메뉴 건너뛰기




Volumn 6505, Issue , 2007, Pages

Merging Markov and DCT features for multi-class JPEG steganalysis

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DISCRETE COSINE TRANSFORMS; FEATURE EXTRACTION; MARKOV PROCESSES; MERGING; SUPPORT VECTOR MACHINES;

EID: 34548232251     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.696774     Document Type: Conference Paper
Times cited : (475)

References (23)
  • 1
    • 34548286379 scopus 로고    scopus 로고
    • JP Hide&Seek. http://linux01.gwdg.de/~alatham/stego.html.
    • JP Hide&Seek
  • 2
    • 85086953243 scopus 로고    scopus 로고
    • Outguess ver. 0.2
    • Outguess ver. 0.2. http:\\www.outguess.org.
  • 4
    • 0035791440 scopus 로고    scopus 로고
    • I. Avcibas, N. Memon, and B. Sankur. Steganalysis using image quality metrics. In E. Delp and P. W. Wong, editors, Proceeedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents III, 4314, pages 523-531, 2001.
    • I. Avcibas, N. Memon, and B. Sankur. Steganalysis using image quality metrics. In E. Delp and P. W. Wong, editors, Proceeedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, pages 523-531, 2001.
  • 6
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Christopher J. C. Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2(2):121-167, 1998.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 7
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • D. Aucsmith, editor, Information Hiding, 2nd International Workshop, of
    • C. Cachin. An information-theoretic model for steganography. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 306-318, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 9
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • F.A.P. Petitcolas, editor, Information Hiding, 5th International Workshop, of
    • H. Farid and L. Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F.A.P. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 340-354, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 340-354
    • Farid, H.1    Siwei, L.2
  • 10
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • J. Fridrich, editor, Information Hiding, 6th International Workshop, of
    • J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J. Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67-81, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 11
    • 33646167860 scopus 로고    scopus 로고
    • Towards multi-class blind steganalyzer for JPEG images
    • M. Barni, I. Cox, T. Kalker, and H. J. Kim, editors, 4th International Data Hiding Workshop, of
    • J. Fridrich and T. Pevný. Towards multi-class blind steganalyzer for JPEG images. In M. Barni, I. Cox, T. Kalker, and H. J. Kim, editors, 4th International Data Hiding Workshop, volume 3710 of Lecture Notes in Computer Science, pages 39-53, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3710 , pp. 39-53
    • Fridrich, J.1    Pevný, T.2
  • 14
    • 33645695370 scopus 로고    scopus 로고
    • A graph-theoretic approach to steganography
    • J. Dittmann et al, editor, Communications and Multimedia Security. 9th IFIP TC-6 TC-11 International Conference, of
    • S. Hetzl and P. Mutzel. A graph-theoretic approach to steganography. In J. Dittmann et al., editor, Communications and Multimedia Security. 9th IFIP TC-6 TC-11 International Conference, volume 3677 of Lecture Notes in Computer Science, pages 119-128, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3677 , pp. 119-128
    • Hetzl, S.1    Mutzel, P.2
  • 15
    • 0013109655 scopus 로고    scopus 로고
    • A comparison of methods for multi-class support vector machines
    • Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan
    • C. Hsu and C. Lin. A comparison of methods for multi-class support vector machines. Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan, 2001. http://citeseer.ist.psu.edu/hsu01comparison.html.
    • (2001)
    • Hsu, C.1    Lin, C.2
  • 16
    • 8844256156 scopus 로고    scopus 로고
    • S. Lyu and H. Farid. Steganalysis using color wavelet statistics and one-class support vector machines. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, 5306, pages 35-45, 2004.
    • S. Lyu and H. Farid. Steganalysis using color wavelet statistics and one-class support vector machines. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 35-45, 2004.
  • 17
    • 33645693950 scopus 로고    scopus 로고
    • P. Moulin and Y. Wang. Statistical modeling and steganalysis of DFT-based image steganography. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, 6072, pages 607202-1-607202-11, 2006.
    • P. Moulin and Y. Wang. Statistical modeling and steganalysis of DFT-based image steganography. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 607202-1-607202-11, 2006.
  • 19
    • 35048819204 scopus 로고    scopus 로고
    • Model based steganography
    • Kalker, I.J. Cox, and Yong Man Ro, editors, International Workshop on Digital Watermarking, of
    • P. Sallee. Model based steganography. In Kalker, I.J. Cox, and Yong Man Ro, editors, International Workshop on Digital Watermarking, volume 2939 of Lecture Notes in Computer Science, pages 154-167, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 20
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • Phil Sallee. Model-based methods for steganography and steganalysis. Int. J. Image Graphics, 5(1):167-190, 2005.
    • (2005) Int. J. Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 22
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5 a steganographic algorithm)
    • I.S. Moskowitz, editor, Information Hiding, 4th International Workshop, of
    • A. Westfeld. High capacity despite better steganalysis (F5 a steganographic algorithm). In I.S. Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 289-302, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 23
    • 33746647772 scopus 로고    scopus 로고
    • Steganalysis based on multiple features formed by statistical moments of wavelet characteristic function
    • M. Barni, editor, Information Hiding. 7th International Workshop, of
    • G. Xuan, Y.Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic function. In M. Barni, editor, Information Hiding. 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 262-277, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3727 , pp. 262-277
    • Xuan, G.1    Shi, Y.Q.2    Gao, J.3    Zou, D.4    Yang, C.5    Zhang, Z.6    Chai, P.7    Chen, C.8    Chen, W.9


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.