메뉴 건너뛰기




Volumn 6819, Issue , 2008, Pages

Embedding considering dependencies between pixels

Author keywords

Image processing; Model; Steganography

Indexed keywords

CRYPTOGRAPHY; IMAGE PROCESSING; MATHEMATICAL MODELS; PIXELS;

EID: 42949119241     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.766709     Document Type: Conference Paper
Times cited : (11)

References (14)
  • 2
    • 84892764719 scopus 로고    scopus 로고
    • Attacks on steganographic systems
    • Proc. of Information Hiding, 3rd Int. Workshop, A. Pfitzmann, ed, pp, Springer
    • A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Proc. of Information Hiding, 3rd Int. Workshop, A. Pfitzmann, ed., pp. 61-76, Springer, LNCS 1768, 2000.
    • (2000) LNCS , vol.1768 , pp. 61-76
    • Westfeld, A.1    Pfitzmann, A.2
  • 3
    • 84947277755 scopus 로고    scopus 로고
    • T. Sharp, An implementation of key-based digital signal steganography, in Proc. of Information Hiding, 4th Int. Workshop, I. S. Moskowitz, ed., pp. 13-U26, Springer, LNCS 2137, 2001.
    • T. Sharp, "An implementation of key-based digital signal steganography," in Proc. of Information Hiding, 4th Int. Workshop, I. S. Moskowitz, ed., pp. 13-U26, Springer, LNCS 2137, 2001.
  • 4
    • 0242408734 scopus 로고    scopus 로고
    • Digital image steganography using stochastic modulation
    • J. Fridrich and M. Goljan, "Digital image steganography using stochastic modulation," in Proc. of EI SPIE, Canada, pp. 191-202, 2003.
    • (2003) Proc. of EI SPIE, Canada , pp. 191-202
    • Fridrich, J.1    Goljan, M.2
  • 5
    • 35048819204 scopus 로고    scopus 로고
    • Model based steganography
    • International Workshop on Digital Watermarking, Y. M. R. e. T. Kalker, I.J. Cox, ed, pp, Springer
    • P. Sallee, "Model based steganography," in International Workshop on Digital Watermarking, Y. M. R. e. T. Kalker, I.J. Cox, ed., pp. 154-167, Springer, LNCS 2939, 2004.
    • (2004) LNCS , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 6
    • 33749598442 scopus 로고    scopus 로고
    • R. Böhme and A. Westfeld, Breaking cauchy model-based jpeg steganography with first order statistics, in ESORICS 2004, P. S. et al., ed., pp. 125-140, Springer, LNCS 3193, 2004.
    • R. Böhme and A. Westfeld, "Breaking cauchy model-based jpeg steganography with first order statistics," in ESORICS 2004, P. S. et al., ed., pp. 125-140, Springer, LNCS 3193, 2004.
  • 7
    • 33646169148 scopus 로고    scopus 로고
    • J. He, J. Huang, and G. Qiu, A new approach to estimating hidden message length in stochastic modulation steganography, in IWDW 2005, M. B. et al., ed., pp. 1-12, Springer, LNCS 3710, 2005.
    • J. He, J. Huang, and G. Qiu, "A new approach to estimating hidden message length in stochastic modulation steganography," in IWDW 2005, M. B. et al., ed., pp. 1-12, Springer, LNCS 3710, 2005.
  • 9
    • 33746629811 scopus 로고    scopus 로고
    • E. Franz and A. Schneidewind, Pre-processing for adding noise steganography, in Proc. of Information Hiding, 7th International Workshop, M. B. et al., ed., pp. 189-203, Springer, LNCS 3727, 2005.
    • E. Franz and A. Schneidewind, "Pre-processing for adding noise steganography," in Proc. of Information Hiding, 7th International Workshop, M. B. et al., ed., pp. 189-203, Springer, LNCS 3727, 2005.
  • 11
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • 6th Information Hiding Workshop, J. Fridrich, ed, Springer
    • J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in 6th Information Hiding Workshop, J. Fridrich, ed., Springer, LNCS 3200, 2004.
    • (2004) LNCS , vol.3200
    • Fridrich, J.1
  • 13
    • 38049166461 scopus 로고    scopus 로고
    • Y. Q. Shi, C. Chen, and W. Chen, A markov process based approach to effective attacking JPEG steganography, in Proc. of Information Hiding, 8th Int. Workshop, N. J. et al., ed., pp. 249-264, Springer, 2006.
    • Y. Q. Shi, C. Chen, and W. Chen, "A markov process based approach to effective attacking JPEG steganography," in Proc. of Information Hiding, 8th Int. Workshop, N. J. et al., ed., pp. 249-264, Springer, 2006.
  • 14
    • 0004064292 scopus 로고    scopus 로고
    • Detecting steganographic messages in digital images,
    • Dartmouth College, Computer Science
    • H. Farid, "Detecting steganographic messages in digital images," tech. rep., Dartmouth College, Computer Science, 2001.
    • (2001) tech. rep
    • Farid, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.