메뉴 건너뛰기




Volumn 4301 LNCS, Issue , 2006, Pages 224-240

Steganalysis based on differential statistics

Author keywords

Co occurrence matrix; Com; Differentiation; Hcf

Indexed keywords

CRYPTOGRAPHY; DIFFERENTIATION (CALCULUS); IMAGE ENHANCEMENT; IMAGE RETRIEVAL; MATRIX ALGEBRA; NETWORK SECURITY; STATISTICS; STEGANOGRAPHY; VECTORS;

EID: 77749332017     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935070_16     Document Type: Conference Paper
Times cited : (5)

References (23)
  • 1
    • 0242576328 scopus 로고    scopus 로고
    • Steganalysis of additive noise modelable information hiding
    • Santa Clara, CA, January 21- 24
    • Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding. In Proc. SPIE Electronic Imaging 5022, Santa Clara, CA, January 21- 24, (2003), 131-142.
    • (2003) Proc. SPIE Electronic Imaging 5022 , pp. 131-142
    • Harmsen, J.J.1    Pearlman, W.A.2
  • 5
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • Ker A. Steganalysis of LSB matching in grayscale images. IEEE. Signal Processing Letters, (2005), 12(6):441-444.
    • (2005) IEEE. Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.1
  • 6
    • 33750555925 scopus 로고    scopus 로고
    • Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
    • Amsterdam, Netherlands, July 6-8
    • Yun Q. Shi, Guorong Xuan, Dekun Zou, Jianjiong Gao, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Wen Chen, Chunhua Chen: Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-Error Image, and Neural Network. In Proc. ICME 2005, Amsterdam, Netherlands, July 6-8, (2005), 269-272.
    • (2005) Proc. ICME 2005 , pp. 269-272
    • Shi, Y.Q.1    Xuan, G.2    Zou, D.3    Gao, J.4    Yang, C.5    Zhang, Z.6    Chai, P.7    Chen, W.8    Chen, C.9
  • 7
    • 0041308536 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Noordwijkerhout, The Netherlands
    • Lyu S., Farid H. Detecting hidden messages using higher-order statistics and support vector machines. In Proc. 5th Int. Information Hiding Workshop, Noordwijkerhout, The Netherlands, 2002.
    • (2002) Proc. 5th Int. Information Hiding Workshop
    • Lyu, S.1    Farid, H.2
  • 8
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • Toronto, Ontario, Canada, May 23-25
    • Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Proc. 6th Int. Information Hiding Workshop, Toronto, Ontario, Canada, May 23-25, (2004)67-81.
    • (2004) Proc. 6th Int. Information Hiding Workshop , pp. 67-81
    • Fridrich, J.1
  • 9
    • 33646167860 scopus 로고    scopus 로고
    • Towards multi-class blind steganalyzer for jpeg images
    • Siena, Italy, September 15-17
    • Pevny T, Fridrich J. Towards Multi-class Blind Steganalyzer for JPEG Images. In Proc. IWDW 2005, Siena, Italy, September 15-17, (2005)39-53.
    • (2005) Proc. IWDW 2005 , pp. 39-53
    • Pevny, T.1    Fridrich, J.2
  • 11
    • 68349127643 scopus 로고    scopus 로고
    • Westfeld A. F5. http://wwwrn.inf.tu-dresden.de/.
    • F5
    • Westfeld, A.1
  • 13
    • 84885931988 scopus 로고    scopus 로고
    • www.outguess.org/.
  • 14
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • Sallee P. Model-based methods for steganography and steganalysis. International Journal of Image and Graphics, (2005), 5(1):167-189.
    • (2005) International Journal of Image and Graphics , vol.5 , Issue.1 , pp. 167-189
    • Sallee, P.1
  • 15
    • 84885913928 scopus 로고    scopus 로고
    • S. Hetzl. http://steghide.sourceforge.net/.
    • Hetzl, S.1
  • 16
    • 33749598442 scopus 로고    scopus 로고
    • Breaking cauchy model-based. Jpeg steganography with first order statistics
    • Sophia Antipolis, France, September 13- 15
    • Bohme R, Westfeld A. Breaking cauchy model-based. jpeg steganography with first order statistics. In Proc. ESORICS 2004, Sophia Antipolis, France, September 13- 15, (2004)125-140.
    • (2004) Proc. ESORICS 2004 , pp. 125-140
    • Bohme, R.1    Westfeld, A.2
  • 17
    • 8844256156 scopus 로고    scopus 로고
    • Steganalysis using color wavelet statistics and one-class support vector machines
    • San Jose, CA, January 19-22
    • Lyu S, Farid H. Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines. In Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19-22, (2004)35-45.
    • (2004) Proc. SPIE Symposium on Electronic Imaging , pp. 35-45
    • Lyu, S.1    Farid, H.2
  • 18
    • 84885941992 scopus 로고    scopus 로고
    • http://www.corel.com/.
  • 19
    • 84885897240 scopus 로고    scopus 로고
    • http://www.cs.washington.edu/.
  • 20
    • 21844480333 scopus 로고    scopus 로고
    • Image steganography and steganalysis: Concepts and practice
    • Seoul, Korea, October 20-22
    • Chandramouli R., Kharrazi M., Memon N D. Image Steganography and Steganalysis: Concepts and Practice. In Proc. IWDW 2003, Seoul, Korea, October 20-22, (2003), 35-49.
    • (2003) Proc. IWDW 2003 , pp. 35-49
    • Chandramouli, R.1    Kharrazi, M.2    Memon, N.D.3
  • 21
    • 0026142897 scopus 로고
    • The JPEG still picture compression standard
    • Wallace G. The JPEG Still Picture Compression Standard. Communications of the ACM, (1991), 34(4):30-44.
    • (1991) Communications of the ACM , vol.34 , Issue.4 , pp. 30-44
    • Wallace, G.1
  • 23
    • 24744444102 scopus 로고    scopus 로고
    • Effective steganalysis based on statistical moments of wavelet characteristic function
    • Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen. Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. ITCC(1) (2005), 768-773.
    • (2005) ITCC , Issue.1 , pp. 768-773
    • Shi, Y.Q.1    Xuan, G.2    Yang, C.3    Gao, J.4    Zhang, Z.5    Chai, P.6    Zou, D.7    Chen, C.8    Chen, W.9


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.