메뉴 건너뛰기




Volumn 3, Issue 4, 2008, Pages 635-650

Multiclass detector of current steganographic methods for JPEG format

Author keywords

Blind steganalysis; Double compression; JPEG classifier; Multiclassifier

Indexed keywords

BANDPASS FILTERS; DATA COMPRESSION; FEATURE EXTRACTION; Q FACTOR MEASUREMENT; SUPPORT VECTOR MACHINES;

EID: 56749170425     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.2002936     Document Type: Article
Times cited : (76)

References (36)
  • 3
    • 0036448130 scopus 로고    scopus 로고
    • Image steganalysis with binary similarity measures
    • Rochester, NY, Sep. 22-25
    • I. Avcibas, N. D. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, Sep. 22-25, 2002, vol. 3, pp. 645-648.
    • (2002) Proc. IEEE Int. Conf. Image Processing , vol.3 , pp. 645-648
    • Avcibas, I.1    Memon, N.D.2    Sankur, B.3
  • 4
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C. J. C. Burges, "A tutorial on support vector machines for pattern recognition," Data Mining Knowl. Discovery, vol. 2, no. 2, pp. 121-167, 1998.
    • (1998) Data Mining Knowl. Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 5
    • 84957868624 scopus 로고    scopus 로고
    • C. Cachin, An information-theoretic model for steganography, in Proc. 2nd Int. Information Hiding, Workshop, ser. Lect. Notes Comput. Sci., D. Aucsmith, Ed. New York: Springer-Verlag, Apr. 14-17, 1998, 1525, pp. 306-318, Portland, OR.
    • C. Cachin, "An information-theoretic model for steganography," in Proc. 2nd Int. Information Hiding, Workshop, ser. Lect. Notes Comput. Sci., D. Aucsmith, Ed. New York: Springer-Verlag, Apr. 14-17, 1998, vol. 1525, pp. 306-318, Portland, OR.
  • 6
    • 35248846436 scopus 로고    scopus 로고
    • H. Farid and L. Siwei, Detecting hidden messages using higher-order statistics and support vector machines, in Proc. 5th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci, F. A. P. Petitcolas, Ed. New York: Springer-Verlag, Oct. 7-9, 2002, 2578, pp. 340-354, Noordwijkerhout, The Netherlands.
    • H. Farid and L. Siwei, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci, F. A. P. Petitcolas, Ed. New York: Springer-Verlag, Oct. 7-9, 2002, vol. 2578, pp. 340-354, Noordwijkerhout, The Netherlands.
  • 7
    • 35048835739 scopus 로고    scopus 로고
    • J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in Proc. 6th Int. Workshop Information Hiding, J. Fridrich, Ed., Toronto, ON, Canada, May 23-25, 2004, 3200, Lect. Notes Comput. Sci., pp. 67-81, Springer-Verlag, New York.
    • J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in Proc. 6th Int. Workshop Information Hiding, J. Fridrich, Ed., Toronto, ON, Canada, May 23-25, 2004, vol. 3200, Lect. Notes Comput. Sci., pp. 67-81, Springer-Verlag, New York.
  • 8
    • 35248884299 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, and D. Hogea, Steganalysis of JPEG images: Breaking the F5 algorithm, in Proc. 5th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., F. A. P. Petitcolas, Ed. New York: Springer-Verlag, Oct. 7-9,2002, 2578, pp. 310-323, Noordwijkerhout, The Netherlands.
    • J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," in Proc. 5th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., F. A. P. Petitcolas, Ed. New York: Springer-Verlag, Oct. 7-9,2002, vol. 2578, pp. 310-323, Noordwijkerhout, The Netherlands.
  • 9
    • 34250355507 scopus 로고    scopus 로고
    • D. Fu, Y. Q. Shi, and Q. Su, A generalized Benford's law for JPEG coefficients and its applications in image forensics, in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1 2007, 6505, pp. 1L1-1L11, San Jose, CA.
    • D. Fu, Y. Q. Shi, and Q. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1 2007, vol. 6505, pp. 1L1-1L11, San Jose, CA.
  • 12
    • 33748062330 scopus 로고    scopus 로고
    • Capacity of steganalysis channels
    • A. M. Eskicioglu, J. Fridrich, and J. Dittmann, Eds, New York, Aug. 1-2
    • J. J. Harmsen and W. A. Pearlman, "Capacity of steganalysis channels," in Proc. 7th ACM Multimedia Security Workshop, A. M. Eskicioglu, J. Fridrich, and J. Dittmann, Eds., New York, Aug. 1-2, 2005, pp. 11-24.
