메뉴 건너뛰기




Volumn 5, Issue 2, 2010, Pages 225-239

Matrix embedding with pseudorandom coefficient selection and error correction for robust and secure steganography

Author keywords

Log likelihood ratio (LLR); Matrix embedding (ME); Repeat accumulate coding; Steganalysis; Steganography

Indexed keywords

BIT-ERRORS; DATA RATES; DECODING ERRORS; DETECTABILITY; DETECTION RATES; EMBEDDING DISTORTION; LINEAR CODES; LOG LIKELIHOOD RATIO; LOG-LIKELIHOOD RATIOS; MANY-TO-ONE; MATRIX; PSEUDO RANDOM; QUANTIZATION INDEX MODULATION; RA CODES; REPEAT ACCUMULATE CODES; REPEAT-ACCUMULATE CODING; SECURE STEGANOGRAPHY; STEGANALYSIS; STEGANOGRAPHIC SCHEMES;

EID: 77952646597     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2046218     Document Type: Article
Times cited : (44)

References (31)
  • 1
    • 77952661671 scopus 로고    scopus 로고
    • Estimating the Redundancy Factor for RA-encoded sequences and also Studying Ste-ganalysis Performance of YASS Univ. of California, Santa Barbara, Dec, Online. Available
    • A. Sarkar, U. Madhow, and B. S. Manjunath, Estimating the Redundancy Factor for RA-encoded sequences and also Studying Ste-ganalysis Performance of YASS Univ. of California, Santa Barbara, Dec. 2008 [Online]. Available: http://vision. ece.ucsb.edu/publica-tions/Sarkar-tech-report-estimate-q.pdf
    • (2008)
    • Sarkar, A.1    Madhow, U.2    Manjunath, B.S.3
  • 4
    • 24144456920 scopus 로고    scopus 로고
    • Public-key steganography with active attacks
    • in, Springer
    • M. Backes and C. Cachin, "Public-key steganography with active attacks, " in Proc. Theory of Cryptography Conf., 2005, vol. 3378, pp. 210-226, Springer.
    • (2005) Proc. Theory of Cryptography Conf. , vol.3378 , pp. 210-226
    • Backes, M.1    Cachin, C.2
  • 5
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, " IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001. (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 6
    • 51749089283 scopus 로고    scopus 로고
    • JPEG image steganalysis utilizing both in-trablock and interblock correlations
    • in, May
    • C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both in-trablock and interblock correlations, " in Proc. Int. Symp. Circuits and Systems (ISCAS), May 2008, pp. 3029-3032.
    • (2008) Proc. Int. Symp. Circuits and Systems (ISCAS) , pp. 3029-3032
    • Chen, C.1    Shi, Y.Q.2
  • 7
    • 77952605912 scopus 로고    scopus 로고
    • Some Notes on Steganography, Posted on Steganography Mailing List, Online. Available
    • R. Crandall, Some Notes on Steganography, Posted on Steganography Mailing List 1998 [Online]. Available: http://os.inf.tu-dresden. de/~westfeld/crandall. pdf
    • (1998)
    • Crandall, R.1
  • 8
    • 84957887122 scopus 로고    scopus 로고
    • On public-key steganography in the presence of an active warden
    • in, Springer
    • S. Craver, "On public-key steganography in the presence of an active warden, " in Proc. Second Int. Information Hiding Workshop, pp. 355-368, Springer.
    • Proc. Second Int. Information Hiding Workshop , pp. 355-368
    • Craver, S.1
  • 13
    • 33645015900 scopus 로고    scopus 로고
    • Wet paper codes with improved embedding efficiency
    • Mar
    • J. Fridrich, M. Goljan, and D. Soukal, "Wet paper codes with improved embedding efficiency, " IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 102-110, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 102-110
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 14
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • in, Sep
    • J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities, " in Proc. ACM, Sep. 2007, pp. 3-14.
