메뉴 건너뛰기




Volumn 2, Issue 1, 2007, Pages 46-54

Steganalysis of embedding in two least-significant bits

Author keywords

Steganography; Structural steganalysis; Two least significant bit (LSB) embedding

Indexed keywords

LEAST-SIGNIFICANT BIT (LSB); STEGANALYSIS; STRUCTURAL STEGANALYSIS;

EID: 33847697308     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2006.890519     Document Type: Article
Times cited : (116)

References (14)
  • 1
    • 35048891531 scopus 로고    scopus 로고
    • Improved detection of LSB steganography in grayscale images
    • Proc. 6th Information Hiding Workshop, Heidelberg, Germany
    • A. Ker, "Improved detection of LSB steganography in grayscale images," in Proc. 6th Information Hiding Workshop, Heidelberg, Germany, 2004, vol. 3200, pp. 97-115, ser. Springer Lecture Notes Computer Science.
    • (2004) ser. Springer Lecture Notes Computer Science , vol.3200 , pp. 97-115
    • Ker, A.1
  • 2
    • 33746613626 scopus 로고    scopus 로고
    • A general framework for the structural steganalysis of LSB replacement
    • Proc. 7th Information Hiding Workshop, Heidelberg, Germany
    • _, "A general framework for the structural steganalysis of LSB replacement," in Proc. 7th Information Hiding Workshop, Heidelberg, Germany, 2005, vol. 3727, pp. 296-311, ser. Springer Lecture Notes Computer Science.
    • (2005) ser. Springer Lecture Notes Computer Science , vol.3727 , pp. 296-311
    • Ker, A.1
  • 3
    • 35048859775 scopus 로고    scopus 로고
    • An improved sample pairs method for detection of LSB embedding
    • Proc. 6th Information Hiding Workshop, Heidelberg, Germany
    • P. Lu, X. Luo, Q. Tang, and L. Shen, "An improved sample pairs method for detection of LSB embedding," in Proc. 6th Information Hiding Workshop, Heidelberg, Germany, 2004, vol. 3200, pp. 116-127, ser. Springer Lecture Notes Computer Science.
    • (2004) ser. Springer Lecture Notes Computer Science , vol.3200 , pp. 116-127
    • Lu, P.1    Luo, X.2    Tang, Q.3    Shen, L.4
  • 4
    • 0035472155 scopus 로고    scopus 로고
    • Detecting LSB steganography in color and grayscale images
    • Oct.-Dec
    • J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and grayscale images," IEEE Multimedia, Special Issue on Security, vol. 8, no. 4, pp. 22-28, Oct.-Dec. 2001.
    • (2001) IEEE Multimedia, Special Issue on Security , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 6
    • 0037524382 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • Jul
    • S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. Signal Process., vol. 51, no. 7, pp. 1995-2007, Jul. 2003.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.7 , pp. 1995-2007
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 7
    • 33645652933 scopus 로고    scopus 로고
    • Fourth-order structural steganalysis and analysis of cover assumptions
    • E. J. Delp III and P. W. Wong, Eds
    • A. Ker, "Fourth-order structural steganalysis and analysis of cover assumptions," in Proc. SPIE, Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp III and P. W. Wong, Eds., 2006, vol. 6072, pp. 25-38.
    • (2006) Proc. SPIE, Security, Steganography and Watermarking of Multimedia Contents VIII , vol.6072 , pp. 25-38
    • Ker, A.1
  • 8
    • 27844504298 scopus 로고    scopus 로고
    • A new framework of LSB steganalysis of digital media
    • Oct
    • S. Dumitrescu and X. Wu, "A new framework of LSB steganalysis of digital media," IEEE Trans. Signal Process., vol. 53, no. 10, pt. 2, pp. 3936-3947, Oct. 2005.
    • (2005) IEEE Trans. Signal Process , vol.53 , Issue.10 PART. 2 , pp. 3936-3947
    • Dumitrescu, S.1    Wu, X.2
  • 10
    • 33749601689 scopus 로고    scopus 로고
    • Extended optimization method of LSB steganalysis
    • X. Yu, T. Tan, and Y. Wang, "Extended optimization method of LSB steganalysis," in Proc. IEEE Int. Conf. Image Processing, 2005, vol. 2, pp. 1102-1105.
    • (2005) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 1102-1105
    • Yu, X.1    Tan, T.2    Wang, Y.3
  • 11
    • 8844243986 scopus 로고    scopus 로고
    • On estimation of secret message length in LSB steganography in spatial domain
    • E. J. Delp III and P. W. Wong, Eds
    • J. Fridrich and M. Goljan, "On estimation of secret message length in LSB steganography in spatial domain," in Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, E. J. Delp III and P. W. Wong, Eds., 2004, vol. 5306, pp. 23-34.
    • (2004) Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI , vol.5306 , pp. 23-34
    • Fridrich, J.1    Goljan, M.2
  • 13
    • 33746587784 scopus 로고    scopus 로고
    • Assessment of steganalytic methods using multiple regression models
    • Proc. 7th Information Hiding Workshop, Heidelberg, Germany
    • R. Böhme, "Assessment of steganalytic methods using multiple regression models," in Proc. 7th Information Hiding Workshop, Heidelberg, Germany, 2005, vol. 3727, pp. 278-295, ser. Springer Lecture Notes Computer Science.
    • (2005) ser. Springer Lecture Notes Computer Science , vol.3727 , pp. 278-295
    • Böhme, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.