    • (2005) Proc. 7th ACM Multimedia Security Workshop , pp. 11-24
    • Harmsen, J.J.1    Pearlman, W.A.2
  • 13
    • 33645695370 scopus 로고    scopus 로고
    • S. Hetzl and P. Mutzel, A graph-theoretic approach to steganography, in Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security, ser. Lect. Notes Comput. Sci., J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds. New York: Springer-Verlag, Sep. 19-21, 2005, 3677, pp. 119-128.
    • S. Hetzl and P. Mutzel, "A graph-theoretic approach to steganography," in Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security, ser. Lect. Notes Comput. Sci., J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds. New York: Springer-Verlag, Sep. 19-21, 2005, vol. 3677, pp. 119-128.
  • 14
    • 56749089544 scopus 로고    scopus 로고
    • C. Hsu and C. Lin, A comparison of methods for multi-class support vector machines, Dept. Comput. Sci. Inf. Eng., National Taiwan Univ., Taipei, Taiwan, 2001. [Online]. Available: http://citeseer.ist.psu.edu/ hsu01comparison.html, Tech. Rep.
    • C. Hsu and C. Lin, "A comparison of methods for multi-class support vector machines," Dept. Comput. Sci. Inf. Eng., National Taiwan Univ., Taipei, Taiwan, 2001. [Online]. Available: http://citeseer.ist.psu.edu/ hsu01comparison.html, Tech. Rep.
  • 18
    • 38149033612 scopus 로고    scopus 로고
    • Y. Kim, Z. Duric, and D. Richards, Modified matrix encoding technique for minimal distortion steganography, in Proc. 8th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. New York: Springer-Verlag, Jul. 10-12, 2006, 4437, pp. 314-327, Alexandria, VA.
    • Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. New York: Springer-Verlag, Jul. 10-12, 2006, vol. 4437, pp. 314-327, Alexandria, VA.
  • 19
    • 35048849011 scopus 로고    scopus 로고
    • Estimation of primary quantization matrix in double compressed JPEG images
    • presented at the, Cleveland, OH, Aug. 5-8
    • J. Lukáš and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," presented at the Digital Forensic Research Workshop, Cleveland, OH, Aug. 5-8, 2003.
    • (2003) Digital Forensic Research Workshop
    • Lukáš, J.1    Fridrich, J.2
  • 20
    • 8844256156 scopus 로고    scopus 로고
    • Steganalysis using color wavelet statistics and one-class support vector machines
    • E. J. Delp and P. W. Wong, Eds, San Jose, CA, Jan. 19-22
    • S. Lyu and H. Farid, "Steganalysis using color wavelet statistics and one-class support vector machines," in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents VI, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 19-22, 2004, vol. 5306, pp. 35-45.
    • (2004) Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents VI , vol.5306 , pp. 35-45
    • Lyu, S.1    Farid, H.2
  • 21
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • Mar
    • S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 23
    • 33646167860 scopus 로고    scopus 로고
    • T. Pevný and J. Fridrich, Towards multi-class blind steganalyzer for JPEG images, in Proc. Int. Workshop on Digital Watermarking, ser. Lect. Notes Comput. Sci., M. Barni, I. J. Cox, T. Kalker, and H. J. Kim, Eds. Berlin, Germany: Springer-Verlag, Sep. 15-17, 2005, 3710, Siena, Italy.
    • T. Pevný and J. Fridrich, "Towards multi-class blind steganalyzer for JPEG images," in Proc. Int. Workshop on Digital Watermarking, ser. Lect. Notes Comput. Sci., M. Barni, I. J. Cox, T. Kalker, and H. J. Kim, Eds. Berlin, Germany: Springer-Verlag, Sep. 15-17, 2005, vol. 3710, Siena, Italy.
  • 25
    • 33645660635 scopus 로고    scopus 로고
    • T. Pevný and J. Fridrich, Multiclass blind steganalysis for JPEG images, in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19, 2006, 6072, pp. O 1-O 13.
    • T. Pevný and J. Fridrich, "Multiclass blind steganalysis for JPEG images," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19, 2006, vol. 6072, pp. O 1-O 13.
  • 27
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression for applications in steganography
    • Jun
    • T. Pevný and J. Fridrich, "Detection of double-compression for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 247-258
