메뉴 건너뛰기




Volumn 178, Issue 1, 2008, Pages 21-36

Image complexity and feature mining for steganalysis of least significant bit matching steganography

Author keywords

Classification; Correlation; Image complexity; LSB matching steganography; Steganalysis

Indexed keywords

COMPUTATIONAL COMPLEXITY; CORRELATION THEORY; CRYPTOGRAPHY; PATTERN MATCHING;

EID: 34948833733     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2007.08.007     Document Type: Article
Times cited : (81)

References (52)
  • 3
    • 21844452953 scopus 로고    scopus 로고
    • M. Choubassi, P. Moulin, A new sensitivity analysis attack, in: E. Delp III, P. Wong (Eds.), Security, Steganography, and Watermarking of Multimedia Contents, VII, in: Proceedings of SPIE-IS&T Electronic Imaging, SPIE vol. 5681, 2005, pp. 734-745.
  • 6
    • 35248901820 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • Information-Hiding, Fifth International Workshop. Petitcolas F.A.P. (Ed), Springer-Verlag, New York
    • Dumitrescu S., Wu X., and Wang Z. Detection of LSB steganography via sample pair analysis. In: Petitcolas F.A.P. (Ed). Information-Hiding, Fifth International Workshop. Lecture Notes in Computer Science vol. 2578 (2002), Springer-Verlag, New York 355-372
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 355-372
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 7
    • 0242408734 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, Digital image steganography using stochastic modulation, in: E. Delp (Ed.), Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V 5020, 2003, pp. 191-202.
  • 8
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG Images: breaking the F5 algorithm
    • Information-Hiding. Petitcolas F.A.P. (Ed), Springer-Verlag, New York
    • Fridrich J., Goljan M., and Hogea D. Steganalysis of JPEG Images: breaking the F5 algorithm. In: Petitcolas F.A.P. (Ed). Information-Hiding. Lecture Notes in Computer Science vol. 2578 (2002), Springer-Verlag, New York 310-323
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 9
    • 1442360452 scopus 로고    scopus 로고
    • Quantitative steganalysis: estimating secret message length
    • (Special Issue on Multimedia Security)
    • Fridrich J., Goljan M., Hogea D., and Soukal D. Quantitative steganalysis: estimating secret message length. ACM Multimedia Systems Journal 9 3 (2003) 288-302 (Special Issue on Multimedia Security)
    • (2003) ACM Multimedia Systems Journal , vol.9 , Issue.3 , pp. 288-302
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3    Soukal, D.4
  • 10
    • 21844461602 scopus 로고    scopus 로고
    • J. Fridrich, D. Soukal, M. Goljan, Maximum likelihood estimation of length of secret message embedding using ±K steganography in spatial domain, security, steganography, and watermarking of multimedia contents, VII, in: Proceedings of SPIE-IS &T Electronic Imaging, SPIE vol. 5681, 2005, pp. 595-606.
  • 11
    • 0034164230 scopus 로고    scopus 로고
    • Additive logistic regression: a statistical view of boosting
    • Friedman J., Hastie T., and Tibshirani R. Additive logistic regression: a statistical view of boosting. The Annals of Statistics 38 2 (2000) 337-374
    • (2000) The Annals of Statistics , vol.38 , Issue.2 , pp. 337-374
    • Friedman, J.1    Hastie, T.2    Tibshirani, R.3
  • 12
    • 33644685216 scopus 로고    scopus 로고
    • A fragile watermarking scheme for detecting malicious modifications of database relations
    • Guo H., Li Y., Liu A., and Jajodia S. A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences 176 10 (2006) 1350-1378
    • (2006) Information Sciences , vol.176 , Issue.10 , pp. 1350-1378
    • Guo, H.1    Li, Y.2    Liu, A.3    Jajodia, S.4
  • 13
    • 33749679756 scopus 로고    scopus 로고
    • Chaining watermarks for detecting malicious modifications to streaming data
