메뉴 건너뛰기




Volumn 90, Issue 3, 2010, Pages 727-752

Digital image steganography: Survey and analysis of current methods

Author keywords

Adaptive steganography; Digital image steganography; Frequency domain; Security; Spatial domain

Indexed keywords

ADAPTIVE STEGANOGRAPHY; DIGITAL IMAGE STEGANOGRAPHY; FREQUENCY DOMAIN; SECURITY; SPATIAL DOMAIN;

EID: 70350710022     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2009.08.010     Document Type: Review
Times cited : (1383)

References (137)
  • 1
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: seeing the unseen
    • Johnson N.F., and Jajodia S. Exploring steganography: seeing the unseen. IEEE Computer 31 2 (1998) 26-34
    • (1998) IEEE Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 3
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: an introduction to steganography
    • Provos N., and Honeyman P. Hide and seek: an introduction to steganography. IEEE Security and Privacy 1 3 (2003) 32-44
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 8
    • 70350742466 scopus 로고    scopus 로고
    • Information noyée, information cach
    • 〈www.apprendre-en-ligne.net/crypto/stegano/229_142_146.pdf〉 (in French).
    • Delahaye J.P. Information noyée, information cach. Pour la Science 229 (1996) 142-146. http://www.apprendre-en-ligne.net/crypto/stegano/229_142_146.pdf 〈www.apprendre-en-ligne.net/crypto/stegano/229_142_146.pdf〉 (in French).
    • (1996) Pour la Science , vol.229 , pp. 142-146
    • Delahaye, J.P.1
  • 11
    • 70350739649 scopus 로고    scopus 로고
    • T.L. Thomas, Al qaeda and the internet: the danger of cyberplanning, parameters, US Army War College Quarterly-Spring 2003. Available from: 〈www.carlisle.army.mil/usawc/Parameters/03spring/thomas.pdf〉.
    • T.L. Thomas, Al qaeda and the internet: the danger of "cyberplanning", parameters, US Army War College Quarterly-Spring 2003. Available from: 〈www.carlisle.army.mil/usawc/Parameters/03spring/thomas.pdf〉.
  • 17
    • 0034441522 scopus 로고    scopus 로고
    • A secure data hiding technique with heterogeneous data-combining capability for electronic patient records
    • Chicago, USA, July 23-28
    • S. Miaou, C. Hsu, Y. Tsai, H. Chao, A secure data hiding technique with heterogeneous data-combining capability for electronic patient records, in: Proceedings of the IEEE 22nd Annual EMBS International Conference, Chicago, USA, July 23-28, 2000, pp. 280-283.
    • (2000) Proceedings of the IEEE 22nd Annual EMBS International Conference , pp. 280-283
    • Miaou, S.1    Hsu, C.2    Tsai, Y.3    Chao, H.4
  • 18
    • 0000525637 scopus 로고    scopus 로고
    • Watermarking medical images with patient information
    • Engineering in Medicine and Biology Society, Hong Kong, China, 29 October-1 November
    • U.C. Nirinjan, D. Anand, Watermarking medical images with patient information, in: Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Hong Kong, China, 29 October-1 November 1998, pp. 703-706.
