메뉴 건너뛰기




Volumn 12, Issue 5, 2010, Pages 345-357

A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm

Author keywords

Data embedding; human visual system; image watermarking; steganalysis; steganography

Indexed keywords

BASE SCHEME; CLOSED-LOOP; COMPUTING FRAMEWORKS; DATA EMBEDDING; EMBEDDING CAPACITY; HUMAN VISUAL SYSTEM; HUMAN VISUAL SYSTEMS; IMAGE STEGANOGRAPHY; IMAGE WATERMARKING; KEY ISSUES; PERFORMANCE INDICES; PICTURE QUALITY; SIMULATED ANNEALING ALGORITHMS; SIZE VARIATION; STATISTICAL FEATURES; STEGANALYSIS; STEGANOGRAPHIC SCHEMES;

EID: 77954713951     PISSN: 15209210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMM.2010.2051243     Document Type: Article
Times cited : (51)

References (34)
  • 1
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding-A survey
    • Jul.
    • F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-A survey," Proc. IEEE, vol.87, no.7, pp. 1062-1078, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 2
    • 0038343416 scopus 로고    scopus 로고
    • Steganalysis using image quality metrics
    • Feb.
    • I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Trans. Image Process., vol.12, no.2, pp. 221-229, Feb. 2003.
    • (2003) IEEE Trans. Image Process. , vol.12 , Issue.2 , pp. 221-229
    • Avcibas, I.1    Memon, N.2    Sankur, B.3
  • 3
    • 29044433896 scopus 로고    scopus 로고
    • A feature-based classification technique for blind image steganalysis
    • Dec.
    • W.-N. Lie and G.-S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Trans. Multimedia, vol.7, no.6, pp. 1007-1020, Dec. 2005.
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.6 , pp. 1007-1020
    • Lie, W.-N.1    Lin, G.-S.2
  • 4
    • 33748119112 scopus 로고    scopus 로고
    • Dual protection of JPEG images based on informed embedding and two-stage watermark extraction
    • Sep.
    • W.-N. Lie, G.-S. Lin, and S.-L. Cheng, "Dual protection of JPEG images based on informed embedding and two-stage watermark extraction," IEEE Trans. Inf. Forensics Security, vol.1, no.3, pp. 330-341, Sep. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.3 , pp. 330-341
    • Lie, W.-N.1    Lin, G.-S.2    Cheng, S.-L.3
  • 7
    • 2942568431 scopus 로고    scopus 로고
    • Applying informed coding and embedding to design a robust high-capacity watermark
    • Jun.
    • M. L. Miller, G. J. Doerr, and I. J. Cox, "Applying informed coding and embedding to design a robust high-capacity watermark," IEEE Trans. Image Process., vol.13, no.6, pp. 792-807, Jun. 2004.
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.6 , pp. 792-807
    • Miller, M.L.1    Doerr, G.J.2    Cox, I.J.3
  • 8
    • 33645985020 scopus 로고    scopus 로고
    • Human visual system models in digital image watermarking
    • Dec.
    • D. Levicky and P. Foris, "Human visual system models in digital image watermarking," Radioengineering, vol.13, no.4, pp. 38-43, Dec. 2004.
    • (2004) Radioengineering , vol.13 , Issue.4 , pp. 38-43
    • Levicky, D.1    Foris, P.2
  • 11
    • 31744433507 scopus 로고    scopus 로고
    • Genetic algorithm based methodology for breaking the steganalytic systems
    • Feb.
    • Y.-T. Wu and F. Y. Shih, "Genetic algorithm based methodology for breaking the steganalytic systems," IEEE Trans. Syst., Man, Cybern. B, vol.36, no.1, pp. 25-31, Feb. 2006.
    • (2006) IEEE Trans. Syst., Man, Cybern. B , vol.36 , Issue.1 , pp. 25-31
