메뉴 건너뛰기




Volumn 88, Issue 9, 2008, Pages 2138-2157

A review on blind detection for image steganography

Author keywords

Blind detection; Digital image; Review; Steganalysis; Steganography

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; FEATURE EXTRACTION; REGRESSION ANALYSIS; SUPPORT VECTOR MACHINES;

EID: 44649098085     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2008.03.016     Document Type: Review
Times cited : (165)

References (82)
  • 1
    • 0036034444 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, Practical steganalysis of digital images-state of the art, in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, 2002, pp. 1-13.
    • J. Fridrich, M. Goljan, Practical steganalysis of digital images-state of the art, in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, 2002, pp. 1-13.
  • 2
    • 0034787093 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in color and grayscale images, in: Proceedings of ACM Workshop Multimedia Security, 2001, pp. 27-30.
    • J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in color and grayscale images, in: Proceedings of ACM Workshop Multimedia Security, 2001, pp. 27-30.
  • 3
    • 0037524382 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • Dumitrescu S., Wu X., and Wang Z. Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. 51 7 (2003) 1995-2007
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.7 , pp. 1995-2007
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 4
    • 0041821327 scopus 로고    scopus 로고
    • A new approach to reliable detection of LSB steganography in natural image
    • Zhang T., and Ping X.J. A new approach to reliable detection of LSB steganography in natural image. Signal Process. 83 10 (2003) 545-548
    • (2003) Signal Process. , vol.83 , Issue.10 , pp. 545-548
    • Zhang, T.1    Ping, X.J.2
  • 5
    • 35048859775 scopus 로고    scopus 로고
    • P.Z. Lu, X.Y. Luo, Q.Y. Tang, S. Li, An improved sample pairs method for detection of LSB embedding, in: Proceedings of 6th Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, 2004, pp. 116-127.
    • P.Z. Lu, X.Y. Luo, Q.Y. Tang, S. Li, An improved sample pairs method for detection of LSB embedding, in: Proceedings of 6th Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, 2004, pp. 116-127.
  • 6
    • 35048835739 scopus 로고    scopus 로고
    • J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in: Proceedings of sixth Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, 2004, pp. 67-81.
    • J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in: Proceedings of sixth Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, 2004, pp. 67-81.
  • 7
    • 33646167860 scopus 로고    scopus 로고
    • T. Pevny, J. Fridrich, Toward multi-class blind steganalyzer for JPEG images, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 3710, Springer, Berlin, 2005, pp. 39-53.
    • T. Pevny, J. Fridrich, Toward multi-class blind steganalyzer for JPEG images, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 3710, Springer, Berlin, 2005, pp. 39-53.
  • 8
    • 2642549992 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, D. Hogea, Attacking the outguess, in: Proceedings of ACM Workshop Multimedia Security, 2002, pp. 3-6.
    • J. Fridrich, M. Goljan, D. Hogea, Attacking the outguess, in: Proceedings of ACM Workshop Multimedia Security, 2002, pp. 3-6.
  • 9
    • 35248884299 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proceedings of fifth International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, 2002, pp. 310-323.
    • J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proceedings of fifth International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, 2002, pp. 310-323.
  • 11
    • 44649114122 scopus 로고    scopus 로고
    • PictureMarc Embed Watermark, v 1.00.45, Copyright 1996, Digimarc Corporation.
    • PictureMarc Embed Watermark, v 1.00.45, Copyright 1996, Digimarc Corporation.
  • 12
    • 44649093482 scopus 로고    scopus 로고
    • M. Kutter, F. Jordan, JK-PGS (Pretty Good Signature). 1998, [Online]. Available: 〈http://www.epfl.ch/~kutter/watermarking/JK_PGS.html〉.
    • M. Kutter, F. Jordan, JK-PGS (Pretty Good Signature). 1998, [Online]. Available: 〈http://www.epfl.ch/~kutter/watermarking/JK_PGS.html〉.
  • 14
    • 44649099702 scopus 로고    scopus 로고
    • Steganos II Security Suite. [Online]. Available: 〈http://www.steganos.com/english/steganos/download.htm〉.
    • Steganos II Security Suite. [Online]. Available: 〈http://www.steganos.com/english/steganos/download.htm〉.