    • Guo H., Li Y., and Jajodia S. Chaining watermarks for detecting malicious modifications to streaming data. Information Sciences 177 1 (2007) 281-298
    • (2007) Information Sciences , vol.177 , Issue.1 , pp. 281-298
    • Guo, H.1    Li, Y.2    Jajodia, S.3
  • 14
    • 0036161259 scopus 로고    scopus 로고
    • Gene selection for cancer classification using support vector machines
    • Guyon I., Weston J., Barnhill S., and Vapnik V. Gene selection for cancer classification using support vector machines. Machine Learning 46 1-3 (2002) 389-422
    • (2002) Machine Learning , vol.46 , Issue.1-3 , pp. 389-422
    • Guyon, I.1    Weston, J.2    Barnhill, S.3    Vapnik, V.4
  • 15
    • 0242576328 scopus 로고    scopus 로고
    • J. Harmsen, W. Pearlman, Steganalysis of additive noise modelable information-hiding, in: E. Delp III, P. Wong (Eds.), Security, Steganography, and Watermarking of Multimedia Contents V, Proceedings of the SPIE, vol. 5020, 2003, pp. 131-142.
  • 17
    • 33646134392 scopus 로고    scopus 로고
    • T. Holotyak, J. Fridrich, S. Voloshynovskiy, Blind statistical steganalysis of additive steganography using wavelet higher order statistics, in: Proceedings of the Ninth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 2005, pp. 273-274.
  • 18
    • 0032681789 scopus 로고    scopus 로고
    • J. Huang, D. Mumford, Statistics of natural images and models, 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'99) - vol. 1, 1999, doi:10.1109/CVPR.1999.786990.
  • 20
    • 35048891531 scopus 로고    scopus 로고
    • Improved detection of LSB steganography in grayscale images
    • Information-Hiding. Fridrich (Ed), Springer-Verlag, New York
    • Ker A. Improved detection of LSB steganography in grayscale images. In: Fridrich (Ed). Information-Hiding. Sixth International Workshop, Lecture Notes in Computer Science vol. 3200 (2005), Springer-Verlag, New York 97-115
    • (2005) Sixth International Workshop, Lecture Notes in Computer Science , vol.3200 , pp. 97-115
    • Ker, A.1
  • 21
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • Ker A. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12 6 (2005) 441-444
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.1
  • 22
    • 85055811894 scopus 로고    scopus 로고
    • C. Kurak, J. McHugh, A cautionary note on image downgrading, in: Proceedings of the 8th Computer Security Application Conference, 1992, pp. 153-159.
  • 23
    • 40649108871 scopus 로고    scopus 로고
    • Q. Liu, A. Sung, Recursive feature addition for gene selection, in: Proceedings of 19th International Joint Conference on Neural Networks, 2006, pp. 2339-2346.
  • 24
    • 34047217902 scopus 로고    scopus 로고
    • Q. Liu, A. Sung, J. Xu, B.M. Ribeiro, Image complexity and feature extraction for steganalysis of LSB matching steganography, in: Proceedings of 18th International Conference on Pattern Recognition, vol. 2, 2006, pp. 267-270.
  • 25
    • 34047232478 scopus 로고    scopus 로고
    • Ribeiro B., et al. (Ed), Springer, Wien/NewYork
    • Liu Q., Sung A., and Ribeiro B. In: Ribeiro B., et al. (Ed). Statistical Correlations and Machine Learning for Steganalysis. Adaptive and Natural Computing Algorithms (2005), Springer, Wien/NewYork 437-440
    • (2005) Adaptive and Natural Computing Algorithms , pp. 437-440
    • Liu, Q.1    Sung, A.2    Ribeiro, B.3
  • 26
    • 34948828260 scopus 로고    scopus 로고
    • Q. Liu, A. Sung, J. Xu, V. Venkataramana, Detect JPEG steganography using polynomial fitting, in: Proceedings of the 16th artificial neural networks in engineering, 2006, pp. 547-556.
  • 27
    • 8844256156 scopus 로고    scopus 로고
    • S. Lyu, H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, in: SPIE Symposium on Electronic Imaging, San Jose, CA, 2004.
  • 32
    • 20444456703 scopus 로고    scopus 로고
    • P. Moulin, A. Briassouli, A stochastic QIM algorithm for robust, undetectable image watermarking, in: Proceedings of ICIP 2004, vol. 2, 2004, pp. 1173-1176.