    • Wu, Y.-T.1    Shih, F.Y.2
  • 12
    • 10444262110 scopus 로고    scopus 로고
    • [Online]. Available
    • D. Upham, JSteg, 1997. [Online]. Available: http://www.funet.fi/pub/ crypt/steganography/jpeg-jsteg-v4.diff.gz.
    • (1997) JSteg
    • Upham, D.1
  • 13
    • 0038675417 scopus 로고    scopus 로고
    • A fast and effective steganalytic technique against JSteg-like algorithms
    • T. Zhang and X. Ping, "A fast and effective steganalytic technique against JSteg-like algorithms," in Proc. ACM Symp. Applied Computing, 2003, pp. 307-311.
    • (2003) Proc. ACM Symp. Applied Computing , pp. 307-311
    • Zhang, T.1    Ping, X.2
  • 14
    • 0036034444 scopus 로고    scopus 로고
    • Practical steganalysis of digital imagesstate of the art
    • J. Fridrich and M. Goljan, "Practical steganalysis of digital imagesstate of the art," in Proc. SPIE, 2002, vol.4675, pp. 1-13.
    • (2002) Proc. SPIE , vol.4675 , pp. 1-13
    • Fridrich, J.1    Goljan, M.2
  • 15
    • 84949935752 scopus 로고    scopus 로고
    • A newsteganalysis approach based on both complexity estimate and statistical filter
    • LNCS
    • X.Kong, T. Zhang, X.You, and D.Yang, "A newsteganalysis approach based on both complexity estimate and statistical filter," in Proc. IEEE Pacific-Rim Conf. Multimedia, 2002, vol.2532, LNCS, pp. 434-441.
    • (2002) Proc. IEEE Pacific-Rim Conf. Multimedia , vol.2532 , pp. 434-441
    • Kong, X.1    Zhang, T.2    You, X.3    Yang, D.4
  • 16
    • 0036028267 scopus 로고    scopus 로고
    • A mathematical approach to steganalysis
    • R. Chandramouli, "A mathematical approach to steganalysis," in Proc. SPIE, 2002, vol.4675, pp. 14-25.
    • (2002) Proc. SPIE , vol.4675 , pp. 14-25
    • Chandramouli, R.1
  • 17
    • 0242576328 scopus 로고    scopus 로고
    • Steganalysis of additive noise modelable information hiding
    • J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. SPIE, 2003, vol.5020, pp. 21-24.
    • (2003) Proc. SPIE , vol.5020 , pp. 21-24
    • Harmsen, J.J.1    Pearlman, W.A.2
  • 18
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using high-order image statistics
    • Mar.
    • S. Lyu and H. Farid, "Steganalysis using high-order image statistics," IEEE Trans. Inf. Forensics Security, vol.1, no.1, pp. 111-119, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 22
    • 0035440147 scopus 로고    scopus 로고
    • An additive approach to transform-domain information hiding and optimum detection structure
    • Sep.
    • Q. Cheng and T. S. Huang, "An additive approach to transform-domain information hiding and optimum detection structure," IEEE Trans. Multimedia, vol.3, no.3, pp. 273-284, Sep. 2001.
    • (2001) IEEE Trans. Multimedia , vol.3 , Issue.3 , pp. 273-284
    • Cheng, Q.1    Huang, T.S.2
  • 23
    • 33847697308 scopus 로고    scopus 로고
    • Steganalysis of embedding in two least-significant bits
    • Mar.
    • A. D. Ker, "Steganalysis of embedding in two least-significant bits," IEEE Trans. Inf. Forensics Security, vol.2, no.1, pp. 46-54, Mar. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.1 , pp. 46-54
    • Ker, A.D.1
  • 24
    • 42949146877 scopus 로고    scopus 로고
    • Determining the stego algorithm for JPEG images
    • T. Pevny and J. Fridrich, "Determining the stego algorithm for JPEG images," Proc. Inst. Elect. Eng., Inf. Security, vol.153, no.3, pp. 77-164, 2006.
