메뉴 건너뛰기




Volumn 41, Issue 9, 2008, Pages 2945-2955

High-performance JPEG steganography using complementary embedding strategy

Author keywords

Chi square family attack; Complementary embedding; Image hiding; JPEG steganography; S family attack; Statistical steganalysis

Indexed keywords

COMPUTER SIMULATION; IMAGE ANALYSIS; IMAGE CODING; SECURITY OF DATA; STATISTICAL TESTS;

EID: 44649167523     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2008.03.005     Document Type: Article
Times cited : (55)

References (35)
  • 2
    • 33644985948 scopus 로고    scopus 로고
    • Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels
    • Chang C.-C., Chan C.-S., and Fan Y.-H. Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition 39 6 (2006) 1155-1167
    • (2006) Pattern Recognition , vol.39 , Issue.6 , pp. 1155-1167
    • Chang, C.-C.1    Chan, C.-S.2    Fan, Y.-H.3
  • 3
    • 33644969019 scopus 로고    scopus 로고
    • A novel image-hiding scheme based on block difference
    • Chan
    • Li S.-L., Leung K.-C., Cheng L.M., -K C., and Chan. A novel image-hiding scheme based on block difference. Pattern Recognition 39 6 (2006) 1168-1176
    • (2006) Pattern Recognition , vol.39 , Issue.6 , pp. 1168-1176
    • Li, S.-L.1    Leung, K.-C.2    Cheng, L.M.3    -K, C.4
  • 4
    • 32644446054 scopus 로고    scopus 로고
    • High-performance JPEG steganography using quantization index modulation in DCT domain
    • Noda H., Niimi M., and Kawaguchi E. High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Lett. 27 5 (2006) 455-461
    • (2006) Pattern Recognition Lett. , vol.27 , Issue.5 , pp. 455-461
    • Noda, H.1    Niimi, M.2    Kawaguchi, E.3
  • 5
    • 13644262818 scopus 로고    scopus 로고
    • Hiding secret data in images via predictive coding
    • Yu Y.-H., Chang C.-C., and Hu Y.-C. Hiding secret data in images via predictive coding. Pattern Recognition 38 5 (2005) 691-705
    • (2005) Pattern Recognition , vol.38 , Issue.5 , pp. 691-705
    • Yu, Y.-H.1    Chang, C.-C.2    Hu, Y.-C.3
  • 6
    • 4544351078 scopus 로고    scopus 로고
    • A steganographic method for digital images using side match
    • Chang C.-C., and Tseng H.-W. A steganographic method for digital images using side match. Pattern Recognition 25 12 (2004) 1431-1437
    • (2004) Pattern Recognition , vol.25 , Issue.12 , pp. 1431-1437
    • Chang, C.-C.1    Tseng, H.-W.2
  • 7
    • 0347355321 scopus 로고    scopus 로고
    • An iterative method of palette-based image steganography
    • Wu M.-Y., Ho Y.-K., and Lee J.-H. An iterative method of palette-based image steganography. Pattern Recognition Lett. 25 3 (2004) 301-309
    • (2004) Pattern Recognition Lett. , vol.25 , Issue.3 , pp. 301-309
    • Wu, M.-Y.1    Ho, Y.-K.2    Lee, J.-H.3
  • 8
    • 0346216907 scopus 로고    scopus 로고
    • Hiding data in images by simple LSB substitution
    • Chan C.-K., and Cheng L.M. Hiding data in images by simple LSB substitution. Pattern Recognition 37 3 (2004) 469-474
    • (2004) Pattern Recognition , vol.37 , Issue.3 , pp. 469-474
    • Chan, C.-K.1    Cheng, L.M.2
  • 9
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • Thien C.-C., and Lin J.-C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36 12 (2003) 2875-2881
    • (2003) Pattern Recognition , vol.36 , Issue.12 , pp. 2875-2881
    • Thien, C.-C.1    Lin, J.-C.2
  • 10
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • Wu D.-C., and Tsai W.-H. A steganographic method for images by pixel-value differencing. Pattern Recognition Lett. 24 9-10 (2003) 1613-1626
    • (2003) Pattern Recognition Lett. , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.-C.1    Tsai, W.-H.2
  • 11
    • 0036329257 scopus 로고    scopus 로고
    • Steganographic method for secure communications
    • Lou D.-C., and Liu J.-L. Steganographic method for secure communications. Comput. Secur. 21 5 (2002) 449-460
    • (2002) Comput. Secur. , vol.21 , Issue.5 , pp. 449-460
    • Lou, D.-C.1    Liu, J.-L.2
  • 13
    • 0036029074 scopus 로고    scopus 로고
    • J.J. Eggers, R. Bauml, B. Girod, A communications approach to image steganography, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 4675, 2002, pp. 26-37.
    • J.J. Eggers, R. Bauml, B. Girod, A communications approach to image steganography, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 4675, 2002, pp. 26-37.
  • 14
    • 0036497685 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and quantization table modification
    • Chang C.-C., Chen T.-S., and Chung L.-Z. A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141 1-2 (2002) 123-138
    • (2002) Inf. Sci. , vol.141 , Issue.1-2 , pp. 123-138