    • (1998) Proceedings of the 20th Annual International Conference of the IEEE , pp. 703-706
    • Nirinjan, U.C.1    Anand, D.2
  • 20
    • 34547866457 scopus 로고    scopus 로고
    • Steganography approaches, options, and implications
    • Frith D. Steganography approaches, options, and implications. Network Security 2007 8 (2007) 4-7
    • (2007) Network Security , vol.2007 , Issue.8 , pp. 4-7
    • Frith, D.1
  • 21
    • 85032768213 scopus 로고    scopus 로고
    • A survey of image forgery detection
    • Farid H. A survey of image forgery detection. IEEE Signal Processing Magazine 26 2 (2009) 16-25
    • (2009) IEEE Signal Processing Magazine , vol.26 , Issue.2 , pp. 16-25
    • Farid, H.1
  • 22
    • 67651102858 scopus 로고    scopus 로고
    • A secure and improved self-embedding algorithm to combat digital document forgery
    • Cheddad A., Condell J., Curran K., and Mc Kevitt P. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing 89 12 (2009) 2324-2332
    • (2009) Signal Processing , vol.89 , Issue.12 , pp. 2324-2332
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Mc Kevitt, P.4
  • 24
    • 33748511457 scopus 로고    scopus 로고
    • An evaluation of image based steganography methods
    • Bailey K., and Curran K. An evaluation of image based steganography methods. Multimedia Tools and Applications 30 1 (2006) 55-88
    • (2006) Multimedia Tools and Applications , vol.30 , Issue.1 , pp. 55-88
    • Bailey, K.1    Curran, K.2
  • 25
    • 70350715523 scopus 로고    scopus 로고
    • [Hide and Seek]: 〈ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/cypherpunks/steganography/hdsk41b.zip〉
    • [Hide and Seek]: 〈ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/cypherpunks/steganography/hdsk41b.zip〉
  • 26
    • 70350744161 scopus 로고    scopus 로고
    • [S-Tools]: 〈ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip〉
    • [S-Tools]: 〈ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip〉
  • 27
    • 70350739551 scopus 로고    scopus 로고
    • [Stella]: 〈http://wwwicg.informatik.uni-rostock.de/~sanction/stella/〉
  • 28
    • 70350737611 scopus 로고    scopus 로고
    • [Hide in Picture]: 〈http://sourceforge.net/projects/hide-in-picture/〉
    • Hide in Picture]
  • 29
    • 70350727697 scopus 로고    scopus 로고
    • [Revelation]: 〈http://revelation.atspace.biz/〉
  • 30
    • 70350739550 scopus 로고    scopus 로고
    • [Camouflage]: 〈http://camouflage.unfiction.com/〉
  • 31
    • 70350715522 scopus 로고    scopus 로고
    • [JpegX]: 〈http://www.freewarefiles.com/Jpegx_program_19392.html〉
  • 32
    • 70350735104 scopus 로고    scopus 로고
    • [Data Stash]: 〈http://www.skyjuicesoftware.com/software/ds_info.html〉
    • Data Stash]
  • 33
    • 70350703908 scopus 로고    scopus 로고
    • [Other Tools]: 〈http://www.jjtc.com/Security/stegtools.htm〉
    • Tools]
  • 34
    • 70350711434 scopus 로고    scopus 로고
    • F5
    • [F5]: 〈http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html〉
  • 35
    • 70350739648 scopus 로고    scopus 로고
    • [OutGuess]: 〈http://www.outguess.org/〉.
  • 37
    • 33845305770 scopus 로고    scopus 로고
    • Fingerprinted secret sharing steganography for robustness against image cropping attacks
    • INDIN, Perth, Australia, 10-12 August
    • V.M. Potdar, S. Han, E. Chang, Fingerprinted secret sharing steganography for robustness against image cropping attacks, in: Proceedings of IEEE Third International Conference on Industrial Informatics (INDIN), Perth, Australia, 10-12 August 2005, pp. 717-724.
    • (2005) Proceedings of IEEE Third International Conference on Industrial Informatics , pp. 717-724
    • Potdar, V.M.1    Han, S.2    Chang, E.3
  • 40
    • 33747782523 scopus 로고    scopus 로고
    • New image steganographic methods using run-length approach
    • Chang C.C., Lin C.Y., and Wang Y.Z. New image steganographic methods using run-length approach. Information Sciences 176 22 (2006) 3393-3408
    • (2006) Information Sciences , vol.176 , Issue.22 , pp. 3393-3408
    • Chang, C.C.1    Lin, C.Y.2    Wang, Y.Z.3
  • 41
    • 84958756763 scopus 로고    scopus 로고
    • Lossy compression tolerant steganography
    • Proceedings of the First International Conference on The Human Society and the Internet-Internet Related Socio-Economic Issues
    • R.J. Hwang, K.T. Shih, C.H. Kao, T.M. Chang, Lossy compression tolerant steganography, in: Proceedings of the First International Conference on The Human Society and the Internet-Internet Related Socio-Economic Issues, Lecture Notes in Computer Science, 2001, vol. 2105, pp. 427-435.
