메뉴 건너뛰기




Volumn 4437 LNCS, Issue , 2007, Pages 282-296

On steganographic embedding efficiency

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL EFFICIENCY; EMBEDDED SYSTEMS; IMAGE CODING; MESSAGE PASSING; RANDOM PROCESSES;

EID: 38049181797     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74124-4_19     Document Type: Conference Paper
Times cited : (73)

References (24)
  • 1
    • 38049156045 scopus 로고    scopus 로고
    • Simmons, G.J: The prisoners' problem and the subliminal channel. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology, pp. 51-67.Plenum Press, NewYork (1999)
    • Simmons, G.J: The prisoners' problem and the subliminal channel. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology, pp. 51-67.Plenum Press, NewYork (1999)
  • 2
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Aucsmith, D, ed, IH, Springer, Heidelberg
    • Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306-318. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 3
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis F5 - a steganographic algorithm
    • Moskowitz, I.S, ed, Information Hiding, Springer, Heidelberg
    • Westfeld, A.: High capacity despite better steganalysis F5 - a steganographic algorithm. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 4
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image Graphics 5, 167-190 (2005)
    • (2005) International Journal of Image Graphics , vol.5 , pp. 167-190
    • Sallee, P.1
  • 6
    • 14844285173 scopus 로고    scopus 로고
    • Some notes on steganography
    • available from
    • Crandall, R.: Some notes on steganography. Steganography Mailing List (1998) available from http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
    • (1998) Steganography Mailing List
    • Crandall, R.1
  • 9
    • 84939147125 scopus 로고    scopus 로고
    • Information hiding by coverings
    • Paris, France, 2003
    • Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proceedings ITW 2003, Paris, France, 2003, pp. 151-154 (2003)
    • (2003) Proceedings ITW , pp. 151-154
    • Galand, F.1    Kabatiansky, G.2
  • 12
    • 38049129236 scopus 로고    scopus 로고
    • On crandall's problem. Personal Communication (1998) available from http://www.ws.binghamton.edu/f ridr ich/covcodes.pdf
    • Bierbrauer, J.: On crandall's problem. Personal Communication (1998) available from http://www.ws.binghamton.edu/f ridr ich/covcodes.pdf
    • Bierbrauer, J.1
  • 15
    • 38049174525 scopus 로고    scopus 로고
    • Khatirinejad, M., Lisoněk, P.: Linear codes for high payload steganography. In: AAECC-16, Las Vegas, Nevada, February 20-24, 2006 (2006)
    • Khatirinejad, M., Lisoněk, P.: Linear codes for high payload steganography. In: AAECC-16, Las Vegas, Nevada, February 20-24, 2006 (2006)
  • 16
    • 33746613626 scopus 로고    scopus 로고
    • Ker, A.: A general framework for structural analysis of LSB replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, 3727, pp. 296-311. Springer, Heidelberg (2005)
    • Ker, A.: A general framework for structural analysis of LSB replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 296-311. Springer, Heidelberg (2005)
  • 17
    • 21844461602 scopus 로고    scopus 로고
    • Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain
    • Delp, E, Wong, P.W, eds, San Jose, CA, January 16-20, 5681, pp
    • Soukal, D., Fridrich, J., Goljan, M.: Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16-20, 2005, vol. 5681, pp. 595-606 (2005)
    • (2005) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents , vol.7 , pp. 595-606
    • Soukal, D.1    Fridrich, J.2    Goljan, M.3
  • 20
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12, 441-444 (2005)
    • (2005) IEEE Signal Processing Letters , vol.12 , pp. 441-444
    • Ker, A.D.1
  • 23
    • 14844321910 scopus 로고    scopus 로고
    • Perturbed quantization steganography using wet paper codes
    • Dittman, J, Fridrich, J, eds, Magdeburg, Germany, September 20-21, ACM Press, New York
    • Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography using wet paper codes. In: Dittman, J., Fridrich, J. (eds.) Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004, pp. 4-15. ACM Press, New York (2004)
    • (2004) Proceedings ACM Multimedia and Security Workshop , pp. 4-15
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 24
    • 33749453642 scopus 로고    scopus 로고
    • Lossy source encoding via message-passing and decimation over generalized codewords of LDGM codes
    • Adelaide, Australia
    • Wainwright, M.J., Maneva, E.: Lossy source encoding via message-passing and decimation over generalized codewords of LDGM codes. In: Proceedings of the International Symposium on Information Theory, Adelaide, Australia 2005 (2005)
    • (2005) Proceedings of the International Symposium on Information Theory
    • Wainwright, M.J.1    Maneva, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.