  • 15
    • 44649182944 scopus 로고    scopus 로고
    • A. Brown, S-tools version 4.0. [Online]. Available: 〈http://members.tripod.com/steganography/stego/s-tools4.html〉.
    • A. Brown, S-tools version 4.0. [Online]. Available: 〈http://members.tripod.com/steganography/stego/s-tools4.html〉.
  • 16
    • 44649192599 scopus 로고    scopus 로고
    • J. Korejwa, Jsteg shell 2.0. [Online]. Available: 〈http://www.tiac.net/users/korejwa/steg.htm〉.
    • J. Korejwa, Jsteg shell 2.0. [Online]. Available: 〈http://www.tiac.net/users/korejwa/steg.htm〉.
  • 17
    • 0034775171 scopus 로고    scopus 로고
    • I. Avcibas, N. Memon, B. Sankur, Steganalysis of watermarking techniques using image quality metrics, in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 4314, 2000, pp. 523-531.
    • I. Avcibas, N. Memon, B. Sankur, Steganalysis of watermarking techniques using image quality metrics, in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 4314, 2000, pp. 523-531.
  • 18
    • 0036530067 scopus 로고    scopus 로고
    • Statistical evaluation of image quality measures
    • Avcibas I., Sankur B., and Sayood K. Statistical evaluation of image quality measures. J. Electron. Imaging 11 2 (2002) 206-223
    • (2002) J. Electron. Imaging , vol.11 , Issue.2 , pp. 206-223
    • Avcibas, I.1    Sankur, B.2    Sayood, K.3
  • 19
    • 0035791440 scopus 로고    scopus 로고
    • I. Avcibas, N. Memon, B. Sankur, Steganalysis based on image quality metrics, in: Proceedings of the fourth IEEE Workshop on Multimedia Signal Processing, 2001, pp. 517-522.
    • I. Avcibas, N. Memon, B. Sankur, Steganalysis based on image quality metrics, in: Proceedings of the fourth IEEE Workshop on Multimedia Signal Processing, 2001, pp. 517-522.
  • 20
    • 44649188091 scopus 로고    scopus 로고
    • H. Farid, Detecting steganographic messages in digital images, Technical Report TR2001-412, Dartmouth College, Hanover, NH, 2001.
    • H. Farid, Detecting steganographic messages in digital images, Technical Report TR2001-412, Dartmouth College, Hanover, NH, 2001.
  • 21
    • 0036452586 scopus 로고    scopus 로고
    • H. Farid, Detecting hidden messages using higher-order statistical models, in: Proceedings of IEEE International Conference on Image processing, vol. 2, 2002, pp. 905-908.
    • H. Farid, Detecting hidden messages using higher-order statistical models, in: Proceedings of IEEE International Conference on Image processing, vol. 2, 2002, pp. 905-908.
  • 22
    • 35248846436 scopus 로고    scopus 로고
    • H. Farid, S. Lyu, Detecting hidden messages using higher-order statistics and support vector machines, in: Proceedings of fifth International Information Hiding Workshop. Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, 2002, pp. 340-354.
    • H. Farid, S. Lyu, Detecting hidden messages using higher-order statistics and support vector machines, in: Proceedings of fifth International Information Hiding Workshop. Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, 2002, pp. 340-354.
  • 23
    • 8844256156 scopus 로고    scopus 로고
    • S. Lyu, H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004, pp. 35-45.
    • S. Lyu, H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004, pp. 35-45.
  • 24
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • Lyu S., and Farid H. Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forensics Secur. 1 1 (2006) 111-119
    • (2006) IEEE Trans. Inf. Forensics Secur. , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 25
    • 33646134392 scopus 로고    scopus 로고
    • T. Holotyak, J. Fridrich, S. Voloshynovskiy, Blind statistical steganalysis of additive steganography using wavelet higher order statistics, in: Proceedings of ninth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 2005, pp. 273-274.
    • T. Holotyak, J. Fridrich, S. Voloshynovskiy, Blind statistical steganalysis of additive steganography using wavelet higher order statistics, in: Proceedings of ninth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 2005, pp. 273-274.