    • Chang, C.-C.1    Chen, T.-S.2    Chung, L.-Z.3
  • 15
    • 0035283377 scopus 로고    scopus 로고
    • Image hiding by optimal LSB substitution and genetic algorithm
    • Wang R.-Z., Lin C.-F., and Lin J.-C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34 3 (2001) 671-683
    • (2001) Pattern Recognition , vol.34 , Issue.3 , pp. 671-683
    • Wang, R.-Z.1    Lin, C.-F.2    Lin, J.-C.3
  • 16
    • 84937814312 scopus 로고    scopus 로고
    • A. Westfeld, High capacity despite better steganalysis (F5-a steganographic algorithm), in: Proceedings of the Fourth International Workshop on Information Hiding, vol. 2137, 2001, pp. 289-302.
    • A. Westfeld, High capacity despite better steganalysis (F5-a steganographic algorithm), in: Proceedings of the Fourth International Workshop on Information Hiding, vol. 2137, 2001, pp. 289-302.
  • 17
    • 85084160704 scopus 로고    scopus 로고
    • N. Provos, Defending against statistical steganalysis, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 323-336.
    • N. Provos, Defending against statistical steganalysis, in: Proceedings of the 10th USENIX Security Symposium, 2001, pp. 323-336.
  • 18
    • 44649190118 scopus 로고    scopus 로고
    • J-Steg 〈http://www.ussrback.com/crypto/steanography/DOS/jsteg.txt〉.
    • J-Steg 〈http://www.ussrback.com/crypto/steanography/DOS/jsteg.txt〉.
  • 19
    • 44649127698 scopus 로고    scopus 로고
    • EzStego 〈http://www.securityfocus.com/tools/586〉.
    • EzStego 〈http://www.securityfocus.com/tools/586〉.
  • 20
    • 44649145561 scopus 로고    scopus 로고
    • F5 〈http://wwwrn.inf.tu-dresden.de/%7Ewestfeld/f5.html〉.
    • F5 〈http://wwwrn.inf.tu-dresden.de/%7Ewestfeld/f5.html〉.
  • 21
    • 44649175269 scopus 로고    scopus 로고
    • Hide4PGP 〈http://www.heinz-repp.onlinehome.de/Hide4PGP.htm〉.
    • Hide4PGP 〈http://www.heinz-repp.onlinehome.de/Hide4PGP.htm〉.
  • 22
    • 44649134884 scopus 로고    scopus 로고
    • JP Hide&Seek 〈ftp://ftp.gwdg.de/pub/linux/misc/ppdd/jphs_05.zip〉.
    • JP Hide&Seek 〈ftp://ftp.gwdg.de/pub/linux/misc/ppdd/jphs_05.zip〉.
  • 23
    • 44649164782 scopus 로고    scopus 로고
    • S-Tools 〈ftp://ftp.ntua.gr/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip〉.
    • S-Tools 〈ftp://ftp.ntua.gr/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip〉.
  • 24
    • 44649090341 scopus 로고    scopus 로고
    • Snow 〈http://www.darkside.com.au/snow/index.html〉.
    • Snow 〈http://www.darkside.com.au/snow/index.html〉.
  • 27
    • 2342551565 scopus 로고    scopus 로고
    • D.-C. Lou, J.-L. Liu, M.-C. Chang, Digital watermarking using multiresolution wavelet transform, in: Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, 2003, pp. 370-377.
    • D.-C. Lou, J.-L. Liu, M.-C. Chang, Digital watermarking using multiresolution wavelet transform, in: Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, 2003, pp. 370-377.
  • 28
    • 10744222259 scopus 로고    scopus 로고
    • A robust watermarking scheme based on the just-noticeable-distortion
    • Lou D.-C., and Liu J.-L. A robust watermarking scheme based on the just-noticeable-distortion. J. Chung Cheng Inst. Technol. 31 2 (2003) 11-22
    • (2003) J. Chung Cheng Inst. Technol. , vol.31 , Issue.2 , pp. 11-22
    • Lou, D.-C.1    Liu, J.-L.2
  • 31
    • 84892764719 scopus 로고    scopus 로고
    • A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in: Proceedings of the Third International Workshop on Information Hiding, 2000, pp. 61-76.
    • A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in: Proceedings of the Third International Workshop on Information Hiding, 2000, pp. 61-76.
  • 32
    • 0242497150 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, D. Hogea, New methodology for breaking steganographic techniques for JPEGs, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 5020, 2003, pp. 143-155.
    • J. Fridrich, M. Goljan, D. Hogea, New methodology for breaking steganographic techniques for JPEGs, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 5020, 2003, pp. 143-155.
  • 33
    • 44649201816 scopus 로고    scopus 로고
    • ISO/IEC, IS 10918, ITU-T, Rec. T.81, Information technology-digital compression and coding of continuous-tone still images, part 1: requirements and guidelines, 1992.
    • ISO/IEC, IS 10918, ITU-T, Rec. T.81, Information technology-digital compression and coding of continuous-tone still images, part 1: requirements and guidelines, 1992.
  • 34
    • 44649083426 scopus 로고    scopus 로고
    • The MathWorks 〈http://www.mathworks.com/index.shtml〉.
    • The MathWorks 〈http://www.mathworks.com/index.shtml〉.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.