메뉴 건너뛰기




Volumn 5806 LNCS, Issue , 2009, Pages 31-47

Fisher information determines capacity of ε-secure steganography

Author keywords

[No Author keywords available]

Indexed keywords

ASYMPTOTICALLY OPTIMAL; CLOSED-FORM EXPRESSION; DESCRIPTORS; DIGITAL MEDIA; EXPERIMENTAL DATA; FISHER INFORMATION; KL-DIVERGENCE; MODEL FIT; NATURAL IMAGES; SECURE STEGANOGRAPHY; STEGO IMAGE;

EID: 70350445582     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04431-1_3     Document Type: Conference Paper
Times cited : (45)

References (19)
  • 1
    • 45249103920 scopus 로고    scopus 로고
    • Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security (June 2008)
    • Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security (June 2008)
  • 4
    • 70350562893 scopus 로고    scopus 로고
    • The square root law of steganographic capacity for Markov covers
    • Delp, E.J, Wong, P.W, Memon, N, Dittmann, J, eds, San Jose, CA, January 18-21
    • Filler, T., Fridrich, J., Ker, A.D.: The square root law of steganographic capacity for Markov covers. In: Delp, E.J., Wong, P.W., Memon, N., Dittmann, J. (eds.) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, San Jose, CA, January 18-21 (2009)
    • (2009) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia , vol.11
    • Filler, T.1    Fridrich, J.2    Ker, A.D.3
  • 5
  • 6
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • Ker, A.D.: A capacity result for batch steganography. IEEE Signal Processing Letters 14(8), 525-528 (2007)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.D.1
  • 8
    • 70350440358 scopus 로고    scopus 로고
    • Ker, A.D.: Estimating steganographic Fisher information in real images. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, 5806, pp. 73-88. Springer, Heidelberg (2009)
    • Ker, A.D.: Estimating steganographic Fisher information in real images. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 73-88. Springer, Heidelberg (2009)
  • 9
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • Dittmann, J, Fridrich, J, eds, Dallas, TX, September 20-21, pp
    • Kodovský, J., Fridrich, J., Pevný, T.: Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In: Dittmann, J., Fridrich, J. (eds.) Proceedings of the 9th ACM Multimedia & Security Workshop, Dallas, TX, September 20-21, pp. 3-14 (2007)
    • (2007) Proceedings of the 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Kodovský, J.1    Fridrich, J.2    Pevný, T.3
  • 12
    • 14844333237 scopus 로고    scopus 로고
    • Hidden Markov models and steganalysis
    • Dittmann, J, Fridrich, J, eds, Magdeburg, Germany, September 20-21, pp
    • Sidorov, M.: Hidden Markov models and steganalysis. In: Dittmann, J., Fridrich, J. (eds.) Proceedings of the 6th ACM Multimedia & Security Workshop, Magdeburg, Germany, September 20-21, pp. 63-67 (2004)
    • (2004) Proceedings of the 6th ACM Multimedia & Security Workshop , pp. 63-67
    • Sidorov, M.1
  • 13
    • 84957868624 scopus 로고    scopus 로고
    • Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, 1525, pp. 306-318. Springer, Heidelberg (1998)
    • Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306-318. Springer, Heidelberg (1998)
  • 14
    • 38849116275 scopus 로고    scopus 로고
    • The ultimate steganalysis benchmark?
    • Dittmann, J, Fridrich, J, eds, Dallas, TX, September 20-21, pp
    • Ker, A.D.: The ultimate steganalysis benchmark? In: Dittmann, J., Fridrich, J. (eds.) Proceedings of the 9th ACM Multimedia & Security Workshop, Dallas, TX, September 20-21, pp. 141-148 (2007)
    • (2007) Proceedings of the 9th ACM Multimedia & Security Workshop , pp. 141-148
    • Ker, A.D.1
  • 16
    • 70350495315 scopus 로고    scopus 로고
    • Important properties of normalized KL-divergence under HMC model. Technical report, DDE Lab, SUNY Binghamton
    • Filler, T.: Important properties of normalized KL-divergence under HMC model. Technical report, DDE Lab, SUNY Binghamton (2008), http://dde.binghamton. edu/filler/kl-divergence-hmc.pdf
    • Filler, T.1
  • 19
    • 70350513199 scopus 로고    scopus 로고
    • Fisher information determines capacity of ε-secure steganography - proofs. Technical report, SUNY Binghamton
    • Filler, T.: Fisher information determines capacity of ε-secure steganography - proofs. Technical report, SUNY Binghamton (2009), http://dde.binghamton.edu/filler/pdf/Fill09ihwproofs.pdf
    • Filler, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.