    • Pevný, T.1    Fridrich, J.2
  • 28
    • 35048816032 scopus 로고    scopus 로고
    • A. C. Popescu and H. Farid, Statistical tools for digital forensic, in Proc. 6th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., J. Fridrich, Ed. Berlin, Germany: Springer-Verlag, May 23-25, 2004, 3200, pp. 128-147, Toronto, ON, Canada.
    • A. C. Popescu and H. Farid, "Statistical tools for digital forensic," in Proc. 6th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., J. Fridrich, Ed. Berlin, Germany: Springer-Verlag, May 23-25, 2004, vol. 3200, pp. 128-147, Toronto, ON, Canada.
  • 29
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Aug. 13-17
    • N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Security Symp., Aug. 13-17, 2001, pp. 323-335.
    • (2001) Proc. 10th USENIX Security Symp , pp. 323-335
    • Provos, N.1
  • 30
    • 35048819204 scopus 로고    scopus 로고
    • P. Sallee, Model-based steganography, in Proc. 2nd Int. Workshop Digital Watermarking, ser. Lect. Notes Comput. Sci., T. Kalker, I. J. Cox, and Y. Man Ro, Eds. New York: Springer-Verlag, Oct. 20-22, 2003, 2939, pp. .154-167, Seoul, Korea.
    • P. Sallee, "Model-based steganography," in Proc. 2nd Int. Workshop Digital Watermarking, ser. Lect. Notes Comput. Sci., T. Kalker, I. J. Cox, and Y. Man Ro, Eds. New York: Springer-Verlag, Oct. 20-22, 2003, vol. 2939, pp. .154-167, Seoul, Korea.
  • 31
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • P. Sallee, "Model-based methods for steganography and steganalysis," Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
    • (2005) Int. J. Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 32
    • 38049166461 scopus 로고    scopus 로고
    • Y. Q. Shi, C. Chen, and W. Chen, A Markov process based approach to effective attacking JPEG steganography, in Proc. 8th Int. Workshop Inf. Hiding, ser. Lect. Notes Comput. Sci., J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. New York: Springer-Verlag, Jul. 10-12, 2006, 4437, pp. 249-264, Alexandria, VA.
    • Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int. Workshop Inf. Hiding, ser. Lect. Notes Comput. Sci., J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. New York: Springer-Verlag, Jul. 10-12, 2006, vol. 4437, pp. 249-264, Alexandria, VA.
  • 34
    • 84937814312 scopus 로고    scopus 로고
    • A. Westfeld, High capacity despite better steganalysis (F5 - A steganographic algorithm), in Proc. Information Hiding, 4th Int. Workshop, ser. Lect. Notes Comput. Sci., I. S. Moskowitz, Ed. New York: Springer-Verlag, Apr. 25-27, 2001, 2137, pp. 289-302.
    • A. Westfeld, "High capacity despite better steganalysis (F5 - A steganographic algorithm)," in Proc. Information Hiding, 4th Int. Workshop, ser. Lect. Notes Comput. Sci., I. S. Moskowitz, Ed. New York: Springer-Verlag, Apr. 25-27, 2001, vol. 2137, pp. 289-302.
  • 35
    • 33746647772 scopus 로고    scopus 로고
    • G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Z. P. Chai, C. Chen, and W. Chen, Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions, in Proc. 7th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez-González, Eds. Berlin, Germany: Springer-Verlag, Jun. 6-8, 2005, 3727, pp. 262-277.
    • G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Z. P. Chai, C. Chen, and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. 7th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez-González, Eds. Berlin, Germany: Springer-Verlag, Jun. 6-8, 2005, vol. 3727, pp. 262-277.
  • 36
    • 84957886335 scopus 로고    scopus 로고
    • J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, Modeling the security of steganographic systems, in Proc. Information Hiding, 2nd Int. Workshop, ser. Lect. Notes Comput. Sci., D. Aucsmith, Ed. New York: Springer-Verlag, Apr. 14-17, 1998, 1525, pp. 344-354.
    • J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the security of steganographic systems," in Proc. Information Hiding, 2nd Int. Workshop, ser. Lect. Notes Comput. Sci., D. Aucsmith, Ed. New York: Springer-Verlag, Apr. 14-17, 1998, vol. 1525, pp. 344-354.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.