  • 26
    • 33845525292 scopus 로고    scopus 로고
    • Blind steganography detection using a computational immune system: a work in progress
    • Jackson J.T., Gunsch G.H., Claypoole Jr. R.L., and Lamont G.B. Blind steganography detection using a computational immune system: a work in progress. Int. J. Digit. Evidence 4 1 (2003) 1-19
    • (2003) Int. J. Digit. Evidence , vol.4 , Issue.1 , pp. 1-19
    • Jackson, J.T.1    Gunsch, G.H.2    Claypoole Jr., R.L.3    Lamont, G.B.4
  • 27
    • 0141607645 scopus 로고    scopus 로고
    • J. T. Jackson, G. H. Gunsch, R. L. Claypoole, Jr., G. B. Lamont, Wavelet-based steganalysis using a computational immune system approach, in: Proceedings of the SPIE, Visual Communications and Image Processing, vol. 5150, 2003, pp. 1884-1894.
    • J. T. Jackson, G. H. Gunsch, R. L. Claypoole, Jr., G. B. Lamont, Wavelet-based steganalysis using a computational immune system approach, in: Proceedings of the SPIE, Visual Communications and Image Processing, vol. 5150, 2003, pp. 1884-1894.
  • 28
    • 14544299158 scopus 로고    scopus 로고
    • A new blind method for detecting novel steganography
    • McBride B.T., Peterson G.L., and Gustafson S.C. A new blind method for detecting novel steganography. Digit. Invest. 2 1 (2005) 50-70
    • (2005) Digit. Invest. , vol.2 , Issue.1 , pp. 50-70
    • McBride, B.T.1    Peterson, G.L.2    Gustafson, S.C.3
  • 29
    • 33645676686 scopus 로고    scopus 로고
    • M. Goljan, J. Fridrich, T. Holotyak. New blind steganalysis and its implications, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 1-13.
    • M. Goljan, J. Fridrich, T. Holotyak. New blind steganalysis and its implications, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 1-13.
  • 30
    • 36048970091 scopus 로고    scopus 로고
    • B.M. Rodriguez, G.L. Peterson, S.S. Agaian, Steganography anomaly detection using simple one-class classification, in: Proceedings of the SPIE, Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6579, 2007, pp. 65790E.1-65790E.9.
    • B.M. Rodriguez, G.L. Peterson, S.S. Agaian, Steganography anomaly detection using simple one-class classification, in: Proceedings of the SPIE, Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6579, 2007, pp. 65790E.1-65790E.9.
  • 31
    • 0242576328 scopus 로고    scopus 로고
    • J.J. Harmsen, W.A. Pearlman, Steganalysis of additive noise modelable information hiding, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, 2003, pp. 131-142.
    • J.J. Harmsen, W.A. Pearlman, Steganalysis of additive noise modelable information hiding, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, 2003, pp. 131-142.
  • 32
    • 24744444102 scopus 로고    scopus 로고
    • Y.Q. Shi, G.R. Xuan, C.Y. Yang, J.J. Gao, Z.P. Zhang, P.Q. Chai, D.K. Zou, C.H. Chen, W. Chen, Effective steganalysis based on statistical moments of wavelet characteristic function, in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, 2005, pp. 768-773.
    • Y.Q. Shi, G.R. Xuan, C.Y. Yang, J.J. Gao, Z.P. Zhang, P.Q. Chai, D.K. Zou, C.H. Chen, W. Chen, Effective steganalysis based on statistical moments of wavelet characteristic function, in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, 2005, pp. 768-773.
  • 33
    • 42749106257 scopus 로고    scopus 로고
    • G.R. Xuan, J.J. Gao, Y.Q. Shi, D.K. Zou, Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain, in: Proceedings of IEEE International Workshop on Multimedia Signal Processing, 2005, pp. 1-4.
    • G.R. Xuan, J.J. Gao, Y.Q. Shi, D.K. Zou, Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain, in: Proceedings of IEEE International Workshop on Multimedia Signal Processing, 2005, pp. 1-4.
  • 34
    • 33746647772 scopus 로고    scopus 로고
    • G.R. Xuan, Y.Q. Shi, J.J. Gao, D.K. Zou, C.Y. Yang, Z.P. Zhang, P.Q. Chai, C.H. Chen, W. Chen, Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions, in: Proceedings of seventh International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3727, Springer, Berlin, 2005, pp. 262-277.
    • G.R. Xuan, Y.Q. Shi, J.J. Gao, D.K. Zou, C.Y. Yang, Z.P. Zhang, P.Q. Chai, C.H. Chen, W. Chen, Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions, in: Proceedings of seventh International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3727, Springer, Berlin, 2005, pp. 262-277.
