메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 860-864

Steganalysis of palette images: Attack optimal parity assignment algorithm

Author keywords

Attack; Multimedia security; OPA algorithm; Steganalysis; Steganography

Indexed keywords

ALGORITHMS; DATA TRANSFER; EMBEDDED SYSTEMS; IMAGE ANALYSIS; MULTIMEDIA SERVICES; STATISTICAL METHODS;

EID: 34147191586     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 1
    • 0031996445 scopus 로고    scopus 로고
    • Steganography: Seeing the Unseen
    • February
    • Johnson, N.F., Jajodia, S. Steganography: Seeing the Unseen." IEEE Computer, February 1998 (1998) 26-34.
    • (1998) IEEE Computer , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 2
    • 34147160904 scopus 로고    scopus 로고
    • Steganalysis of Images Created Using Current Steganography Software
    • Portland, Oregon
    • Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. Proc. 2nd Workshop on Info Hiding, April 1998, Portland, Oregon.
    • (1998) Proc. 2nd Workshop on Info Hiding, April
    • Johnson, N.F.1    Jajodia, S.2
  • 5
    • 0347390532 scopus 로고    scopus 로고
    • Applications of data hiding in digital images
    • Brisbane, Australia, August
    • Fridrich, J., 1999. Applications of data hiding in digital images. Tutorial for The ISSPA_99, Brisbane, Australia, August 1999.
    • (1999) Tutorial for The ISSPA_99
    • Fridrich, J.1
  • 6
    • 1542363250 scopus 로고    scopus 로고
    • A new steganographic method for palette-based images
    • Savannah, Georgia, 25-28 April
    • Fridrich, J., 1998. A new steganographic method for palette-based images. IS&T PICS, Savannah, Georgia, 25-28 April 1999, pp. 285-289.
    • (1998) IS&T PICS , pp. 285-289
    • Fridrich, J.1
  • 8
    • 0011994605 scopus 로고    scopus 로고
    • Detecting Steganographic Content on the Internet, CITI Technical Report 01-11
    • August, submitted for publication
    • N. Provos and Peter Honeyman, "Detecting Steganographic Content on the Internet", CITI Technical Report 01-11,August 2001, submitted for publication
    • (2001)
    • Provos, N.1    Honeyman, P.2
  • 9
    • 21144449328 scopus 로고    scopus 로고
    • Detecting Low Embedding rates
    • Petitcolas et al, eds, Noordwijkerhout, Netherlands, Oct. 7-9
    • A. Westfeld, Detecting Low Embedding rates, In: Petitcolas et al. (eds.): 5th Information Hiding Workshop, Noordwijkerhout, Netherlands, Oct. 7-9, 2002.
    • (2002) 5th Information Hiding Workshop
    • Westfeld, A.1
  • 10
    • 0242665592 scopus 로고    scopus 로고
    • Higher-order statistical Steganalysis of palette images
    • Santa Clara, CA, Jan
    • Jessica Fridrich, Miroslav Goljan, David Soukal. Higher-order statistical Steganalysis of palette images. Proc. EI SPIE Santa Clara, CA, Jan 2003 pp. 178-190.
    • (2003) Proc. EI SPIE , pp. 178-190
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 11
    • 33751563867 scopus 로고    scopus 로고
    • Luminance Quasi-preserving Color Quantization for Digital Steganography to Palette-Based Images. Michiharu Niimi, Hideki Noda, Eiji Kawaguchi. 16th International Conference on Pattern Recognition, August 11-15, 2002
    • Luminance Quasi-preserving Color Quantization for Digital Steganography to Palette-Based Images. Michiharu Niimi, Hideki Noda, Eiji Kawaguchi. 16th International Conference on Pattern Recognition, August 11-15, 2002
  • 13
    • 7744237932 scopus 로고    scopus 로고
    • A New Steganographic Method Resisting Statistical Attack
    • Aug. 31-Sept. 4, Beijing
    • Xiangwei Kong, Chang Liu, Xingang You, Yanqing Guo. A New Steganographic Method Resisting Statistical Attack. Signal Processing Proceedings, pp.1092-1093, Aug. 31-Sept. 4, 2004 Beijing.
    • (2004) Signal Processing Proceedings , pp. 1092-1093
    • Kong, X.1    Liu, C.2    You, X.3    Guo, Y.4
  • 14
    • 84957868624 scopus 로고    scopus 로고
    • An Information-Theoretic Model for Steganography
    • Aucsmith, D, ed, Information Hiding, Springer-Verlag, New York, pp
    • C. Cachin, "An Information-Theoretic Model for Steganography", In: Aucsmith, D. (ed.): Information Hiding. Lecture Notes in Computer Science, Vol. 1525. Springer-Verlag, New York, pp. 306-318, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 306-318
    • Cachin, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.