메뉴 건너뛰기




Volumn 18, Issue 3, 2009, Pages

Principal feature selection and fusion method for image steganalysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL TIME; COVER-IMAGE; FEATURE SETS; FEATURES SELECTION; FUSION METHODS; LINEAR TRANSFORM; MULTICOLLINEARITY; PRINCIPAL COMPONENTS ANALYSIS; REDUNDANT FEATURES; RELIABLE DETECTION; STEGANALYSIS; STEGANOGRAPHIC ALGORITHMS; STEGO IMAGE; UNIVERSAL APPROACH;

EID: 77951863909     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.3206961     Document Type: Article
Times cited : (36)

References (39)
  • 1
    • 21844461602 scopus 로고    scopus 로고
    • Maximum likelihood estimation of length of secret message embedded using K steganography in spatial domain
    • DOI 10.1117/12.584426, 60, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
    • J. Fridrich, D. Soukal, and M. Goljan, "Maximum likelihood estimation of length of secret message embedded using (K steganography in spatial domain," in Proc. Int. Conf. SPIE Electronic Imaging, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 5681, 595-606 (2005). (Pubitemid 40953017)
    • (2005) Proceedings of SPIE - The International Society for Optical Engineering , vol.5681 , pp. 595-606
    • Fridrich, J.1    Soukal, D.2    Goljan, M.3
  • 2
    • 80455153313 scopus 로고    scopus 로고
    • Searching for hidden messages: Automatic detection of steganography
    • J. Riedl and R. W. Hill Jr., Eds., Association for the Advancement of Artificial Intelligence (AAAI), Meno Park, CA
    • G. Berg, I. Davidson, M.-Y. Duan, and G. Paul, "Searching for hidden messages: Automatic detection of steganography," in Proc. ACM Int. Conf. Knowledge Discovery and Data Mining, J. Riedl and R. W. Hill Jr., Eds., pp. 545-550, Association for the Advancement of Artificial Intelligence (AAAI), Meno Park, CA (2004).
    • (2004) Proc. ACM Int. Conf. Knowledge Discovery and Data Mining , pp. 545-550
    • Berg, G.1    Davidson, I.2    Duan, M.-Y.3    Paul, G.4
  • 3
    • 33750990501 scopus 로고    scopus 로고
    • A feature selection methodology for steganalysis," in Proc. Int. Workshop on Multimedia Content Representation, Classification, and Security, P. Gros, Ed
    • Y. Miche, B. Roue, A. Lendasse, and P. Bas, "A feature selection methodology for steganalysis," in Proc. Int. Workshop on Multimedia Content Representation, Classification, and Security, P. Gros, Ed., Lect. Notes Comput. Sci. 4105, 49-56 (2006).
    • (2006) Lect. Notes Comput. Sci. , vol.4105 , pp. 49-56
    • Miche, Y.1    Roue, B.2    Lendasse, A.3    Bas, P.4
  • 4
    • 33646167860 scopus 로고    scopus 로고
    • Towards multi-class blind steganalyzer for JPEG images
    • M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds. Lect. Notes Comput. Sci.
    • T. Pevný and J. Fridrich, "Towards multi-class blind steganalyzer for JPEG images," in Proc. Int. Workshop on Digital Watermarking, M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds., Lect. Notes Comput. Sci. 3710, 39-53 (2005).
    • (2005) Proc. Int. Workshop on Digital Watermarking , vol.3710 , pp. 39-53
    • Pevný, T.1    Fridrich, J.2
  • 5
    • 34548232251 scopus 로고    scopus 로고
    • Merging Markov and DCT features for multi-class JPEG steganalysis," in Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp III and P. W. Wong, Eds
    • T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," in Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 5681, 650503 (2007).