    • (2007) Proc. ACM , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 15
    • 33748096430 scopus 로고    scopus 로고
    • Matrix embedding for large payloads
    • Sep
    • J. Fridrich and D. Soukal, "Matrix embedding for large payloads, " IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 390-395, Sep. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.3 , pp. 390-395
    • Fridrich, J.1    Soukal, D.2
  • 16
    • 21844447330 scopus 로고    scopus 로고
    • Image steganography: Concepts and practice
    • in, Singapore: Institute for Mathematical Sciences, National University of Singapore
    • M. Kharrazi, H. Sencar, and N. Memon, "Image steganography: Concepts and practice, " in Lecture Note Series. Singapore: Institute for Mathematical Sciences, National University of Singapore.
    • Lecture Note Series
    • Kharrazi, M.1    Sencar, H.2    Memon, N.3
  • 18
    • 42949124470 scopus 로고    scopus 로고
    • Influence of embedding strategies on security of steganographic methods in the JPEG domain
    • in, San Jose, CA, Jan
    • J. Kodovský and J. Fridrich, "Influence of embedding strategies on security of steganographic methods in the JPEG domain, " in Proc. SPIE, San Jose, CA, Jan. 2008, pp. 21-213.
    • (2008) Proc. SPIE , pp. 21-213
    • Kodovský, J.1    Fridrich, J.2
  • 22
    • 33645660635 scopus 로고    scopus 로고
    • Multi-class blind steganalysis for JPEG images
    • in, San Jose, CA
    • T. Pevný and J. Fridrich, "Multi-class blind steganalysis for JPEG images, " in Proc. SPIE, San Jose, CA, 2006, pp. 257-269.
    • (2006) Proc. SPIE , pp. 257-269
    • Pevný, T.1    Fridrich, J.2
  • 23
    • 34548232251 scopus 로고    scopus 로고
    • Merging Markov and DCT features for multi-class JPEG steganalysis
    • in, San Jose, CA
    • T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis, " in Proc. SPIE, San Jose, CA, 2007, pp. 3 1-3 14.
    • (2007) Proc. SPIE , pp. 31-314
    • Pevný, T.1    Fridrich, J.2
  • 24
    • 39349083934 scopus 로고    scopus 로고
    • Design of rate-compatible punctured repeat-accumulate codes
    • DOI 10.1109/GLOCOM.2007.285, 4411195, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
    • S. Planjery and T. Gulliver, "Design of rate-compatible punctured repeat-accumulate codes, " in IEEE Global Telecommunications Conf. 2007 (GLOBECOM'07), 2007, pp. 1482-1487. (Pubitemid 351259273)
    • (2007) GLOBECOM - IEEE Global Telecommunications Conference , pp. 1482-1487
    • Planjery, S.K.1    Gulliver, T.A.2
  • 25
    • 69749094893 scopus 로고    scopus 로고
    • Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - A randomized block based hiding scheme
    • in, Oct
    • A. Sarkar, L. Nataraj, B. S. Manjunath, and U. Madhow, "Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme, " in Proc. ICIP, Oct. 2008, pp. 1292-1295.
    • (2008) Proc. ICIP , pp. 1292-1295
    • Sarkar, A.1    Nataraj, L.2    Manjunath, B.S.3    Madhow, U.4
  • 29
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5-A steganographic algorithm)
    • in, Apr
    • A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm), " in 4th Int. Workshop on Information Hiding, Apr. 2001, vol. 2137, pp. 289-302.
    • (2001) 4th Int. Workshop on Information Hiding , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 30
    • 77957943117 scopus 로고    scopus 로고
    • Breaking the YASS algorithm via pixel and DCT coefficients analysis
    • X. Yu and N. Babaguchi, "Breaking the YASS algorithm via pixel and DCT coefficients analysis, " in 19th Int. Conf. Pattern Recognition, 2008, pp. 1-4.
    • (2008) 19th Int. Conf. Pattern Recognition , pp. 1-4
    • Yu, X.1    Babaguchi, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.