    • (2001) Lecture Notes in Computer Science , vol.2105 , pp. 427-435
    • Hwang, R.J.1    Shih, K.T.2    Kao, C.H.3    Chang, T.M.4
  • 43
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG images: Breaking the F5 algorithm
    • Proceedings of Information Hiding: Fifth International Workshop, IH Noordwijkerhout, The Netherlands, Springer, October 7-9
    • J. Fridrich, M. Goljan, D. Hogeg, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proceedings of Information Hiding: Fifth International Workshop, IH 2002 Noordwijkerhout, The Netherlands, Lecture Notes in Computer Science, Springer, October 7-9, 2002, 2578/2003, pp. 310-323.
    • (2002) Lecture Notes in Computer Science , vol.2578 , Issue.2003 , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogeg, D.3
  • 44
    • 55749098975 scopus 로고    scopus 로고
    • Data hiding method using image interpolation
    • Jung K.H., and Yoo K.Y. Data hiding method using image interpolation. Computer Standards and Interfaces 31 2 (2009) 465-470
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.2 , pp. 465-470
    • Jung, K.H.1    Yoo, K.Y.2
  • 46
    • 60749112009 scopus 로고    scopus 로고
    • Reversible image hiding scheme using predictive coding and histogram shifting
    • Tsai P., Hu Y.C., and Yeh H.L. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 89 6 (2009) 1129-1143
    • (2009) Signal Processing , vol.89 , Issue.6 , pp. 1129-1143
    • Tsai, P.1    Hu, Y.C.2    Yeh, H.L.3
  • 48
    • 70350737610 scopus 로고    scopus 로고
    • A.C. Popescu, Statistical tools for digital image forensics, Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, 2005. Available from: 〈http://www.cs.dartmouth.edu/~farid/publications/apthesis05.html〉, on 16-05-07 at 12:20.
    • A.C. Popescu, Statistical tools for digital image forensics, Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, 2005. Available from: 〈http://www.cs.dartmouth.edu/~farid/publications/apthesis05.html〉, on 16-05-07 at 12:20.
  • 49
    • 34248160605 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and particle swarm optimization algorithm
    • Li X., and Wang J. A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences 177 15 (2007) 3099-31091
    • (2007) Information Sciences , vol.177 , Issue.15 , pp. 3099-31091
    • Li, X.1    Wang, J.2
  • 50
    • 0036497685 scopus 로고    scopus 로고
    • A steganographic method based upon JPEG and quantization table modification
    • Chang C.C., Chen T.S., and Chung L.Z. A steganographic method based upon JPEG and quantization table modification. Information Sciences 141 1-2 (2002) 123-138
    • (2002) Information Sciences , vol.141 , Issue.1-2 , pp. 123-138
    • Chang, C.C.1    Chen, T.S.2    Chung, L.Z.3
  • 57
    • 0011994605 scopus 로고    scopus 로고
    • Defending against statistical steganalysis, Center for Information Technology Integration, University of Michigan
    • Technical report, February
    • N. Provos, Defending against statistical steganalysis, Center for Information Technology Integration, University of Michigan, Technical report, February 2001.
    • (2001)
    • Provos, N.1
  • 58
    • 0011994605 scopus 로고    scopus 로고
    • Detecting steganographic content on the Internet, Center for Information Technology Integration, University of Michigan
    • Technical report, August 31
    • N. Provos, P. Honeyman, Detecting steganographic content on the Internet, Center for Information Technology Integration, University of Michigan, Technical report, August 31, 2001.
    • (2001)
    • Provos, N.1    Honeyman, P.2
  • 59
    • 84937814312 scopus 로고    scopus 로고
    • F5-A steganographic algorithm: High capacity despite better steganalysis
    • Proceedings of Fourth International Workshop on Information Hiding, Pittsburgh, USA, April
    • A. Westfeld, F5-A steganographic algorithm: high capacity despite better steganalysis, in: Proceedings of Fourth International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2137, Pittsburgh, USA, April 2001, pp. 289-302.
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 60
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • Dallas, Texas, USA, September 20-21
    • J. Fridrich, T. Pevny, J. Kodovsky, Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities, in: Proceedings of the ACM Ninth Workshop on Multimedia & Security, Dallas, Texas, USA, September 20-21, 2007, pp. 3-14.