  • 35
    • 42949152730 scopus 로고    scopus 로고
    • C.H. Chen, Y.Q. Shi, W. Chen, G.R. Xuan, Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function, in: Proceedings of IEEE International Conference on Image Processing, 2006, pp. 105-108.
    • C.H. Chen, Y.Q. Shi, W. Chen, G.R. Xuan, Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function, in: Proceedings of IEEE International Conference on Image Processing, 2006, pp. 105-108.
  • 36
    • 33750555925 scopus 로고    scopus 로고
    • Y.Q. Shi, G.R. Xuan, D.K. Zou, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, in: Proceedings of IEEE International Conference on Multimedia and Expo, 2005, pp. 269-272.
    • Y.Q. Shi, G.R. Xuan, D.K. Zou, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, in: Proceedings of IEEE International Conference on Multimedia and Expo, 2005, pp. 269-272.
  • 37
    • 33847717054 scopus 로고    scopus 로고
    • Optimized feature extraction for learning-based image steganalysis
    • Wang Y., and Moulin P. Optimized feature extraction for learning-based image steganalysis. IEEE Trans. Inf. Forensics Secur. 2 1 (2007) 31-45
    • (2007) IEEE Trans. Inf. Forensics Secur. , vol.2 , Issue.1 , pp. 31-45
    • Wang, Y.1    Moulin, P.2
  • 38
    • 34147139894 scopus 로고    scopus 로고
    • X.C. Chen, Y.H. Wang, T.N. Tan, L. Guo, Blind image steganalysis based on statistical analysis of empirical matrix, in: Proceedings of 18th International Conference on Pattern Recognition, vol. 3, 2006, pp. 1107-1110.
    • X.C. Chen, Y.H. Wang, T.N. Tan, L. Guo, Blind image steganalysis based on statistical analysis of empirical matrix, in: Proceedings of 18th International Conference on Pattern Recognition, vol. 3, 2006, pp. 1107-1110.
  • 39
    • 21844460833 scopus 로고    scopus 로고
    • K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath, Steganalysis of spread spectrum data hiding exploiting cover memory, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 2005, pp. 38-46.
    • K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath, Steganalysis of spread spectrum data hiding exploiting cover memory, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 2005, pp. 38-46.
  • 40
    • 33845426373 scopus 로고    scopus 로고
    • G.R. Xuan, Y.Q. Shi, C. Huang, D.D. Fu, X.M. Zhu, P.Q. Chai, J.J. Gao, Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA), in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 4283, Springer, Berlin, 2006, pp. 49-60.
    • G.R. Xuan, Y.Q. Shi, C. Huang, D.D. Fu, X.M. Zhu, P.Q. Chai, J.J. Gao, Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA), in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 4283, Springer, Berlin, 2006, pp. 49-60.
  • 41
    • 34250775433 scopus 로고    scopus 로고
    • D.D. Fu, Y.Q. Shi, D.K. Zou, G.R. Xuan, JPEG steganalysis using empirical transition matrix in block DCT domain, in: Proceedings of IEEE International Workshop on Multimedia Signal Processing, 2006, pp. 310-313.
    • D.D. Fu, Y.Q. Shi, D.K. Zou, G.R. Xuan, JPEG steganalysis using empirical transition matrix in block DCT domain, in: Proceedings of IEEE International Workshop on Multimedia Signal Processing, 2006, pp. 310-313.
  • 42
    • 29044433896 scopus 로고    scopus 로고
    • A feature-based classification technique for blind image steganalysis
    • Lie W.N., and Lin G.S. A feature-based classification technique for blind image steganalysis. IEEE Trans. Multimedia 7 6 (2005) 1007-1020
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.6 , pp. 1007-1020
    • Lie, W.N.1    Lin, G.S.2
  • 43
    • 11244311724 scopus 로고    scopus 로고
    • G.S. Lin, C.H. Yeh, C.C. Jay Kuo, Data hiding domain classification for blind image steganalysis, in: Proceedings of IEEE International Conference on Multimedia and Expo, 2004, pp. 907-910.
    • G.S. Lin, C.H. Yeh, C.C. Jay Kuo, Data hiding domain classification for blind image steganalysis, in: Proceedings of IEEE International Conference on Multimedia and Expo, 2004, pp. 907-910.
