메뉴 건너뛰기




Volumn 2009, Issue , 2009, Pages

Reliable steganalysis using a minimum set of samples and features

Author keywords

[No Author keywords available]

Indexed keywords


EID: 68249138572     PISSN: 16874161     EISSN: 2510523X     Source Type: Journal    
DOI: 10.1155/2009/901381     Document Type: Article
Times cited : (11)

References (32)
  • 3
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • April 1998 Portland, Ore, USA Lecture Notes in Computer Science
    • Cachin C., An information-theoretic model for steganography 1525 Proceedings of the 2nd International Workshop on Information Hiding (IH 98) April 1998 Portland, Ore, USA 306 318 Lecture Notes in Computer Science
    • Proceedings of the 2nd International Workshop on Information Hiding (IH 98) , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 5
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • May 2004 Toronto, Canada Lecture Notes in Computer Science
    • Fridrich J., Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes 3200 Proceedings of the 6th International Workshop on Information Hiding (IH 04) May 2004 Toronto, Canada 67 81 Lecture Notes in Computer Science
    • Proceedings of the 6th International Workshop on Information Hiding (IH 04) , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 6
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • October 2003 Noordwijkerhout, The Netherlands Lecture Notes in Computer Science
    • Lyu S., Farid H., Detecting hidden messages using higher-order statistics and support vector machines 2578 Proceedings of the 5th International Workshop on Information Hiding (IH 02) October 2003 Noordwijkerhout, The Netherlands 340 354 Lecture Notes in Computer Science
    • Proceedings of the 5th International Workshop on Information Hiding (IH 02) , vol.2578 , pp. 340-354
    • Lyu, S.1    Farid, H.2
  • 8
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • Proceedings of the 8th International Workshop on Information Hiding (IH06) July 2007 Alexandria, Va, USA
    • Shi Y. Q., Chen C., Chen W., A Markov process based approach to effective attacking JPEG steganography 4437 Proceedings of the 8th International Workshop on Information Hiding (IH 06) July 2007 Alexandria, Va, USA 249 264 Lecture Notes in Computer Science
    • Lecture Notes in Computer Science , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 11
    • 70350562893 scopus 로고    scopus 로고
    • The square root law of steganographic capacity for Markov covers
    • Media Forensics and Security, E. J. Delp III, J. Dittmann, N. D. Memon, and P. W. Wong, Eds., San Jose Calif, USA, January 2009
    • T. Filler, A. D. Ker, and J. Fridrich, The square root law of steganographic capacity for Markov covers, in Media Forensics and Security, E. J. Delp III, J. Dittmann, N. D. Memon, and P. W. Wong, Eds., vol. 7254 of Proceedings of SPIE, pp. 111, San Jose, Calif, USA, January 2009
    • Proceedings of SPIE , vol.7254 , pp. 1-11
    • Filler, T.1    Ker, A.D.2    Fridrich, J.3
  • 19
    • 33745903481 scopus 로고    scopus 로고
    • Extreme learning machine: theory and applications
    • Huang G.-B., Zhu Q.-Y., Siew C.-K., Extreme learning machine: theory and applications Neurocomputing 2006 70 13 489 501
    • (2006) Neurocomputing , vol.70 , Issue.13 , pp. 489-501
    • Huang, G.-B.1    Zhu, Q.-Y.2    Siew, C.-K.3
  • 21
    • 50049092345 scopus 로고    scopus 로고
    • Fast and accurate sequential floating forward feature selection with the Bayes classifier applied to speech emotion recognition
    • Ververidis D., Kotropoulos C., Fast and accurate sequential floating forward feature selection with the Bayes classifier applied to speech emotion recognition Signal Processing 2008 88 12 2956 2970
    • (2008) Signal Processing , vol.88 , Issue.12 , pp. 2956-2970
    • Ververidis, D.1    Kotropoulos, C.2
  • 22
    • 84862624179 scopus 로고    scopus 로고
    • EURASIP, Fast sequential floating forward selection applied to emotional speech features estimated on des and susas data collections
    • September 2006 Florence, Italy
    • Ververidis D., Kotropoulos C., EURASIP, Fast sequential floating forward selection applied to emotional speech features estimated on des and susas data collections Proceeding of the 14th European Signal Processing Conference (EUSIPCO 06) September 2006 Florence, Italy 1 5
    • Proceeding of the 14th European Signal Processing Conference (EUSIPCO 06) , pp. 1-5
    • Ververidis, D.1    Kotropoulos, C.2
  • 23
    • 84937814312 scopus 로고    scopus 로고
    • F5-a steganographic algorithm
    • Proceedings of the 4th International Workshop on Information Hiding (IH 01) Pittsburgh, Pa, USA, April
    • Westfeld A., F5a steganographic algorithm 2137 Proceedings of the 4th International Workshop on Information Hiding (IH 01) April 2001 Pittsburgh, Pa, USA 289 302 Lecture Notes in Computer Science
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 25
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • July 2007 Alexandria, Va, USA Lecture Notes in Computer Science
    • Kim Y., Duric Z., Richards D., Modified matrix encoding technique for minimal distortion steganography 4437 Proceedings of the 8th International Workshop on Information Hiding (IH 06) July 2007 Alexandria, Va, USA 314 327 Lecture Notes in Computer Science
    • Proceedings of the 8th International Workshop on Information Hiding (IH 06) , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 26
    • 80054840132 scopus 로고    scopus 로고
    • August 1999, http://linux01.gwdg.de/alatham/stego.html
    • Latham A., Jphide seek. August 1999, http://linux01.gwdg.de/alatham/ stego.html
    • Jphide & Seek
    • Latham, A.1
  • 28
    • 33645695370 scopus 로고    scopus 로고
    • A graph-theoretic approach to steganography
    • Proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (CMS 05) Springer, Salzburg, Austria, September
    • Hetzl S., Mutzel P., A graph-theoretic approach to steganography 3677 Proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (CMS 05) September 2005 Salzburg, Austria Springer 119 128 Lecture Notes in Computer Science
    • Lecture Notes in Computer Science , vol.3677 , pp. 119-128
    • Hetzl, S.1    Mutzel, P.2
  • 31
    • 34948833733 scopus 로고    scopus 로고
    • Image complexity and feature mining for steganalysis of least significant bit matching steganography
    • Liu Q., Sung A. H., Ribeiro B., Wei M., Chen Z., Xu J., Image complexity and feature mining for steganalysis of least significant bit matching steganography Information Sciences 2008 178 1 21 36
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 21-36
    • Liu, Q.1    Sung, A.H.2    Ribeiro, B.3    Wei, M.4    Chen, Z.5    Xu, J.6
  • 32
    • 34548232251 scopus 로고    scopus 로고
    • Merging Markov and DCT features for multi-class JPEG steganalysis
    • Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, Calif, USA, January
    • Pevny T., Fridrich J., Merging Markov and DCT features for multi-class JPEG steganalysis 6505 Security, Steganography, and Watermarking of Multimedia Contents IX January 2007 San Jose, Calif, USA 1 13 Proceedings of SPIE
    • Proceedings of SPIE , vol.6505 , pp. 1-13
    • Pevny, T.1    Fridrich, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.