메뉴 건너뛰기




Volumn 7541, Issue , 2010, Pages

Feature selection for steganalysis using the Mahalanobis distance

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION ,; CLASSIFICATION ACCURACY; CURSE OF DIMENSIONALITY; EMBEDDING ALGORITHMS; FEATURE SELECTION; FEATURE SELECTION ALGORITHM; FEATURE SETS; FEATURE SPACE; HIGH DIMENSIONALITY; MAHALANOBIS DISTANCE MEASURE; MAHALANOBIS DISTANCES; STEGANALYSIS; TRAINING DATA; TRAINING SETS;

EID: 77951850338     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.841074     Document Type: Conference Paper
Times cited : (19)

References (41)
  • 2
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Information Hiding, Springer Berlin / Heidelberg
    • Cachin, C., "An information-theoretic model for steganography," in [Information Hiding], Lecture Notes in Computer Science 1525, 306-318, Springer Berlin / Heidelberg (1998).
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 5
    • 33847717054 scopus 로고    scopus 로고
    • Optimized feature extraction for learning-based image steganalysis
    • DOI 10.1109/TIFS.2006.890517
    • Wang, Y. and Moulin, P., "Optimized feature extraction for learning-based image steganalysis," IEEE Transactions on Information Forensics and Security 2, 31-45 (March 2007). (Pubitemid 46375829)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.1 , pp. 31-45
    • Wang, Y.1    Moulin, P.2
  • 6
    • 67249096555 scopus 로고    scopus 로고
    • Improvement of tnd steganalysis based on image complexity
    • October
    • Wang, R. and Zhao, W., "Improvement of tnd steganalysis based on image complexity," 9th International Conference on Signal Processing , 2777-2781 (October 2008).
    • (2008) 9th International Conference on Signal Processing , pp. 2777-2781
    • Wang, R.1    Zhao, W.2
  • 8
    • 44649098085 scopus 로고    scopus 로고
    • A review on blind detection for image steganography
    • Luo, X.-Y., Wang, D.-S., Wang, P., and Liu, F.-L., "A review on blind detection for image steganography," Signal Processing 88(9), 2138-2157 (2008).
    • (2008) Signal Processing , vol.88 , Issue.9 , pp. 2138-2157
    • Luo, X.-Y.1    Wang, D.-S.2    Wang, P.3    Liu, F.-L.4
  • 9
    • 77951863909 scopus 로고    scopus 로고
    • Principal feature selection and fusion method for image steganalysis
    • Qin, J., Sun, X., Xiang, X., and Niu, C., "Principal feature selection and fusion method for image steganalysis," Journal of Electronic Imaging 18(3), 033009 (2009).
    • (2009) Journal of Electronic Imaging , vol.18 , Issue.3 , pp. 033009
    • Qin, J.1    Sun, X.2    Xiang, X.3    Niu, C.4
  • 10
    • 34548017677 scopus 로고    scopus 로고
    • Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images
    • DOI 10.1016/j.patcog.2007.06.005, PII S0031320307002658
    • Liu, Q., Sung, A. H., Chen, Z., and Xu, J., "Feature mining and pattern classification for steganalysis of lsb matching steganography in grayscale images," Pattern Recognition 41(1), 56-66 (2008). (Pubitemid 47284217)
    • (2008) Pattern Recognition , vol.41 , Issue.1 , pp. 56-66
    • Liu, Q.1    Sung, A.H.2    Chen, Z.3    Xu, J.4
  • 13
    • 2642537531 scopus 로고    scopus 로고
    • On partial least squares dimension reduction for microarray-based classification: A simulation study
    • Nguyen, D. V. and Rocke, D. M., "On partial least squares dimension reduction for microarray-based classification: a simulation study," Computational Statistics & Data Analysis 46(3), 407-425 (2004).
    • (2004) Computational Statistics & Data Analysis , vol.46 , Issue.3 , pp. 407-425
    • Nguyen, D.V.1    Rocke, D.M.2
  • 15
    • 0020998698 scopus 로고
    • On using principal components before separating a mixture of two multivariate normal distributions
    • Chang, W.-C., "On using principal components before separating a mixture of two multivariate normal distributions," Journal of the Royal Statistical Society. Series C (Applied Statistics) 32(3), 267-275 (1983).
    • (1983) Journal of the Royal Statistical Society. Series C (Applied Statistics) , vol.32 , Issue.3 , pp. 267-275
    • Chang, W.-C.1
  • 16
    • 47949115223 scopus 로고    scopus 로고
    • Application of principal component analysis to distinguish patients with schizophrenia from healthy controls based on fractional anisotropy measurements
    • Caprihan, A., Pearlson, G. D., and Calhoun, V. D., "Application of principal component analysis to distinguish patients with schizophrenia from healthy controls based on fractional anisotropy measurements," Neuroimage 42, 675-682 (2008).
    • (2008) Neuroimage , vol.42 , pp. 675-682
    • Caprihan, A.1    Pearlson, G.D.2    Calhoun, V.D.3
  • 17
    • 0039945552 scopus 로고
    • Geographical and interspecific cranial variation in big-eared ground squirrels (spermophilus): A multivariate study
    • March
    • Robinson, J. W. and Hoffmann, R. S., "Geographical and interspecific cranial variation in big-eared ground squirrels (spermophilus): A multivariate study," Systematic Zoology 24, 79-88 (March 1975).