  • 44
    • 0038667918 scopus 로고    scopus 로고
    • Features extraction based on the Bhattacharyya distance
    • Choi E., and Lee C. Features extraction based on the Bhattacharyya distance. Pattern Recogn. 36 8 (2003) 1703-1709
    • (2003) Pattern Recogn. , vol.36 , Issue.8 , pp. 1703-1709
    • Choi, E.1    Lee, C.2
  • 45
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Burges C. A tutorial on support vector machines for pattern recognition. Data Mining Knowl. Disc 2 (1998) 121-167
    • (1998) Data Mining Knowl. Disc , vol.2 , pp. 121-167
    • Burges, C.1
  • 46
    • 44649122313 scopus 로고    scopus 로고
    • C.C. Chang, C.J. Lin, LIBSVM: A Library for Support Vector Machines, 2001 [Online]. Available: 〈http://www.csie.ntu.edu.tw/~cjlin/libsvm〉.
    • C.C. Chang, C.J. Lin, LIBSVM: A Library for Support Vector Machines, 2001 [Online]. Available: 〈http://www.csie.ntu.edu.tw/~cjlin/libsvm〉.
  • 48
    • 0023383122 scopus 로고    scopus 로고
    • P.P. Vaidyanathan, Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques, IEEE ASSP Mag. (1987) 4-20.
    • P.P. Vaidyanathan, Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques, IEEE ASSP Mag. (1987) 4-20.
  • 49
    • 44649199434 scopus 로고    scopus 로고
    • R. Machado, EZStego. [Online]. Available: 〈http://www.ezstego.com〉.
    • R. Machado, EZStego. [Online]. Available: 〈http://www.ezstego.com〉.
  • 50
    • 44649164055 scopus 로고    scopus 로고
    • N. Provos, Outguess. Software available at 〈www.outguess.org〉.
    • N. Provos, Outguess. Software available at 〈www.outguess.org〉.
  • 51
    • 0000764772 scopus 로고
    • The use of multiple measures in taxonomic problems
    • Fisher R. The use of multiple measures in taxonomic problems. Ann. Eugenics 7 (1936) 179-188
    • (1936) Ann. Eugenics , vol.7 , pp. 179-188
    • Fisher, R.1
  • 53
    • 44649144059 scopus 로고    scopus 로고
    • A. Westfeld, F5. [Online]. Available: 〈http://www.wrn.inf.tu-dresden.de/westfeld/f5〉.
    • A. Westfeld, F5. [Online]. Available: 〈http://www.wrn.inf.tu-dresden.de/westfeld/f5〉.
  • 55
    • 0242581862 scopus 로고    scopus 로고
    • F. Alturki, R. Mersereau, A novel approach for increasing security and data embedding capacity in images for data hiding applications, in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, 1997, pp. 228-233.
    • F. Alturki, R. Mersereau, A novel approach for increasing security and data embedding capacity in images for data hiding applications, in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, 1997, pp. 228-233.
  • 56
    • 44649149778 scopus 로고    scopus 로고
    • CorelDraw Software. [Online]. Available: 〈http://www.corel.com〉.
    • CorelDraw Software. [Online]. Available: 〈http://www.corel.com〉.
  • 57
    • 0031354216 scopus 로고    scopus 로고
    • A. Piva, M. Barni, F. Bartolini, V. Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, in: Proceedings of IEEE International Conference on Image Processing, vol. 1, 1997, pp. 520.
    • A. Piva, M. Barni, F. Bartolini, V. Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, in: Proceedings of IEEE International Conference on Image Processing, vol. 1, 1997, pp. 520.
  • 58
    • 0032051323 scopus 로고    scopus 로고
    • An adaptive image watermarking scheme based on visual masking
    • Huang J.W., and Shi Y.Q. An adaptive image watermarking scheme based on visual masking. IEE Electron. Lett. 34 8 (1998) 748-750
    • (1998) IEE Electron. Lett. , vol.34 , Issue.8 , pp. 748-750
    • Huang, J.W.1    Shi, Y.Q.2
  • 59
    • 84952369138 scopus 로고    scopus 로고
    • B. Chen, G.W. Wornell. Digital watermarking and information embedding using dither modulation, in: Proceedings of IEEE international workshop on multimedia signal processing, 1998, pp. 273-278.
