE , vol.5306 , pp. 35-45
    • Lyu, S.1    Farid, H.2
  • 5
    • 20444372785 scopus 로고    scopus 로고
    • "Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes"
    • in Toronto
    • J. Fridrich, "Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes," in Proc. 6th Information Hiding Workshop, Toronto (2004).
    • (2004) Proc. 6th Information Hiding Workshop
    • Fridrich, J.1
  • 6
    • 33644999904 scopus 로고    scopus 로고
    • "Steganalysis using higher order image statistics"
    • S. Lyu and H. Farid, "Steganalysis using higher order image statistics," IEEE Trans. Inf. Forens. Secur 1(1), 111-119 (2006).
    • (2006) IEEE Trans. Inf. Forens. Secur. , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 7
    • 33847607712 scopus 로고    scopus 로고
    • "Digital image forensics for identifying computer generated and digital camera images"
    • S. Dehnie, H. T. Sencar, and N. Memon, "Digital image forensics for identifying computer generated and digital camera images," in Proc. Int. Conf. on Image Processing (2006).
    • (2006) Proc. Int. Conf. on Image Processing
    • Dehnie, S.1    Sencar, H.T.2    Memon, N.3
  • 8
    • 13244253845 scopus 로고    scopus 로고
    • "How realistic is photorealistic?"
    • S. Lyu and H. Farid, "How realistic is photorealistic?" IEEE Trans. Signal Process. 53(2), 845-850 (2005).
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.2 , pp. 845-850
    • Lyu, S.1    Farid, H.2
  • 9
    • 84875599869 scopus 로고    scopus 로고
    • http://www.programmersheaven.com/zone10/cat453/15260.htm.
  • 11
    • 0003710380 scopus 로고    scopus 로고
    • "LIBSVM: A library for support vector machines"
    • Software available at
    • C.-C. Chang and C.-J. Lin, "LIBSVM: a library for support vector machines," (2001). Software available at http://www.csie.ntu.edu.tw/ ~cjlin/libsvm.
    • (2001)
    • Chang, C.-C.1    Lin, C.-J.2
  • 12
    • 0345438685 scopus 로고    scopus 로고
    • "Roc graphs: Notes and practical considerations for researchers"
    • T. Fawcett, "Roc graphs: notes and practical considerations for researchers," http://www.hpl.hp.com/personal/Tom_Fawcett/papers/ ROC101.pdf.
    • Fawcett, T.1
  • 14
    • 0005105932 scopus 로고    scopus 로고
    • "F5-a steganographic algorithm: High capacity despite better steganalysis"
    • A. Westfeld, "F5-a steganographic algorithm: high capacity despite better steganalysis," in Proc. 4th Int. Workshop on Information Hiding (2001).
    • (2001) Proc. 4th Int. Workshop on Information Hiding
    • Westfeld, A.1
  • 16
    • 14844321910 scopus 로고    scopus 로고
    • "Perturbed quantization steganography with wet paper codes"
    • in Magdeburg, Germany
    • J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography with wet paper codes," in Proc. ACM Multimedia Workshop, Magdeburg, Germany (2004).
    • (2004) Proc. ACM Multimedia Workshop
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 18
    • 84875580675 scopus 로고    scopus 로고
    • Encryptpic
    • F. Collin, Encryptpic, http://www.winsite.com/bin/Info?500000033023.
    • Collin, F.1
  • 19
    • 84875580410 scopus 로고    scopus 로고
    • Stegotif
    • G. Pulcini, Stegotif, http://www.geocities.com/SiliconValley/9210/ gfree.html.
    • Pulcini, G.1
  • 20
    • 84875602991 scopus 로고    scopus 로고
    • "Hide 2.1"
    • Toby Sharp, "Hide 2.1," http://www.sharpthoughts.org (2001).
    • (2001)
    • Sharp, T.1
  • 21
    • 1542648229 scopus 로고    scopus 로고
    • "Steganography in JPEG 2000 compressed images"
    • P.-C. Su and C.-C. J. Kuo, "Steganography in JPEG 2000 compressed images," IEEE Trans. Consum. Electron. 49(4), 824-832 (2003).
    • (2003) IEEE Trans. Consum. Electron. , vol.49 , Issue.4 , pp. 824-832
    • Su, P.-C.1    Kuo, C.-C.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.