메뉴 건너뛰기




Volumn , Issue , 2008, Pages 2064-2067

Blind image steganalysis based on run-length histogram analysis

Author keywords

Blind steganalysis; Run length histogram; Supervised learning

Indexed keywords

BLIND IMAGE STEGANALYSIS; BLIND STEGANALYSIS; CHARACTERISTIC FUNCTIONS; DETECTION ACCURACY; HIGHER ORDER STATISTICS; HISTOGRAM ANALYSIS; RUN LENGTH; RUN LENGTH HISTOGRAM;

EID: 69949114432     PISSN: 15224880     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIP.2008.4712192     Document Type: Conference Paper
Times cited : (23)

References (11)
  • 1
    • 0041308536 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in 5th International Workshop on Information Hiding, 2002.
    • (2002) 5th International Workshop on Information Hiding
    • Farid, H.1
  • 3
    • 34147139894 scopus 로고    scopus 로고
    • Blind image steganalysis based on statistical analysis of empirical matrix
    • X. C. Chen, Y. H. Wang, L. Guo, and T. N. Tan, "Blind image steganalysis based on statistical analysis of empirical matrix," in Proc. ICPR, 2006, pp. 1107-1110.
    • (2006) Proc. ICPR , pp. 1107-1110
    • Chen, X.C.1    Wang, Y.H.2    Guo, L.3    Tan, T.N.4
  • 4
    • 0001416258 scopus 로고
    • Texture analysis using gray level run lengths
    • M. M. Galloway, "Texture analysis using gray level run lengths," in Comput. Graph. Image Proc, 1975, vol. 4, pp. 171-179.
    • (1975) Comput. Graph. Image Proc , vol.4 , pp. 171-179
    • Galloway, M.M.1
  • 6
    • 33750555925 scopus 로고    scopus 로고
    • Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, andneural network
    • Y. Q. Shi and et al, "Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, andneural network," in ICME 2005, 2005, pp. 269-272.
    • (2005) ICME 2005 , pp. 269-272
    • Shi, Y.Q.1    and et, al.2
  • 8
    • 0032051323 scopus 로고    scopus 로고
    • J. Huang and Y Q. Shi, Adaptive image watermarking scheme based on visual masking, in Electron, Letter, 1998, 34, pp. 748-750.
    • J. Huang and Y Q. Shi, "Adaptive image watermarking scheme based on visual masking," in Electron, Letter, 1998, vol. 34, pp. 748-750.
  • 9
    • 0033309034 scopus 로고    scopus 로고
    • Data hiding in images with adaptive numbers of least significant bits based on human visual system
    • W. N. Lie and L. C. Chang, "Data hiding in images with adaptive numbers of least significant bits based on human visual system," in Proc IEEE Int. Conf. Image Processing, 1999, pp. 286-290.
    • (1999) Proc IEEE Int. Conf. Image Processing , pp. 286-290
    • Lie, W.N.1    Chang, L.C.2
  • 10
    • 84952369138 scopus 로고    scopus 로고
    • Digital watermarking and information embedding using dither modulation
    • B. Chen and G. W. Wornell, "Digital watermarking and information embedding using dither modulation," in Proceedings of IEEE MMSP, 1998, pp. 273-278.
    • (1998) Proceedings of IEEE MMSP , pp. 273-278
    • Chen, B.1    Wornell, G.W.2
  • 11
    • 0031354216 scopus 로고    scopus 로고
    • Dctbased watermark recovering without resorting to the uncor-rupted original image
    • A. Piva, M. Barni, E. Bartolini, and V. Cappellini, "Dctbased watermark recovering without resorting to the uncor-rupted original image," in Proc ICIP97, 1998, vol. 1, p. 520.
    • (1998) Proc ICIP97 , vol.1 , pp. 520
    • Piva, A.1    Barni, M.2    Bartolini, E.3    Cappellini, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.