메뉴 건너뛰기




Volumn 5, Issue , 2004, Pages 4066-4069

Steganalysis based on wavelet texture analysis and neural network

Author keywords

Neural network; Steganalysis; Wavelet

Indexed keywords

GENERALIZED GAUSSIAN DISTRIBUTION (GGD); HUMAN VISUAL SYSTEM (HVS); LEAST SIGNIFICANT BIT (LSB); STEGANALYSIS; SUPPORT VECTOR MACHINE (SVM); WAVELET TEXTURE ANALYSIS;

EID: 4444292018     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (23)
  • 3
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • Springer-Verlag, Berlin
    • N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," Lecture Notes in Computer Science, vol.1525, Springer-Verlag, Berlin, 273-289, 1998
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 9
    • 0034787093 scopus 로고    scopus 로고
    • Reliable detection of LSB steganography in grayscale and color images
    • Special Session on Multimedia Security and Watermarking
    • J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in grayscale and color images". Proceeding of ACM, Special Session on Multimedia Security and Watermarking. 2001, 27-30
    • (2001) Proceeding of ACM , pp. 27-30
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 10
    • 0038675417 scopus 로고    scopus 로고
    • A fast and effective steganalytic technique against JSteg-like algorithms
    • March 9 to 12, Melbourne, Florida, USA
    • Tao Zhang, Xijian Ping. "A fast and effective steganalytic technique against JSteg-like algorithms". Proceedings of ACM Symposium on Applied Computing, March 9 to 12, 2003, Melbourne, Florida, USA
    • (2003) Proceedings of ACM Symposium on Applied Computing
    • Zhang, T.1    Ping, X.2
  • 11
    • 0041821327 scopus 로고    scopus 로고
    • A new approach to reliable detection of LSB steganography in natural images
    • Tao Zhang, Xijian Ping. "A new approach to reliable detection of LSB steganography in natural images". Signal Processing Vol 83; 2085-2093, 2003
    • (2003) Signal Processing , vol.83 , pp. 2085-2093
    • Zhang, T.1    Ping, X.2
  • 12
    • 0031996445 scopus 로고    scopus 로고
    • Steganography: Seeing the unseen
    • February, 26-34
    • N. F. Johnson and S. Jajodia, "Steganography: Seeing the Unseen," IEEE Computer, February, 26-34, 1998
    • (1998) IEEE Computer
    • Johnson, N.F.1    Jajodia, S.2
  • 13
    • 0036034444 scopus 로고    scopus 로고
    • Practical steganalysis of digital images - State of the art
    • Jessica Fridrich, Miroslav Goljan. "Practical Steganalysis of digital images - state of the art". SPIE, vol 4675: 1-13, 2002
    • (2002) SPIE , vol.4675 , pp. 1-13
    • Fridrich, J.1    Goljan, M.2
  • 14
    • 0011994605 scopus 로고    scopus 로고
    • Detecting steganographic content on the internet
    • N. Provos and Peter Honeyman, "Detecting steganographic content on the internet", CITI Technical Report 1-11, 2001
    • (2001) CITI Technical Report , vol.1 , Issue.11
    • Provos, N.1    Honeyman, P.2
  • 15
    • 0036035145 scopus 로고    scopus 로고
    • StegoWall: Blind statistical detection of hidden data
    • Voloshynovskiy, S.,Herrigel and Rytsar Y. "StegoWall: blind statistical detection of hidden data". Proceedings of SPIE. Vol. 4675:57-68.2002
    • (2002) Proceedings of SPIE , vol.4675 , pp. 57-68
    • Voloshynovskiy, S.1    Herrigel2    Rytsar, Y.3
  • 16
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington, DC, August
    • N. Provos, "Defending against statistical steganalysis", 10th USENIX Security Symposium, Washington, DC, August 2001
    • (2001) 10th USENIX Security Symposium
    • Provos, N.1
  • 18
    • 0035766166 scopus 로고    scopus 로고
    • Steganalysis based on JPEG compatibility
    • A.Tescher, B.Vasudev, and Jr. V.M. Bove, editors, Special session on theoretical and practical issues in digital watermarking and data hiding. SPIE Multimedia systems and applications IV
    • J.Fridrich, M.Goljan, and R.Du. "Steganalysis based on JPEG compatibility". In A.Tescher, B.Vasudev, and Jr. V.M. Bove, editors, SPIE vol.4518, Special session on theoretical and practical issues in digital watermarking and data hiding. SPIE Multimedia systems and applications IV. Pp:275-280, 1998
    • (1998) SPIE , vol.4518
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 19
    • 0036474679 scopus 로고    scopus 로고
    • Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance
    • Minh N. Do, Martin Vetterli. "Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance". IEEE Transactions on Image Processing. 2002, Vol 11(2): 146-158
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.2 , pp. 146-158
    • Do, M.N.1    Vetterli, M.2
  • 21
    • 0035251780 scopus 로고    scopus 로고
    • Implementations of quantization index modulation methods for digital watermarking and information embedding of multimedia
    • Special Issue on Multimedia
    • B. Chen and G. W. Wornell. "Implementations of quantization index modulation methods for digital watermarking and information embedding of multimedia". Special Issue on Multimedia Signal Processing, vol. 27:7-33, 2001
    • (2001) Signal Processing , vol.27 , pp. 7-33
    • Chen, B.1    Wornell, G.W.2
  • 22
    • 0035485860 scopus 로고    scopus 로고
    • Diversity and attack characterization for improved robust watermarking
    • D. Kundur, D. Hatzinakos,"Diversity and attack characterization for improved robust watermarking". IEEE Transactions on Signal Processing. Vol. 49 (10): 2383-2396, 2001
    • (2001) IEEE Transactions on Signal Processing , vol.49 , Issue.10 , pp. 2383-2396
    • Kundur, D.1    Hatzinakos, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.