    • B. Chen, G.W. Wornell. Digital watermarking and information embedding using dither modulation, in: Proceedings of IEEE international workshop on multimedia signal processing, 1998, pp. 273-278.
  • 60
    • 35048819204 scopus 로고    scopus 로고
    • P. Sallee, Model-based steganography, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 2939, Springer, Berlin, 2003, pp. 154-167.
    • P. Sallee, Model-based steganography, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 2939, Springer, Berlin, 2003, pp. 154-167.
  • 61
    • 0031078007 scopus 로고    scopus 로고
    • Feature selection: evaluation, application, and small sample performance
    • Jain A., and Zongker D. Feature selection: evaluation, application, and small sample performance. IEEE Trans. Pattern Anal. Mach. Intell. 19 2 (1997) 153-158
    • (1997) IEEE Trans. Pattern Anal. Mach. Intell. , vol.19 , Issue.2 , pp. 153-158
    • Jain, A.1    Zongker, D.2
  • 62
    • 44649152513 scopus 로고    scopus 로고
    • A. Latham, JPEG Hide-and-Seek. [Online]. Available: 〈linux01.gwdg.de/alatham/stego〉.
    • A. Latham, JPEG Hide-and-Seek. [Online]. Available: 〈linux01.gwdg.de/alatham/stego〉.
  • 63
    • 44649125615 scopus 로고    scopus 로고
    • S. Hetzl, Steghide. [Online]. Available: 〈steghide.sourceforge.net〉.
    • S. Hetzl, Steghide. [Online]. Available: 〈steghide.sourceforge.net〉.
  • 64
    • 0141489940 scopus 로고    scopus 로고
    • T. Ogihara, D. Nakamura, N. Yokoya, Data embedding into pictorial with less distortion using discrete cosine transform, in: Proceedings of International Conference on Pattern Recognition, 1996, pp. 675-679.
    • T. Ogihara, D. Nakamura, N. Yokoya, Data embedding into pictorial with less distortion using discrete cosine transform, in: Proceedings of International Conference on Pattern Recognition, 1996, pp. 675-679.
  • 65
    • 0033698176 scopus 로고    scopus 로고
    • W.N. Lie, G.S. Lin, C.L. Wu, Robust image watermarking on the DCT domain, in: Proceedings of IEEE International Symposium on Circuits and Systems, 2000, pp. 1228-1231.
    • W.N. Lie, G.S. Lin, C.L. Wu, Robust image watermarking on the DCT domain, in: Proceedings of IEEE International Symposium on Circuits and Systems, 2000, pp. 1228-1231.
  • 66
    • 0032075445 scopus 로고    scopus 로고
    • Robust image watermarking in the spatial domain
    • Nikolaidis N., and Pitas I. Robust image watermarking in the spatial domain. Signal Process. 66 3 (1998) 385-403
    • (1998) Signal Process. , vol.66 , Issue.3 , pp. 385-403
    • Nikolaidis, N.1    Pitas, I.2
  • 67
    • 0033309034 scopus 로고    scopus 로고
    • W. Lie, L. Chang, Data hiding in images with adaptive numbers of least significant bits based on human visual system, in: Proceedings of IEEE International Conference on Image Processing, 1999, pp. 286-290.
    • W. Lie, L. Chang, Data hiding in images with adaptive numbers of least significant bits based on human visual system, in: Proceedings of IEEE International Conference on Image Processing, 1999, pp. 286-290.
  • 69
    • 0033099591 scopus 로고    scopus 로고
    • Wavelet based watermarking method for digital images using the human visual system
    • Kim Y.S., Kwon O.H., and Park R.H. Wavelet based watermarking method for digital images using the human visual system. Electron. Lett. 35 6 (1999) 466-468
    • (1999) Electron. Lett. , vol.35 , Issue.6 , pp. 466-468
    • Kim, Y.S.1    Kwon, O.H.2    Park, R.H.3
  • 71
    • 0033686310 scopus 로고    scopus 로고
    • C. Wong, C. Chen, S. Yeh, K-means-based fuzzy classifier design, in: Proceedings of ninth IEEE International Conference on Fuzzy Systems, vol.1, 2000, pp. 48-52.
