메뉴 건너뛰기




Volumn 2578, Issue , 2003, Pages 258-277

A steganographic embedding undetectable by JPEG compatibility steganalysis

Author keywords

[No Author keywords available]

Indexed keywords

ENCODING (SYMBOLS);

EID: 35248875661     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36415-3_17     Document Type: Article
Times cited : (11)

References (26)
  • 1
    • 84955563192 scopus 로고    scopus 로고
    • Stretching the limits of steganography
    • R. Anderson, editor, Information Hiding 1996, Springer
    • R. Anderson. Stretching the limits of steganography. In R. Anderson, editor, Information Hiding 1996, volume LNCS 1174, pages 39-48. Springer, 1996.
    • (1996) LNCS , vol.1174 , pp. 39-48
    • Anderson, R.1
  • 7
    • 0003482562 scopus 로고    scopus 로고
    • Information hiding: Steganography and watermarking - Attacks and countermeasures
    • Kluwer Academic Publishers
    • N. F. Johnson, Z. Duric, and S. Jajodia. Information hiding: Steganography and watermarking - attacks and countermeasures. In Advances in Information Security 1. Kluwer Academic Publishers, 2001.
    • (2001) Advances in Information Security , vol.1
    • Johnson, N.F.1    Duric, Z.2    Jajodia, S.3
  • 9
    • 4544223199 scopus 로고    scopus 로고
    • Modeling digital image into informative and noise-like regions by complexity measure
    • IOS Press, April
    • E. Kawaguchi and M. Niimi. Modeling digital image into informative and noise-like regions by complexity measure. In Information Modeling and Knowledge Bases IX, pages 255-265. IOS Press, April 1998.
    • (1998) Information Modeling and Knowledge Bases IX , pp. 255-265
    • Kawaguchi, E.1    Niimi, M.2
  • 11
    • 0242697129 scopus 로고    scopus 로고
    • An adaptive image steganographic model based on minimum-error lsb replacement
    • Taichung, Taiwan, 14-15 May
    • Y. Lee and L. Chen. An adaptive image steganographic model based on minimum-error lsb replacement. In Ninth National Conference on Information Security, pages 8-15, Taichung, Taiwan, 14-15 May 1999.
    • (1999) Ninth National Conference on Information Security , pp. 8-15
    • Lee, Y.1    Chen, L.2
  • 14
    • 0033706181 scopus 로고    scopus 로고
    • Compression-compatible fragile and semi-fragile tamper detection
    • San Jose, CA
    • L. M. Marvel, G. W. Hartwig, and C. Boncelet. Compression-compatible fragile and semi-fragile tamper detection. In SPIE EI Photonics West, pages 131-139, San Jose, CA, 2000.
    • (2000) SPIE EI Photonics West , pp. 131-139
    • Marvel, L.M.1    Hartwig, G.W.2    Boncelet, C.3
  • 17
    • 0034593277 scopus 로고    scopus 로고
    • A new paradigm hidden in Steganography
    • Ballycotton, County Cork, Ireland, Sept. ACM
    • I. S. Moskowitz, G. E. Longdon, and L. Chang. A new paradigm hidden in Steganography. In New Security Paradigms Workshop, pages 12-22, Ballycotton, County Cork, Ireland, Sept 2000. ACM
    • (2000) New Security Paradigms Workshop , pp. 12-22
    • Moskowitz, I.S.1    Longdon, G.E.2    Chang, L.3
  • 18
    • 85023816078 scopus 로고    scopus 로고
    • also appears in ed. R Herold, Auerbach Press
    • (also appears in "The Privacy Papers" ed. R Herold, Auerbach Press 2002).
    • (2002) The Privacy Papers
  • 19
    • 0031339457 scopus 로고    scopus 로고
    • An image embedding in image by a complexity based region segmentation method
    • M. Niimi, H. Noda, and E. Kawaguchi. An image embedding in image by a complexity based region segmentation method. In ICIP, volume 3, pages 74-77, 1997.
    • (1997) ICIP , vol.3 , pp. 74-77
    • Niimi, M.1    Noda, H.2    Kawaguchi, E.3
  • 22
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical Steganalysis
    • August
    • N. Provos. Defending against statistical Steganalysis. In 10th USENIX Security Symposium, pages 323-335, August 2001.
    • (2001) 10th USENIX Security Symposium , pp. 323-335
    • Provos, N.1
  • 25
    • 0000044932 scopus 로고    scopus 로고
    • The discrete cosine transform
    • G. Strang. The discrete cosine transform. SIAM Review, 41(1):135-147, 1999.
    • (1999) SIAM Review , vol.41 , Issue.1 , pp. 135-147
    • Strang, G.1
  • 26
    • 84937814312 scopus 로고    scopus 로고
    • F5 - A steganographic algorithm: High capacity despite better steganalysis
    • I. S. Moskowitz (Ed.) Information Hiding, IH 2001, Springer
    • A. Westfeld. F5 - a steganographic algorithm: High capacity despite better steganalysis. In I. S. Moskowitz (Ed.) Information Hiding, LNCS 2137, IH 2001, pages 289-302. Springer, 2001.
    • (2001) LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.