메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 255-264

A robust steganography technique using discrete cosine transform insertion

Author keywords

Digital image; Embedding techniques; Image compression; Image quality measures; Steganography

Indexed keywords

COLOR IMAGE PROCESSING; COSINE TRANSFORMS; IMAGE COMPRESSION; IMAGE QUALITY;

EID: 33847704195     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITICT.2005.1609628     Document Type: Conference Paper
Times cited : (42)

References (13)
  • 1
    • 0034787093 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, and R. Du. Reliable Detection of LSB Steganography in Color and Grayscale Image. In Proceedings of the ACM Workshop on Multimedia and Security, pages 2730, Ottowa, Canada, 5 October 2001.
    • J. Fridrich, M. Goljan, and R. Du. Reliable Detection of LSB Steganography in Color and Grayscale Image. In Proceedings of the ACM Workshop on Multimedia and Security, pages 27(30, Ottowa, Canada, 5 October 2001.
  • 2
    • 0031996445 scopus 로고    scopus 로고
    • Exploring Steganography: Seeing the Unseen
    • Johnson, F. Neitl and Sushil Jajodia. "Exploring Steganography: Seeing the Unseen". IEEE Computer, 32:2. 26-34. 1998.
    • (1998) IEEE Computer , vol.32 , Issue.2 , pp. 26-34
    • Johnson, F.N.1    Jajodia, S.2
  • 3
    • 14844321260 scopus 로고    scopus 로고
    • A Hierarchical Protocol for Increasing the Stealthiness of Steganographic Methods
    • September 20-21, Magdeburg, Germany
    • Mercan Topkara, Umut Topkara, Cuneyt Taskiran, Eugene Lin, Mikhail J. Atallah, Edward J. Delp. "A Hierarchical Protocol for Increasing the Stealthiness of Steganographic Methods", MM-SEC'04, September 20-21, 2004, Magdeburg, Germany.
    • (2004) MM-SEC'04
    • Topkara, M.1    Topkara, U.2    Taskiran, C.3    Lin, E.4    Atallah, M.J.5    Delp, E.J.6
  • 6
    • 33847675252 scopus 로고    scopus 로고
    • An Overview of Steganography for the Computer Forensics Examiner
    • Jury
    • G. C. Kessler, "An Overview of Steganography for the Computer Forensics Examiner", Forensic Science Communications Volume 6 Number 3, Jury 2004.
    • (2004) Forensic Science Communications , vol.6 , Issue.3
    • Kessler, G.C.1
  • 8
    • 33646852111 scopus 로고    scopus 로고
    • An Evaluation of Image Based Steganography Methods
    • Fall
    • Cumin, K. and Bailey, K. "An Evaluation of Image Based Steganography Methods". Int. J. of Digital Evidence, Fall 2003, Volume 2, Issue 2.
    • (2003) Int. J. of Digital Evidence , vol.2 , Issue.2
    • Cumin, K.1    Bailey, K.2
  • 11
    • 0035163485 scopus 로고    scopus 로고
    • Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation
    • Thessaloniki, Greece
    • F. Alturki and R. Mersereau, "Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation" IEEE International Conference on Image Processing, Thessaloniki, Greece, 2001.
    • (2001) IEEE International Conference on Image Processing
    • Alturki, F.1    Mersereau, R.2
  • 13
    • 33847764458 scopus 로고    scopus 로고
    • Thesis Information-hiding Process in a Steganographic System
    • to be published
    • S. Ahmed Madani, M.Sc. Thesis "Information-hiding Process in a Steganographic System", to be published.
    • Ahmed, S.1    Madani, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.