    • (2007) Proc. SPIE , vol.5681 , pp. 650503
    • Pevný, T.1    Fridrich, J.2
  • 6
    • 0034775171 scopus 로고    scopus 로고
    • Steganalysis of watermarking techniques using image quality metrics
    • DOI 10.1117/12.435436
    • I. Avcibaş, N. Memon, and B. Sankur, "Steganalysis of watermarking techniques using image quality metrics," in Electronic Imaging, Security and Watermarking of Multimedia Contents, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 4314, 523-531 (2001). (Pubitemid 33012271)
    • (2001) Proceedings of SPIE - The International Society for Optical Engineering , vol.4314 , pp. 523-531
    • Avcibas, I.1    Memon, N.2    Sankur, B.3
  • 7
    • 0036448130 scopus 로고    scopus 로고
    • Image steganalysis with binary similarity measures
    • I. Avcibaş, N. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," IEEE Trans. Image Process. 3(6), 645-648 (2002).
    • (2002) IEEE Trans. Image Process. , vol.3 , Issue.6 , pp. 645-648
    • Avcibas, I.1    Memon, N.2    Sankur, B.3
  • 9
    • 0036452586 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistical models
    • IEEE, Piscataway, NJ
    • H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. IEEE Int. Conf. Image Processing, pp. 905-908, IEEE, Piscataway, NJ (2002).
    • (2002) Proc. IEEE Int. Conf. Image Processing , pp. 905-908
    • Farid, H.1
  • 10
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • F. A. P. Petitcolas, Eds. Lect. Notes Comput. Sci.
    • S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in 5th Int. Workshop on Information Hiding, F. A. P. Petitcolas, Eds., Lect. Notes Comput. Sci. 2578, 340-354 (2002).
    • (2002) 5th Int. Workshop on Information Hiding , vol.2578 , pp. 340-354
    • Lyu, S.1    Farid, H.2
  • 11
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Secur. 1(1), 111-119 (2006).
    • (2006) IEEE Trans. Inf. Forensics Secur. , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 13
    • 33645660635 scopus 로고    scopus 로고
    • Multiclass blind steganalysis for JPEG images
    • E. J. Delp III and P. W. Wong, Eds., Proc. SPIE
    • T. Pevný and J. Fridrich, "Multiclass blind steganalysis for JPEG images," in Electronic Imaging, Photonics West, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 6072, 60720O (2006).
    • (2006) Electronic Imaging, Photonics West , vol.6072
    • Pevný, T.1    Fridrich, J.2
  • 14
    • 33646134392 scopus 로고    scopus 로고
    • Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in 9th IFIP TC-6/TC-11 Conf. Communications and Multimedia Security
    • T. Holotyak, J. Fridrich, and S. Voloshynovskiy, "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in 9th IFIP TC-6/TC-11 Conf. Communications and Multimedia Security, Lect. Notes Comput. Sci. 3677, 273-284 (2005).
    • (2005) Lect. Notes Comput. Sci. , vol.3677 , pp. 273-284
    • Holotyak, T.1    Fridrich, J.2    Voloshynovskiy, S.3
  • 19
    • 0035472155 scopus 로고    scopus 로고
    • Detecting LSB steganography in color and gray-scale images
    • DOI 10.1109/93.959097
    • J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images," IEEE Multimedia 3, 22-28 (2001). (Pubitemid 33018249)
    • (2001) IEEE Multimedia , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 21
    • 0037524382 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • S. Dumitrescu, X. L. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. Signal Process. 51(7), 1995-2007 (2003).
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.7 , pp. 1995-2007
    • Dumitrescu, S.1    Wu, X.L.2    Wang, Z.3
  • 22
    • 29044433896 scopus 로고    scopus 로고
    • A feature-based classification technique for blind image steganalysis
    • W. N. Lie and G. S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Trans. Multimedia 7(6), 1007-1020 (2005).