    • (2006) Proc. Inst. Elect. Eng., Inf. Security , vol.153 , Issue.3 , pp. 77-164
    • Pevny, T.1    Fridrich, J.2
  • 25
    • 33845623763 scopus 로고    scopus 로고
    • Digital video steganalysis exploiting statistical visibility in the temporal domain
    • Dec.
    • U. Budhia, D. Kundur, and T. Zourntos, "Digital video steganalysis exploiting statistical visibility in the temporal domain," IEEE Trans. Inf. Forensics Security, vol.1, no.4, pp. 502-516, Dec. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.4 , pp. 502-516
    • Budhia, U.1    Kundur, D.2    Zourntos, T.3
  • 27
    • 67650175930 scopus 로고    scopus 로고
    • Steganalysis of multiple-base notational system steganography
    • B. Lin, Y. Fang, and J. Huang, "Steganalysis of multiple-base notational system steganography," IEEE Signal Process. Lett., vol.15, pp. 493-496, 2008.
    • (2008) IEEE Signal Process. Lett. , vol.15 , pp. 493-496
    • Lin, B.1    Fang, Y.2    Huang, J.3
  • 28
    • 0141489940 scopus 로고    scopus 로고
    • Data embedding into pictorial images with less distortion using discrete cosine transform
    • T. Ogihara, D. Nakamura, and N. Yokoya, "Data embedding into pictorial images with less distortion using discrete cosine transform," in Proc. Int. Conf. Pattern Recognition, 1996, pp. 675-679.
    • (1996) Proc. Int. Conf. Pattern Recognition , pp. 675-679
    • Ogihara, T.1    Nakamura, D.2    Yokoya, N.3
  • 30
    • 44049091622 scopus 로고    scopus 로고
    • Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques
    • Jun.
    • C.-H. Huang, S.-C. Chuang, and J.-L. Wu, "Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques," IEEE Trans. Multimedia, vol.10, no.4, pp. 557-569, Jun. 2008.
    • (2008) IEEE Trans. Multimedia , vol.10 , Issue.4 , pp. 557-569
    • Huang, C.-H.1    Chuang, S.-C.2    Wu, J.-L.3
  • 31
    • 85032751036 scopus 로고    scopus 로고
    • Data hiding for fighting piracy
    • Mar.
    • M. Barni and F. Bartolini, "Data hiding for fighting piracy," IEEE Signal Process. Mag., vol.21, no.2, pp. 28-39, Mar. 2004.
    • (2004) IEEE Signal Process. Mag. , vol.21 , Issue.2 , pp. 28-39
    • Barni, M.1    Bartolini, F.2
  • 32
    • 37649010067 scopus 로고    scopus 로고
    • Breaking the BOWS watermarking system: Key guessing and sensitivity attacks
    • P. Comesana and F. Perex-Gonzales, "Breaking the BOWS watermarking system: Key guessing and sensitivity attacks," EURASIP J. Inf. Security, vol.2007, pp. 1-8, 2007.
    • (2007) EURASIP J. Inf. Security , vol.2007 , pp. 1-8
    • Comesana, P.1    Perex-Gonzales, F.2
  • 33
    • 84937814312 scopus 로고    scopus 로고
    • F5-a steganographic algorithm: High capacity despite better steganalysis
    • A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," Lecture Notes in Computer Science, vol.2137, pp. 289-302, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 34
    • 0038156437 scopus 로고    scopus 로고
    • Data hiding in image and video: Part I-Fundamental issues and solutions
    • Jun.
    • M. Wu and B. Liu, "Data hiding in image and video: Part I-Fundamental issues and solutions," IEEE Trans. Image Process., vol.12, no.6, pp. 685-695, Jun. 2003.
    • (2003) IEEE Trans. Image Process. , vol.12 , Issue.6 , pp. 685-695
    • Wu, M.1    Liu, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.