    • C. Wong, C. Chen, S. Yeh, K-means-based fuzzy classifier design, in: Proceedings of ninth IEEE International Conference on Fuzzy Systems, vol.1, 2000, pp. 48-52.
  • 72
    • 0024700097 scopus 로고
    • A theory for multiresolution signal decomposition: the wavelet representation
    • Mallat S. A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11 7 (1989) 674-693
    • (1989) IEEE Trans. Pattern Anal. Mach. Intell. , vol.11 , Issue.7 , pp. 674-693
    • Mallat, S.1
  • 74
    • 8844264523 scopus 로고    scopus 로고
    • S. S. Agaian, B. M. Rodriguez, G. Dietrich, Steganalysis using modified pixel comparison and complexity, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004, pp. 46-57.
    • S. S. Agaian, B. M. Rodriguez, G. Dietrich, Steganalysis using modified pixel comparison and complexity, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004, pp. 46-57.
  • 75
    • 21844461602 scopus 로고    scopus 로고
    • J. Fridrich, D. Soukal, M. Goljan, Maximum likelihood estimation of length of secret message embedded using +-K steganography in spatial domain, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 2005, pp. 595-606.
    • J. Fridrich, D. Soukal, M. Goljan, Maximum likelihood estimation of length of secret message embedded using +-K steganography in spatial domain, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 2005, pp. 595-606.
  • 76
    • 33847697308 scopus 로고    scopus 로고
    • Steganalysis of embedding in two least-significant bits
    • Ker A.D. Steganalysis of embedding in two least-significant bits. IEEE Trans. Inf. Forensics Secur. 2 1 (2007) 46-54
    • (2007) IEEE Trans. Inf. Forensics Secur. , vol.2 , Issue.1 , pp. 46-54
    • Ker, A.D.1
  • 77
    • 39149108495 scopus 로고    scopus 로고
    • X.Y. Luo, C.F. Yang, D.S. Wang, F.L. Liu, LTSB steganalysis based on quartic equation, LNCS Trans. Data Hid. Multimedia Secur. (II) (2007) 68-90.
    • X.Y. Luo, C.F. Yang, D.S. Wang, F.L. Liu, LTSB steganalysis based on quartic equation, LNCS Trans. Data Hid. Multimedia Secur. (II) (2007) 68-90.
  • 78
    • 33646167860 scopus 로고    scopus 로고
    • T. Pevny, J. Fridrich, Towards multi-class blind steganalyzer for JPEG images, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 3710, Springer, Berlin, 2005, pp. 39-53.
    • T. Pevny, J. Fridrich, Towards multi-class blind steganalyzer for JPEG images, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 3710, Springer, Berlin, 2005, pp. 39-53.
  • 79
    • 33645660635 scopus 로고    scopus 로고
    • T. Pevny, J. Fridrich, Multi-class blind steganalysis for JPEG images, in: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 60720O.1-60720O.13.
    • T. Pevny, J. Fridrich, Multi-class blind steganalysis for JPEG images, in: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 60720O.1-60720O.13.
  • 80
    • 47249154012 scopus 로고    scopus 로고
    • B. M. Rodriguez, G. L. Peterson, S. S. Agaian, Multi-class classification averaging fusion for detecting steganography, in: Proceedings of IEEE International Conference on System of Systems Engineering, 2007, pp. 1-5.
    • B. M. Rodriguez, G. L. Peterson, S. S. Agaian, Multi-class classification averaging fusion for detecting steganography, in: Proceedings of IEEE International Conference on System of Systems Engineering, 2007, pp. 1-5.
  • 81
    • 44649115383 scopus 로고    scopus 로고
    • NRCS Photo Gallery. [Online]. Available: 〈http://photogallery.nrcs.usda.gov〉
    • NRCS Photo Gallery. [Online]. Available: 〈http://photogallery.nrcs.usda.gov〉
  • 82
    • 49949091527 scopus 로고    scopus 로고
    • K. Solanki, A. Sarkar, B.S. Manjunath, YASS: Yet another steganographic scheme that resists blind steganalysis, in: Proceedings of 9th International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 4567, 2007, pp. 16-31.
    • K. Solanki, A. Sarkar, B.S. Manjunath, YASS: Yet another steganographic scheme that resists blind steganalysis, in: Proceedings of 9th International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 4567, 2007, pp. 16-31.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.