  • 33
    • 0032662774 scopus 로고    scopus 로고
    • Analysis of multiresolution image denoising schemes using generalized Gaussian and complexity priors
    • Moulin P., and Liu J. Analysis of multiresolution image denoising schemes using generalized Gaussian and complexity priors. IEEE Transactions on Information Theory 45 (1999) 909-919
    • (1999) IEEE Transactions on Information Theory , vol.45 , pp. 909-919
    • Moulin, P.1    Liu, J.2
  • 34
    • 33645660635 scopus 로고    scopus 로고
    • T. Pevny, J. Fridrich, Multiclass blind steganalysis for JPEG images, in: Proceedings of the SPIE Electronic Imaging Security, Steganography, and Watermarking of Multimedia Contents, vol. VIII, 2006, San Jose, CA, pp. 257-269.
  • 35
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: an introduction to steganography
    • Provos N., and Honeyman P. Hide and seek: an introduction to steganography. IEEE Security & Privacy 1 3 (2003) 32-44
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 36
    • 0033354560 scopus 로고    scopus 로고
    • M. Ramkumar, A. Akansu, A. Alatan, A. Robust, Data hiding scheme for digital images using DFT, in: Proceedings of IEEE ICIP, vol. II, 1999, pp. 211-215.
  • 38
    • 0033281701 scopus 로고    scopus 로고
    • Improved boosting algorithms using confidence-rated predictions
    • Schapire R., and Singer Y. Improved boosting algorithms using confidence-rated predictions. Machine Learning 37 3 (1999) 297-336
    • (1999) Machine Learning , vol.37 , Issue.3 , pp. 297-336
    • Schapire, R.1    Singer, Y.2
  • 40
    • 0029251559 scopus 로고
    • Estimation of shape parameter for generalized gaussian distributions in subband decompositions of video
    • Sharifi K., and Leon-Garcia A. Estimation of shape parameter for generalized gaussian distributions in subband decompositions of video. IEEE Transactions Circuits on System and Video Technology 5 (1995) 52-56
    • (1995) IEEE Transactions Circuits on System and Video Technology , vol.5 , pp. 52-56
    • Sharifi, K.1    Leon-Garcia, A.2
  • 41
    • 84947277755 scopus 로고    scopus 로고
    • T. Sharp, An implementation of key-based digital signal steganography, in: I. Moskowitz (Ed.), Information-Hiding. Fourth International Workshop, Lecture Notes in Computer Science, vol. 2137, Springer-Verlag, New York, 2001, pp. 13-26.
  • 43
    • 33645157313 scopus 로고    scopus 로고
    • Gene selection algorithms for microarray data based on least square support vector machine
    • 10.1186/1471-2105-7-95
    • Tang E.K., Suganthan P.N., and Yao X. Gene selection algorithms for microarray data based on least square support vector machine. BMC Bioinformatics 7 95 (2006) 10.1186/1471-2105-7-95
    • (2006) BMC Bioinformatics , vol.7 , Issue.95
    • Tang, E.K.1    Suganthan, P.N.2    Yao, X.3
  • 48
    • 84937814312 scopus 로고    scopus 로고
    • A. Westfeld, High capacity despite better steganalysis (F5-A Steganographic Algorithm), in: Proceedings of the Fourth Information-Hiding Workshop, Lecture Notes in Computer Science, vol. 2137, 2001, pp. 289-302.
  • 50
    • 0032643166 scopus 로고    scopus 로고
    • Statistical texture characterization from discrete wavelet representations
    • Wouwer G., Scheunders P., and Dyck D. Statistical texture characterization from discrete wavelet representations. IEEE Transactions on Image Processing 8 4 (1999) 592-598
    • (1999) IEEE Transactions on Image Processing , vol.8 , Issue.4 , pp. 592-598
    • Wouwer, G.1    Scheunders, P.2    Dyck, D.3
  • 51
    • 3042547051 scopus 로고    scopus 로고
    • J. Xu, A. Sung, P. Shi, Q. Liu, JPEG compression immune steganography using wavelet transform, in: International Conference on Information Technology: Coding and Computing, 2004. Proceedings (ITCC 2004), vol. 2, 2004, pp. 704-708.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.