메뉴 건너뛰기




Volumn 3, Issue 2, 2008, Pages 247-258

Detection of double-compression in JPEG images for applications in steganography

Author keywords

Double compression; Forensics; JPEG; Steganography; Stegen analysis

Indexed keywords

CLASSIFICATION (OF INFORMATION); FEATURE EXTRACTION; IMAGE QUALITY; MAXIMUM LIKELIHOOD ESTIMATION; SUPPORT VECTOR MACHINES;

EID: 44049087452     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.922456     Document Type: Article
Times cited : (256)

References (18)
  • 1
    • 44049093833 scopus 로고    scopus 로고
    • Online, Available
    • J. Hide&Seek. [Online]. Available: http://linux01.gwdg.de/~alatham/ stego.html.
    • J. Hide&Seek
  • 2
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C. J. C. Surges, "A tutorial on support vector machines for pattern recognition," Data Mining Knowl. Discovery, vol. 2, no. 2, pp. 121-167, 1998.
    • (1998) Data Mining Knowl. Discovery , vol.2 , Issue.2 , pp. 121-167
    • Surges, C.J.C.1
  • 3
    • 0038005383 scopus 로고    scopus 로고
    • Identification of bitmap compression history: JPEG detection and quantizer estimation
    • Feb
    • Z. Fan and R. L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol. 12, no. 2, pp. 30-235, Feb. 2003.
    • (2003) IEEE Trans. Image Process , vol.12 , Issue.2 , pp. 30-235
    • Fan, Z.1    de Queiroz, R.L.2
  • 4
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • Proc. Information Hiding, 6th Int. Workshop
    • J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," Proc. Information Hiding, 6th Int. Workshop, ser. Lecture Notes Comput. Sci., vol. 3200, pp. 67-81, 2005.
    • (2005) ser. Lecture Notes Comput. Sci , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 5
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG images: Breaking the F5 algorithm
    • Information Hiding, 5th Int. Workshop
    • J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," Information Hiding, 5th Int. Workshop, ser. Lecture Notes Comput. Sci., vol. 2578, pp. 310-323, 2002.
    • (2002) ser. Lecture Notes Comput. Sci , vol.2578 , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 6
    • 35048849011 scopus 로고    scopus 로고
    • Estimation of primary quantization matrix in double compressed JPEG images
    • presented at the, Cleveland, OH
    • J. Fridrich and J. Lukáš, "Estimation of primary quantization matrix in double compressed JPEG images," presented at the Digital Forensic Research Workshop, Cleveland, OH, 2003.
    • (2003) Digital Forensic Research Workshop
    • Fridrich, J.1    Lukáš, J.2
  • 7
    • 34250355507 scopus 로고    scopus 로고
    • D. Fu, Y. Q. Shi, and Q. Su, A generalized Benford's law for JPEG coefficients and its applications in image forensics, in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents IX, 2007, 6505, pp. 1L1-1L11.
    • D. Fu, Y. Q. Shi, and Q. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents IX, 2007, vol. 6505, pp. 1L1-1L11.
  • 8
    • 33645695370 scopus 로고    scopus 로고
    • A graph-theoretic approach to steganography, Communications and Multimedia Security. 9th IFIP TC-6 TC-11 Int. Conf, ser
    • S. Hetzl and P. Mutzel, "A graph-theoretic approach to steganography," Communications and Multimedia Security. 9th IFIP TC-6 TC-11 Int. Conf, ser. Lecture Notes Comput. Sci., vol. 3677, pp. 119-128, 2005.
    • (2005) Lecture Notes Comput. Sci , vol.3677 , pp. 119-128
    • Hetzl, S.1    Mutzel, P.2
  • 12
    • 27844572456 scopus 로고    scopus 로고
    • Statistical tools for digital image forensics,
    • Ph.D.dissertation, Dartmouth College, Hanover, NH, Dec
    • A. C. Popescu, "Statistical tools for digital image forensics," Ph.D.dissertation, Dartmouth College, Hanover, NH, Dec. 2004.
    • (2004)
    • Popescu, A.C.1
  • 13
    • 35048816032 scopus 로고    scopus 로고
    • Statistical tools for digital forensics
    • Information Hiding, 6th Int. Workshop
    • A. C. Popescu and H. Farid, "Statistical tools for digital forensics," Information Hiding, 6th Int. Workshop, ser. Lecture Notes Comput. Sci., vol. 3200, pp. 128-147.
    • ser. Lecture Notes Comput. Sci , vol.3200 , pp. 128-147
    • Popescu, A.C.1    Farid, H.2
  • 14
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIXSecurity Symp., 2001, pp. 323-335.
    • (2001) Proc. 10th USENIXSecurity Symp , pp. 323-335
    • Provos, N.1
  • 15
    • 35048819204 scopus 로고    scopus 로고
    • Model based steganography., International Workshop on Digital Watermarking, ser
    • P. Sallee, "Model based steganography.," International Workshop on Digital Watermarking, ser. Lecture Notes Comput. Sci., vol. 2939, pp. 154-167, 2004.
    • (2004) Lecture Notes Comput. Sci , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 16
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • P. Sallee, "Model-based methods for steganography and steganalysis," Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
    • (2005) Int. J. Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 17
    • 33750927408 scopus 로고    scopus 로고
    • Exposing digital forgeries in video by detecting double MPEG compression
    • W. Wang and H. Farid, J. Dittmann and J. Fridrich, Eds, New York, pp
    • W. Wang and H. Farid, J. Dittmann and J. Fridrich, Eds., "Exposing digital forgeries in video by detecting double MPEG compression," in Proc. ACM Multimedia Security Workshop, New York, pp. 37-47.
    • Proc. ACM Multimedia Security Workshop , pp. 37-47
  • 18
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5 a steganographic algorithm
    • Information Hiding, 4th International Workshop
    • A. Westfeld, "High capacity despite better steganalysis (F5 a steganographic algorithm," Information Hiding, 4th International Workshop, ser. Lecture Notes Comput. Sci., vol. 2137, pp. 289-302, 2001.
    • (2001) ser. Lecture Notes Comput. Sci , vol.2137 , pp. 289-302
    • Westfeld, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.