    • (2007) Proceedings of the ACM Ninth Workshop on Multimedia & Security , pp. 3-14
    • Fridrich, J.1    Pevny, T.2    Kodovsky, J.3
  • 62
    • 33846993721 scopus 로고    scopus 로고
    • Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation
    • Chen W.Y. Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Applied Mathematics and Computation 185 1 (2007) 432-448
    • (2007) Applied Mathematics and Computation , vol.185 , Issue.1 , pp. 432-448
    • Chen, W.Y.1
  • 66
    • 33747799627 scopus 로고    scopus 로고
    • New system fights steganography, News Briefs
    • Paulson L.D. New system fights steganography, News Briefs. IEEE Computer Society 39 8 (2006) 25-27
    • (2006) IEEE Computer Society , vol.39 , Issue.8 , pp. 25-27
    • Paulson, L.D.1
  • 68
    • 35048819204 scopus 로고    scopus 로고
    • Model-based steganography
    • Proceedings of the Second International Workshop on Digital Watermarking, Seoul, Korea, October 20-22
    • P. Sallee, Model-based steganography, in: Proceedings of the Second International Workshop on Digital Watermarking, Seoul, Korea, October 20-22, 2003, Lecture Notes in Computer Science, vol. 2939, pp. 254-260.
    • (2003) Lecture Notes in Computer Science , vol.2939 , pp. 254-260
    • Sallee, P.1
  • 69
    • 33847679624 scopus 로고    scopus 로고
    • Performance study of common image steganography and steganalysis techniques
    • Kharrazi M., Sencar H.T., and Memon N. Performance study of common image steganography and steganalysis techniques. Journal of Electrical Imaging 15 4 (2006) 1-16
    • (2006) Journal of Electrical Imaging , vol.15 , Issue.4 , pp. 1-16
    • Kharrazi, M.1    Sencar, H.T.2    Memon, N.3
  • 71
    • 4544351078 scopus 로고    scopus 로고
    • A steganographic method for digital images using side match
    • Chang C.C., and Tseng H.W. A steganographic method for digital images using side match. Pattern Recognition Letters 25 12 (2004) 1431-1437
    • (2004) Pattern Recognition Letters , vol.25 , Issue.12 , pp. 1431-1437
    • Chang, C.C.1    Tseng, H.W.2
  • 73
    • 33749598442 scopus 로고    scopus 로고
    • Breaking cauchy model-based JPEG steganography with first order statistics
    • Proceedings of the European Symposium on Research in Computer Security, ESORICS, Valbonne, France, 13th September
    • R. Böhme, A. Westfeld, Breaking cauchy model-based JPEG steganography with first order statistics, in: Proceedings of the European Symposium on Research in Computer Security, ESORICS 2004, Valbonne, France, 13th September 2004, Lecture Notes in Computer Science, vol. 3193, pp. 125-140.
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 125-140
    • Böhme, R.1    Westfeld, A.2
  • 74
    • 55549107155 scopus 로고    scopus 로고
    • PM1 steganography in JPEG images using genetic algorithm
    • Yu L., Zhao Y., Ni R., and Zhu Z. PM1 steganography in JPEG images using genetic algorithm. Soft Computing 13 4 (2009) 393-400
    • (2009) Soft Computing , vol.13 , Issue.4 , pp. 393-400
    • Yu, L.1    Zhao, Y.2    Ni, R.3    Zhu, Z.4
  • 76
    • 70350713375 scopus 로고    scopus 로고
    • H. Hioki, A data embedding method using BPCS principle with new complexity measures, in: Proceedings of Pacific Rim Workshop on Digital Steganography, July 2002, pp. 30-47.
    • H. Hioki, A data embedding method using BPCS principle with new complexity measures, in: Proceedings of Pacific Rim Workshop on Digital Steganography, July 2002, pp. 30-47.
