메뉴 건너뛰기




Volumn 2, Issue 2, 2007, Pages 140-148

Derivation of error distribution in least squares steganalysis

Author keywords

Least significant bit (LSB) embedding; Steganography; Structural steganalysis

Indexed keywords

ESTIMATOR DISTRIBUTIONS; LEAST SQUARES METHODS (LSM); STEGANOGRAPHY; STRUCTURAL STEGANALYSIS;

EID: 34249326204     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2007.897265     Document Type: Article
Times cited : (31)

References (16)
  • 1
    • 0035472155 scopus 로고    scopus 로고
    • Detecting LSB steganography in color and grayscale images
    • Oct
    • J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and grayscale images," IEEE Multimedia, vol. 8, no. 4, pp. 22-28, Oct. 2001.
    • (2001) IEEE Multimedia , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 2
    • 0242665592 scopus 로고    scopus 로고
    • Higher-order statistical steganalysis of palette images
    • Security and Watermarking of Multimedia Contents V, E. J. Delp, III and P. W. Wong, Eds, SPIE, pp
    • J. Fridrich, M. Goljan, and D. Soukal, "Higher-order statistical steganalysis of palette images," in Security and Watermarking of Multimedia Contents V, E. J. Delp, III and P. W. Wong, Eds., 2003, vol. 5020, ser. Proc. SPIE, pp. 178-190.
    • (2003) ser. Proc , vol.5020 , pp. 178-190
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 3
    • 0037524382 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • Jul
    • S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. Signal Process., vol. 51, no. 7, pp. 1995-2007, Jul. 2003.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.7 , pp. 1995-2007
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 4
    • 33746613626 scopus 로고    scopus 로고
    • A general framework for the structural steganalysis of LSB replacement
    • Proc. 7th Information Hiding Workshop
    • A. Ker, "A general framework for the structural steganalysis of LSB replacement," in Proc. 7th Information Hiding Workshop, 2005, vol. 3727, Lecture Notes Computer Science, pp. 296-311.
    • (2005) Lecture Notes Computer Science , vol.3727 , pp. 296-311
    • Ker, A.1
  • 5
    • 8844280060 scopus 로고    scopus 로고
    • Quantitative evaluation of pairs and RS steganalysis
    • Security, Steganography, and Watermarking of Multimedia Contents VI, E. J. Delp, III and P. W. Wong, Eds, SPIE, pp
    • A. Ker, "Quantitative evaluation of pairs and RS steganalysis," in Security, Steganography, and Watermarking of Multimedia Contents VI, E. J. Delp, III and P. W. Wong, Eds., 2004, vol. 5306, ser. Proc. SPIE, pp. 83-97.
    • (2004) ser. Proc , vol.5306 , pp. 83-97
    • Ker, A.1
  • 6
    • 33645678198 scopus 로고    scopus 로고
    • A two-factor error model for quantitative steganalysis
    • Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp, III and P. W. Wong, Eds, SPIE, pp
    • R. Böhme and A. Ker, "A two-factor error model for quantitative steganalysis," in Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp, III and P. W. Wong, Eds., 2006, vol. 6072, ser. Proc. SPIE, pp. 59-74.
    • (2006) ser. Proc , vol.6072 , pp. 59-74
    • Böhme, R.1    Ker, A.2
  • 7
    • 33645652933 scopus 로고    scopus 로고
    • Fourth-order structural steganalysis and analysis of cover assumptions
    • Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp, III and P. W. Wong, Eds, SPIE, pp
    • A. Ker, "Fourth-order structural steganalysis and analysis of cover assumptions," in Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp, III and P. W. Wong, Eds., 2006, vol. 6072, ser. Proc. SPIE, pp. 25-38.
    • (2006) ser. Proc , vol.6072 , pp. 25-38
    • Ker, A.1
  • 8
    • 33645676686 scopus 로고    scopus 로고
    • New blind steganalysis and its implications
    • Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp, III and P. W. Wong, Eds, SPIE
    • M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp, III and P. W. Wong, Eds., 2006, vol. 6072, ser. Proc. SPIE.
    • (2006) ser. Proc , vol.6072
    • Goljan, M.1    Fridrich, J.2    Holotyak, T.3
  • 9
    • 35048859775 scopus 로고    scopus 로고
    • An improved sample pairs method for detection of LSB embedding
    • Proc. 6th Information Hiding Workshop
    • P. Lu, X. Luo, Q. Tang, and L. Shen, "An improved sample pairs method for detection of LSB embedding," in Proc. 6th Information Hiding Workshop, 2004, vol. 3200, Lecture Notes Computer Science, pp. 116-127.
    • (2004) Lecture Notes Computer Science , vol.3200 , pp. 116-127
    • Lu, P.1    Luo, X.2    Tang, Q.3    Shen, L.4
  • 10
    • 8844243986 scopus 로고    scopus 로고
    • On estimation of secret message length in LSB steganography in spatial domain
    • Security, Steganography, and Watermarking of Multimedia Contents VI, E. J. Delp, III and P. W. Wong, Eds, SPIE, pp
    • J. Fridrich and M. Goljan, "On estimation of secret message length in LSB steganography in spatial domain," in Security, Steganography, and Watermarking of Multimedia Contents VI, E. J. Delp, III and P. W. Wong, Eds., 2004, vol. 5306, ser. Proc. SPIE, pp. 23-34.
    • (2004) ser. Proc , vol.5306 , pp. 23-34
    • Fridrich, J.1    Goljan, M.2
  • 11
  • 12
    • 33746587784 scopus 로고    scopus 로고
    • Assessment of steganalytic methods using multiple regression models
    • Proc. 7th Information Hiding Workshop
    • R. Böhme, "Assessment of steganalytic methods using multiple regression models," in Proc. 7th Information Hiding Workshop, 2005, vol. 3727, Lecture Notes Computer Science, pp. 278-295.
    • (2005) Lecture Notes Computer Science , vol.3727 , pp. 278-295
    • Böhme, R.1
  • 15
    • 0002878311 scopus 로고
    • Tests based on EDF statistics
    • R. D'Agostino and M. Stephens, Eds. New York: Marcel Dekker
    • M. Stephens, "Tests based on EDF statistics," in Goodness-of-Fit Techniques, R. D'Agostino and M. Stephens, Eds. New York: Marcel Dekker, 1986.
    • (1986) Goodness-of-Fit Techniques
    • Stephens, M.1
  • 16
    • 78649838656 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • presented at the
    • A. Ker, "Batch steganography and pooled steganalysis," presented at the 8th Information Hiding Workshop, 2006.
    • (2006) 8th Information Hiding Workshop
    • Ker, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.