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.6 , pp. 1007-1020
    • Lie, W.N.1    Lin, G.S.2
  • 24
    • 42949152730 scopus 로고    scopus 로고
    • Statistical moments based universal steganalysis Using JPEG-2D array and 2-D characteristic function
    • Atlanta, GA, October 8-11, 2006, IEEE, Piscataway, NJ
    • C. Chen, Y. Q. Shi, W. Chen, and G. Xuan, "Statistical moments based universal steganalysis Using JPEG-2D array and 2-D characteristic function," in Proc. Int Conf. on Image Processing (ICIP 2006), Atlanta, GA, October 8-11, 2006, pp. 105-108, IEEE, Piscataway, NJ (2006)
    • (2006) Proc. Int Conf. on Image Processing (ICIP 2006) , pp. 105-108
    • Chen, C.1    Shi, Y.Q.2    Chen, W.3    Xuan, G.4
  • 25
    • 33847717054 scopus 로고    scopus 로고
    • Optimized feature extraction for learning-based image steganalysis
    • DOI 10.1109/TIFS.2006.890517
    • Y. Wang and P. Moulin, "Optimized feature extraction for learningbased image steganalysis," IEEE Trans. Inf. Forensics Secur. 2(1), 31-45 (2007). (Pubitemid 46375829)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.1 , pp. 31-45
    • Wang, Y.1    Moulin, P.2
  • 30
    • 34548203998 scopus 로고    scopus 로고
    • Dimension reduction via principal variables
    • DOI 10.1016/j.csda.2007.02.012, PII S0167947307000564
    • J. A. Cumming and D. A. Wooff, "Dimension reduction via principal variables," Comput. Stat. Data Anal. 2007(52), 550-565 (2007). (Pubitemid 47331724)
    • (2007) Computational Statistics and Data Analysis , vol.52 , Issue.1 , pp. 550-565
    • Cumming, J.A.1    Wooff, D.A.2
  • 33
    • 68349127643 scopus 로고    scopus 로고
    • available online at, Mar. 26
    • A. Westfeld, "F5," available online at http://wwwrn.inf.tu- dresden.de/~westfeld/f5.html, Mar. 26, 2006.
    • (2006) F5
    • Westfeld, A.1
  • 34
    • 33847721963 scopus 로고    scopus 로고
    • available online at, Mar. 24
    • N. Provos, "Outguess," available online at http://www.outguess. org, Mar. 24, 2006.
    • (2006) Outguess
    • Provos, N.1
  • 35
    • 35048819204 scopus 로고    scopus 로고
    • Model based steganography
    • T. Kalker, I. Cox, and Y. M. Ro, Eds., Lect. Notes Comput. Sci.
    • P. Sallee, "Model based steganography," in Proc. Int. Workshop on Digital Watermarking, T. Kalker, I. Cox, and Y. M. Ro, Eds., Lect. Notes Comput. Sci. 2939, 174-188 (2004).
    • (2004) Proc. Int. Workshop on Digital Watermarking , vol.2939 , pp. 174-188
    • Sallee, P.1
  • 36
    • 84873189165 scopus 로고    scopus 로고
    • available online at, Mar. 24
    • S. Hetzl, "Steghide," available online at http://steghide. sourceforger.net, Mar. 24, 2006.
    • (2006) Steghide
    • Hetzl, S.1
  • 37
    • 84875600849 scopus 로고    scopus 로고
    • available online at, Apr. 6
    • L. B. Chen, "Svm-Chen 2.0," available online at http://svmligh.joachims.org, Apr. 6, 2006.
    • (2006) Svm-Chen 2.0
    • Chen, L.B.1
  • 38
    • 52249093733 scopus 로고    scopus 로고
    • Steganalysis based on lifting wavelet transform for Palette images
    • Y. P. Wang, Q. F. Zhang, H. L. Liu, and Z. M. Niu, Eds., IEEE Computer Soc., Washington, DC
    • J. H. Qin, X. M. Sun, and X. Y. Xiang, "Steganalysis based on lifting wavelet transform for Palette images," in Proc. Int. Workshop on Computational Intelligence and Security, Y. P. Wang, Q. F. Zhang, H. L. Liu, and Z. M. Niu, Eds., pp. 672-675, IEEE Computer Soc., Washington, DC (2007).
    • (2007) Proc. Int. Workshop on Computational Intelligence and Security , pp. 672-675
    • Qin, J.H.1    Sun, X.M.2    Xiang, X.Y.3
  • 39
    • 70350499655 scopus 로고    scopus 로고
    • Feature reduction and payload location with WAM steganalysis," in Media Forensics and Security XI
    • 72540A
    • A. Ker and I. Lubenko, "Feature reduction and payload location with WAM steganalysis," in Media Forensics and Security XI, A. D. Ker, and I. Lubenko, Eds., Proc. SPIE 7254, 72540A (2009).
    • (2009) Proc. SPIE , vol.7254
    • Ker, A.1    Lubenko, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.