메뉴 건너뛰기




Volumn , Issue , 2008, Pages 139-148

Steganalysis of YASS

Author keywords

JPEG; Steganalysis; Steganography; YASS

Indexed keywords

CRYPTOGRAPHY; METHOD OF MOMENTS; TECHNICAL PRESENTATIONS;

EID: 56749160543     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1411328.1411354     Document Type: Conference Paper
Times cited : (24)

References (22)
  • 1
    • 0005105932 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5-a steganographie algorithm)
    • Pittsburgh, Pennsylvania, USA, Apr
    • A. Westfeld. High capacity despite better steganalysis (F5-a steganographie algorithm). 4th International Workshop on Information Hiding, Pittsburgh, Pennsylvania, USA, Apr. 2001, pp. 289-302.
    • (2001) 4th International Workshop on Information Hiding , pp. 289-302
    • Westfeld, A.1
  • 2
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington D.C, USA
    • N. Provos. Defending against statistical steganalysis. 10th USENIX Security Symposium, Washington D.C., USA, 2001.
    • (2001) 10th USENIX Security Symposium
    • Provos, N.1
  • 3
    • 33744753200 scopus 로고    scopus 로고
    • Model based methods for steganography and steganalysis
    • P. Sallee. Model based methods for steganography and steganalysis. Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
    • (2005) Int. J. Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 5
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • Old Town Alexandria, Virginia, USA, Jul
    • Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. 8th International Workshop on Information Hiding, Old Town Alexandria, Virginia, USA, Jul. 2006, pp. 314-327.
    • (2006) 8th International Workshop on Information Hiding , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 6
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG images: Breaking the F5 algorithm
    • Noordwijkerhout, Netherlands, Oct
    • J. Fridrich, M. Goljan, and D. Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands, Oct. 2002, pp. 310-323.
    • (2002) 5th International Workshop on Information Hiding , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 8
    • 33749598442 scopus 로고    scopus 로고
    • Breaking Cauchy model-based JPEG steganography with first order statistics
    • Sophia Antipolis, French Riviera, France, Sep
    • R. Bohme and A. Westfeld. Breaking Cauchy model-based JPEG steganography with first order statistics. 9th European Symposium on Research in Computer Security (ESORICS), Sophia Antipolis, French Riviera, France, Sep. 2004, pp. 125-140.
    • (2004) 9th European Symposium on Research in Computer Security (ESORICS) , pp. 125-140
    • Bohme, R.1    Westfeld, A.2
  • 9
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • Toronto, Ontario, Canada, May
    • J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. 6th International Workshop on Information Hiding, Toronto, Ontario, Canada, May 2004, pp. 67-81.
    • (2004) 6th International Workshop on Information Hiding , pp. 67-81
    • Fridrich, J.1
  • 10
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • Old Town Alexandria, Virginia, USA, Jul
    • Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. 8th International Workshop on Information Hiding, Old Town Alexandria, Virginia, USA, Jul. 2006, pp. 249-264.
    • (2006) 8th International Workshop on Information Hiding , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 12
    • 51749089283 scopus 로고    scopus 로고
    • JPEG image steganalysis utilizing both intrablock and interblock correlations
    • Seattle, Washington, USA, May
    • C. Chen and Y. Q. Shi. JPEG image steganalysis utilizing both intrablock and interblock correlations. IEEE International Symposium on Circuits and Systems, Seattle, Washington, USA, May 2008.
    • (2008) IEEE International Symposium on Circuits and Systems
    • Chen, C.1    Shi, Y.Q.2
  • 13
    • 56749108321 scopus 로고    scopus 로고
    • K. Solanki, A. Sarkar, and B. S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. 9th International Workshop on Information Hiding, Saint Malo, France, Jun. 2007. Implementation code was available at: http://vision.ece.ucsb.edu/data-hiding/ resist-blind-steganalysis.shtml (2007)
    • K. Solanki, A. Sarkar, and B. S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. 9th International Workshop on Information Hiding, Saint Malo, France, Jun. 2007. Implementation code was available at: http://vision.ece.ucsb.edu/data-hiding/ resist-blind-steganalysis.shtml (2007)
  • 15
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. W. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory, vol. 47, pp. 1423-1443, May 2001.
    • (2001) IEEE Trans. Inform. Theory , vol.47 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 18
    • 38849105460 scopus 로고    scopus 로고
    • Nonparametric steganalysis of QIM-based data hiding using kernel density estimation
    • Dallas, Texas, Sep
    • H. Malik, K. P. Subbalakshmi, and R. Chandramouli. Nonparametric steganalysis of QIM-based data hiding using kernel density estimation. 9th ACM Workshop on Multimedia and Security, Dallas, Texas, Sep. 2007, pp. 149-160.
    • (2007) 9th ACM Workshop on Multimedia and Security , pp. 149-160
    • Malik, H.1    Subbalakshmi, K.P.2    Chandramouli, R.3
  • 22
    • 56749139018 scopus 로고    scopus 로고
    • Photos from Sun Yat-sen University
    • Photos from Sun Yat-sen University. http://ist.sysu.edu.cn/en/index-en. asp


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.