    • (1975) Systematic Zoology , vol.24 , pp. 79-88
    • Robinson, J.W.1    Hoffmann, R.S.2
  • 18
    • 0024281187 scopus 로고
    • Neurometrics: Computer-assisted differential diagnosis of brain dysfunctions
    • John, E., Prichep, L., Fridman, J., and Easton, P., "Neurometrics: computer-assisted differential diagnosis of brain dysfunctions," Science 239(4836), 162-169 (1988). (Pubitemid 18026016)
    • (1988) Science , vol.239 , Issue.4836 , pp. 162-169
    • John, E.R.1    Prichep, L.S.2    Fridman, J.3    Easton, P.4
  • 20
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • Information Hiding, Springer Berlin / Heidelberg
    • Fridrich, J., "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in [Information Hiding], Lecture Notes in Computer Science 3200, 67-81, Springer Berlin / Heidelberg (2005).
    • (2005) Lecture Notes in Computer Science , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 21
    • 33646134392 scopus 로고    scopus 로고
    • Blind statistical steganalysis of additive steganography using wavelet higher order statistics
    • Communications and Multimedia Security, Springer Berlin / Heidelberg
    • Holotyak, T., Fridrich, J., and Voloshynovskiy, S., "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in [Communications and Multimedia Security], Lecture Notes in Computer Science 3677, 273-274, Springer Berlin / Heidelberg (2005).
    • (2005) Lecture Notes in Computer Science , vol.3677 , pp. 273-274
    • Holotyak, T.1    Fridrich, J.2    Voloshynovskiy, S.3
  • 22
    • 70350499655 scopus 로고    scopus 로고
    • Feature reduction and payload location with wam steganalysis
    • SPIE
    • Ker, A. D. and Lubenko, I., "Feature reduction and payload location with wam steganalysis," Media Forensics and Security 7254(1), 72540A, SPIE (2009).
    • (2009) Media Forensics and Security , vol.7254 , Issue.1
    • Ker, A.D.1    Lubenko, I.2
  • 24
    • 38049166461 scopus 로고    scopus 로고
    • A markov process based approach to effective attacking JPEG steganography
    • Information Hiding, Springer Berlin / Heidelberg
    • Shi, Y. Q., Chen, C., and Chen, W., "A markov process based approach to effective attacking JPEG steganography," in [Information Hiding], Lecture Notes in Computer Science 4437, 249-264, Springer Berlin / Heidelberg (2007).
    • (2007) Lecture Notes in Computer Science , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 26
    • 33750990501 scopus 로고    scopus 로고
    • A feature selection methodology for steganalysis
    • Multimedia Content Representation, Classiffication and Security, Springer Berlin / Heidelberg
    • Miche, Y., Roue, B., Lendasse, A., and and, P. B., "A feature selection methodology for steganalysis," in [Multimedia Content Representation, Classiffication and Security], Lecture Notes in Computer Science 4105, 49-56, Springer Berlin / Heidelberg (2006).
    • (2006) Lecture Notes in Computer Science , vol.4105 , pp. 49-56
    • Miche, Y.1    Roue, B.2    Lendasse, A.3    B, P.4
  • 28
    • 51749089283 scopus 로고    scopus 로고
    • Jpeg image steganalysis utilizing both intrablock and interblock correlations
    • May
    • Chen, C. and Shi, Y. Q., "Jpeg image steganalysis utilizing both intrablock and interblock correlations," IEEE International Symposium on Circuits and Systems , 3029-3032 (May 2008).
    • (2008) IEEE International Symposium on Circuits and Systems , pp. 3029-3032
    • Chen, C.1    Shi, Y.Q.2
  • 29
    • 69949179954 scopus 로고    scopus 로고
    • Universal jpeg steganalysis based on microscopic and macroscopic calibration
    • October
    • Huang, F., Huang, J., and Li, B., "Universal jpeg steganalysis based on microscopic and macroscopic calibration," 15th IEEE International Conference on Image Processing , 2068-2071 (October 2008).
    • (2008) 15th IEEE International Conference on Image Processing , pp. 2068-2071
    • Huang, F.1    Huang, J.2    Li, B.3
  • 35
    • 84937814312 scopus 로고    scopus 로고
    • F5: A steganographic algorithm
    • Information Hiding, Springer Berlin / Heidelberg
    • Westfeld, A., "F5: A steganographic algorithm," in [Information Hiding], Lecture Notes in Computer Science 2137, 289-302, Springer Berlin / Heidelberg (2001).
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 36
    • 80054840132 scopus 로고    scopus 로고
    • "Jphide&seek." http://linux01.gwdg.de/~alatham/stego.html.
    • Jphide&seek
  • 37
    • 77951838992 scopus 로고    scopus 로고
    • "Steghide." http://steghide.sourceforge.net/.
    • Steghide
  • 38
    • 77951789528 scopus 로고    scopus 로고
    • "Jsteg." http://zooid.org/paul/crypto/jsteg/.
    • Jsteg
  • 39
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Burges, C. J., "A tutorial on support vector machines for pattern recognition," Data Mining and Knowledge Discovery 2, 121-167 (1998).
    • (1998) Data Mining and Knowledge Discovery , vol.2 , pp. 121-167
    • Burges, C.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.