  • 78
    • 70350703907 scopus 로고    scopus 로고
    • Master Dissertation, Texas Tech. University, USA, December, available from
    • Y. Srinivasan, High capacity data hiding system using BPCS steganography, Master Dissertation, Texas Tech. University, USA, December 2003, pp. 8, available from: 〈http://etd.lib.ttu.edu/theses/available/etd-06272008-31295018922590/unrestricted/31295018922590.pdf〉
    • (2003) High capacity data hiding system using BPCS steganography , pp. 8
    • Srinivasan, Y.1
  • 83
    • 49449101106 scopus 로고    scopus 로고
    • Multilevel reversible data hiding based on histogram modification of difference images
    • Lin C.C., Tai W.L., and Chang C.C. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition 41 12 (2008) 3582-3591
    • (2008) Pattern Recognition , vol.41 , Issue.12 , pp. 3582-3591
    • Lin, C.C.1    Tai, W.L.2    Chang, C.C.3
  • 88
    • 42949136894 scopus 로고    scopus 로고
    • A. Bogomjakov, C. Gotsman, M. Isenburg, Distortion-free steganography for polygon meshes, in: Proceedings of Computer Graphics Forum, Eurographics'08, April 2008, 27 (2), pp. 637-642.
    • A. Bogomjakov, C. Gotsman, M. Isenburg, Distortion-free steganography for polygon meshes, in: Proceedings of Computer Graphics Forum, Eurographics'08, April 2008, vol. 27 (2), pp. 637-642.
  • 90
    • 70350709201 scopus 로고    scopus 로고
    • A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
    • Zeki A.M., and Manaf A.A. A novel digital watermarking technique based on ISB (Intermediate Significant Bit). World Academy of Science, Engineering and Technology 38 (2009) 1080-1087
    • (2009) World Academy of Science, Engineering and Technology , vol.38 , pp. 1080-1087
    • Zeki, A.M.1    Manaf, A.A.2
  • 91
    • 34547445526 scopus 로고    scopus 로고
    • A new steganographic method for color and grayscale image hiding
    • Yu Y.H., Chang C.C., and Lin I.C. A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding 107 3 (2007) 183-194
    • (2007) Computer Vision and Image Understanding , vol.107 , Issue.3 , pp. 183-194
    • Yu, Y.H.1    Chang, C.C.2    Lin, I.C.3
  • 92
    • 70350722995 scopus 로고    scopus 로고
    • M. Drew, S. Bergner, Spatio-chromatic decorrelation for color image compression, Technical Report, School of Computing Science, Simon Fraser University, Vancouver, Canada, 2007, available from: 〈http://fas.sfu.ca/pub/cs/TR/2007/CMPT2007-09.pdf〉.
    • M. Drew, S. Bergner, Spatio-chromatic decorrelation for color image compression, Technical Report, School of Computing Science, Simon Fraser University, Vancouver, Canada, 2007, available from: 〈http://fas.sfu.ca/pub/cs/TR/2007/CMPT2007-09.pdf〉.
  • 94
    • 0003112504 scopus 로고
    • Multimedia systems and applications
    • Rodriguez A., and Rowe L. Multimedia systems and applications. IEEE Computer 28 5 (1995) 20-22
    • (1995) IEEE Computer , vol.28 , Issue.5 , pp. 20-22
    • Rodriguez, A.1    Rowe, L.2
  • 95
    • 2942615175 scopus 로고    scopus 로고
    • Using similarity measures and homogeneity for the comparison of images
    • Van Der Weken D., Nachtegael M., and Kerre E. Using similarity measures and homogeneity for the comparison of images. Image and Vision Computing 22 9 (2004) 695-702
    • (2004) Image and Vision Computing , vol.22 , Issue.9 , pp. 695-702
    • Van Der Weken, D.1    Nachtegael, M.2    Kerre, E.3
  • 100
    • 0034430895 scopus 로고    scopus 로고
    • Exploring on steganography for low bit rate wavelet based coder in image retrieval system
    • Kuala Lumpur, Malaysia
    • S. Areepongsa, N. Kaewkamnerd, Y.F. Syed, K.R. Rao, Exploring on steganography for low bit rate wavelet based coder in image retrieval system, in: Proceedings of IEEE TENCON, Kuala Lumpur, Malaysia, 2000, vol. 3, pp. 250-255.
