메뉴 건너뛰기




Volumn 4567 LNCS, Issue , 2007, Pages 16-31

YASS: Yet another steganographic scheme that resists blind steganalysis

Author keywords

Data hiding; Error correcting codes; Steganalysis; Steganography; Supervised learning

Indexed keywords

CODING FRAMEWORK; COVER-IMAGE; DATA HIDING; DETECTION RATES; DISTORTION-CONSTRAINED; ERROR CORRECTING CODES; INFORMATION HIDING; SELF-CALIBRATION PROCESS; STEGANALYSIS; STEGANOGRAPHY; STEGO SIGNAL; SUPERVISED LEARNING;

EID: 49949091527     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77370-2_2     Document Type: Conference Paper
Times cited : (170)

References (27)
  • 1
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington DC, USA
    • Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA (2001)
    • (2001) 10th USENIX Security Symposium
    • Provos, N.1
  • 3
    • 35048819204 scopus 로고    scopus 로고
    • Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, 2939, pp. 154-167. Springer, Heidelberg (2004)
    • Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154-167. Springer, Heidelberg (2004)
  • 5
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5 - a steganographic algorithm)
    • Moskowitz, I.S, ed, Information Hiding, Springer, Heidelberg
    • Westfeld, A.: High capacity despite better steganalysis (F5 - a steganographic algorithm). In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 7
    • 78649828992 scopus 로고    scopus 로고
    • Probably secure steganography: Achieving zero K-L divergence using statistical restoration
    • Atlanta, GA, USA, pp
    • Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Probably secure steganography: Achieving zero K-L divergence using statistical restoration. In: Proc. ICIP, Atlanta, GA, USA, pp. 125-128 (2006)
    • (2006) Proc. ICIP , pp. 125-128
    • Solanki, K.1    Sullivan, K.2    Madhow, U.3    Manjunath, B.S.4    Chandrasekaran, S.5
  • 8
    • 84938696768 scopus 로고    scopus 로고
    • Steganalysis of block-DCT image steganography
    • IEEE Computer Society Press, Los Alamitos
    • Wang, Y., Moulin, P.: Steganalysis of block-DCT image steganography. In: IEEE workshop on Statistical Signal Processing, IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) IEEE workshop on Statistical Signal Processing
    • Wang, Y.1    Moulin, P.2
  • 9
    • 33645660635 scopus 로고    scopus 로고
    • Multi-class blind steganalysis for JPEG images
    • San Jose, CA
    • Pevny, T., Fridrich, J.: Multi-class blind steganalysis for JPEG images. In: Proc. of SPIE, San Jose, CA (2006)
    • (2006) Proc. of SPIE
    • Pevny, T.1    Fridrich, J.2
  • 10
    • 34548232251 scopus 로고    scopus 로고
    • Merging Markov and DCT features for multi-class JPEG steganalysis
    • San Jose, CA
    • Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. of SPIE, San Jose, CA (2007)
    • (2007) Proc. of SPIE
    • Pevny, T.1    Fridrich, J.2
  • 11
    • 0036448130 scopus 로고    scopus 로고
    • Image steganalysis with binary similarity measures
    • Avcibas, I., Sankur, B., Memon, N.: Image steganalysis with binary similarity measures. In: Proc. ICIP, pp. 645-648 (2002)
    • (2002) Proc. ICIP , pp. 645-648
    • Avcibas, I.1    Sankur, B.2    Memon, N.3
  • 12
    • 49949086857 scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Ershov, A.P, Nepomniaschy, V.A, eds, International Symposium on Theoretical Programming, Springer, Heidelberg
    • Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Ershov, A.P., Nepomniaschy, V.A. (eds.) International Symposium on Theoretical Programming. LNCS, vol. 5, Springer, Heidelberg (1974)
    • (1974) LNCS , vol.5
    • Lyu, S.1    Farid, H.2
  • 13
    • 49949117092 scopus 로고    scopus 로고
    • Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Yang, C., Zhang, Z., Chai, P., Chen, C., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Sohlender, B., Frielinghaus, W. (eds.) GI - 3. Fachtagung über Programmiersprachen. LNCS, 7th International Workshop on Information Hiding, Springer, Heidelberg (1974)
    • Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Yang, C., Zhang, Z., Chai, P., Chen, C., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Sohlender, B., Frielinghaus, W. (eds.) GI - 3. Fachtagung über Programmiersprachen. LNCS, vol. 7th International Workshop on Information Hiding, Springer, Heidelberg (1974)
  • 14
    • 0242576328 scopus 로고    scopus 로고
    • Steganalysis of additive noise modelable information hiding
    • Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. of SPIE, pp. 131-142 (2003)
    • (2003) Proc. of SPIE , pp. 131-142
    • Harmsen, J.J.1    Pearlman, W.A.2
  • 15
    • 49949087221 scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • Leilich, H.-O, ed, GI-NTG Fachtagung Struktur und Betrieb von Rechensystemen, Springer, Heidelberg
    • Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Leilich, H.-O. (ed.) GI-NTG Fachtagung Struktur und Betrieb von Rechensystemen. LNCS, Springer, Heidelberg (1974)
    • (1974) LNCS
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 20
    • 42949152730 scopus 로고    scopus 로고
    • Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function
    • Atlanta, GA, USA, pp
    • Chen, C., Shi, Y.Q., Chen, W., Xuan, G.: Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function. In: Proc. ICIP, Atlanta, GA, USA, pp. 105-108 (2006)
    • (2006) Proc. ICIP , pp. 105-108
    • Chen, C.1    Shi, Y.Q.2    Chen, W.3    Xuan, G.4
  • 21
    • 84957868624 scopus 로고    scopus 로고
    • An information theoretic model for steganography
    • 2nd Int'l Workshop on Info. Hiding
    • Cachin, C.: An information theoretic model for steganography. In: 2nd Int'l Workshop on Info. Hiding. LNCS, vol. 1525, pp. 306-318 (1998)
    • (1998) LNCS , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 24
    • 78649869719 scopus 로고    scopus 로고
    • Cover selection for steganographic embedding
    • Kharrazi, M., Sencar, H.T., Memon, N.: Cover selection for steganographic embedding. In: Proc. ICIP, pp. 117-120 (2006)
    • (2006) Proc. ICIP , pp. 117-120
    • Kharrazi, M.1    Sencar, H.T.2    Memon, N.3
  • 27
    • 33645666341 scopus 로고    scopus 로고
    • Matrix embedding for large payloads
    • Fridrich, J., Soukal, D.: Matrix embedding for large payloads. In: Proc. of SPIE, pp. 727-738 (2006)
    • (2006) Proc. of SPIE , pp. 727-738
    • Fridrich, J.1    Soukal, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.