    • (2000) Proceedings of IEEE TENCON , vol.3 , pp. 250-255
    • Areepongsa, S.1    Kaewkamnerd, N.2    Syed, Y.F.3    Rao, K.R.4
  • 103
    • 67651108785 scopus 로고    scopus 로고
    • A skin tone detection algorithm for an adaptive approach to steganography
    • Cheddad A., Condell J., Curran K., and Mc Kevitt P. A skin tone detection algorithm for an adaptive approach to steganography. Signal Processing 89 12 (2009) 2465-2478
    • (2009) Signal Processing , vol.89 , Issue.12 , pp. 2465-2478
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Mc Kevitt, P.4
  • 105
    • 0034270385 scopus 로고    scopus 로고
    • Robust watermarking of facial images based on salient geometric pattern matching
    • Nikolaidis A., and Pitas I. Robust watermarking of facial images based on salient geometric pattern matching. IEEE Transactions on Multimedia 2 3 (2000) 172-184
    • (2000) IEEE Transactions on Multimedia , vol.2 , Issue.3 , pp. 172-184
    • Nikolaidis, A.1    Pitas, I.2
  • 106
    • 2642515522 scopus 로고    scopus 로고
    • A steganographic scheme for secure communications based on the chaos and Euler theorem
    • Lou D.C., and Sung C.H. A steganographic scheme for secure communications based on the chaos and Euler theorem. IEEE Transactions on Multimedia 6 3 (2004) 501-509
    • (2004) IEEE Transactions on Multimedia , vol.6 , Issue.3 , pp. 501-509
    • Lou, D.C.1    Sung, C.H.2
  • 108
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • Wu D.C., and Tsai W.H. A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24 9-10 (2003) 1613-1626
    • (2003) Pattern Recognition Letters , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2
  • 110
    • 59149105989 scopus 로고    scopus 로고
    • Steganalysis of reversible contrast mapping watermarking
    • Chen Y.S., and Wang R.Z. Steganalysis of reversible contrast mapping watermarking. IEEE Signal Processing Letters 16 2 (2009) 125-128
    • (2009) IEEE Signal Processing Letters , vol.16 , Issue.2 , pp. 125-128
    • Chen, Y.S.1    Wang, R.Z.2
  • 114
    • 70350711433 scopus 로고    scopus 로고
    • P. Bas, Analyse stéganographique d'images numériques: Comparaison de différentes méthodes, Rapport de stage, Laboratoire des Images et des Signaux, University of Joseph Fourier, 23rd June 2003, (in French).
    • P. Bas, Analyse stéganographique d'images numériques: Comparaison de différentes méthodes, Rapport de stage, Laboratoire des Images et des Signaux, University of Joseph Fourier, 23rd June 2003, (in French).
  • 115
    • 0034787093 scopus 로고    scopus 로고
    • Reliable detection of LSB steganography in grayscale and color images
    • Session on Multimedia Security and Watermarking, Ottawa, Canada, 5th October
    • J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in grayscale and color images, in: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, 5th October 2001, pp. 27-30.
    • (2001) Proceedings of ACM, Special , pp. 27-30
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 117
    • 14544270036 scopus 로고    scopus 로고
    • Impulsive noise suppression from images with the noise exclusive filter
    • Civicioglu P., Alci M., and Besdok E. Impulsive noise suppression from images with the noise exclusive filter. EURASIP Journal on Applied Signal Processing 2004 16 (2004) 2434-2440
    • (2004) EURASIP Journal on Applied Signal Processing , vol.2004 , Issue.16 , pp. 2434-2440
    • Civicioglu, P.1    Alci, M.2    Besdok, E.3
  • 118
    • 35048813035 scopus 로고    scopus 로고
    • Exploiting preserved statistics for steganalysis
    • Springer, Berlin
    • Bohme R., and Westfeld A. Exploiting preserved statistics for steganalysis. Lecture Notes in Computer Science vol. 3200/2005 (2005), Springer, Berlin 82-96
    • (2005) Lecture Notes in Computer Science , vol.3200-2005 , pp. 82-96
    • Bohme, R.1    Westfeld, A.2
  • 119
    • 0036543654 scopus 로고    scopus 로고
    • Data hiding watermarking for halftone images
    • Fu M.S., and Au O.C. Data hiding watermarking for halftone images. IEEE Transactions on Image Processing 11 4 (2002) 477-484
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.4 , pp. 477-484
    • Fu, M.S.1    Au, O.C.2
  • 120
    • 39749184675 scopus 로고    scopus 로고
    • Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning
    • Guo J.M. Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning. Signal Processing 88 6 (2008) 1496-1510
    • (2008) Signal Processing , vol.88 , Issue.6 , pp. 1496-1510
    • Guo, J.M.1
  • 121
    • 60749124959 scopus 로고    scopus 로고
    • Steganalysis of halftone image using inverse halftoning
    • Cheng J., and Kot A.C. Steganalysis of halftone image using inverse halftoning. Signal Processing 89 6 (2009) 1000-1010
    • (2009) Signal Processing , vol.89 , Issue.6 , pp. 1000-1010
    • Cheng, J.1    Kot, A.C.2
  • 122
    • 0035472155 scopus 로고    scopus 로고
    • Detecting LSB steganography in color and gray-scale images
    • Fridrich J., Goljan M., and Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8 4 (2001) 22-28
    • (2001) IEEE Multimedia , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 123
    • 34548232251 scopus 로고    scopus 로고
    • T. Pevny, J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis, in: Proceedings of SPIE Electronic Imaging, Photonics West, USA, January 2007, pp. 03-04.
    • T. Pevny, J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis, in: Proceedings of SPIE Electronic Imaging, Photonics West, USA, January 2007, pp. 03-04.
  • 125
    • 49949091527 scopus 로고    scopus 로고
    • YASS: Yet another steganographic scheme that resists blind steganalysis
    • Proceedings of the Ninth International Workshop on Information Hiding, Saint Malo, France, 11-13 June
    • K. Solanki, A. Sarkar, B.S. Manjunath, YASS: yet another steganographic scheme that resists blind steganalysis, in: Proceedings of the Ninth International Workshop on Information Hiding, Saint Malo, France, 11-13 June 2007, Lecture Notes in Computer Science, vol. 4567, pp. 16-31.
    • (2007) Lecture Notes in Computer Science , vol.4567 , pp. 16-31
    • Solanki, K.1    Sarkar, A.2    Manjunath, B.S.3
  • 128
    • 51749089283 scopus 로고    scopus 로고
    • JPEG image steganalysis utilizing both intrablock and interblock correlations
    • Seattle, Washington, USA, 18-21 May
    • C. Chen, Y.Q. Shi, JPEG image steganalysis utilizing both intrablock and interblock correlations, in: Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS 2008, Seattle, Washington, USA, 18-21 May 2008, pp. 3029-3032.
    • (2008) Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS , pp. 3029-3032
    • Chen, C.1    Shi, Y.Q.2
  • 129
  • 130
    • 70350737609 scopus 로고    scopus 로고
    • Information hiding, watermarking and steganography, Public Seminar, Intelligent Systems Research Centre (ISRC), University of Ulster at Magee, Northern Ireland
    • I. Cox, Information hiding, watermarking and steganography, Public Seminar, Intelligent Systems Research Centre (ISRC), University of Ulster at Magee, Northern Ireland, 28th April 2009.
    • (2009) 28th April
    • Cox, I.1
  • 131
    • 70350711431 scopus 로고    scopus 로고
    • An investigation into the use of the least significant bit substitution technique in digital watermarking
    • Curran K., Li X., and Clarke R. An investigation into the use of the least significant bit substitution technique in digital watermarking. American Journal Applied Sciences 2 3 (2005) 648-654
    • (2005) American Journal Applied Sciences , vol.2 , Issue.3 , pp. 648-654
    • Curran, K.1    Li, X.2    Clarke, R.3
  • 133
    • 64549118174 scopus 로고    scopus 로고
    • A local Tchebichef moments-based robust image watermarking
    • Deng C., Gao X., Li X., and Tao D. A local Tchebichef moments-based robust image watermarking. Signal Processing 89 8 (2009) 1531-1539
    • (2009) Signal Processing , vol.89 , Issue.8 , pp. 1531-1539
    • Deng, C.1    Gao, X.2    Li, X.3    Tao, D.4
  • 137
    • 0041339711 scopus 로고    scopus 로고
    • Watermarking in secure image retrieval
    • Li X. Watermarking in secure image retrieval. Pattern Recognition Letters 24 14 (2003) 2431-2434
    • (2003) Pattern Recognition Letters , vol.24 , Issue.14 , pp. 2431-2434
    • Li, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.