메뉴 건너뛰기




Volumn 20, Issue 6, 2010, Pages 1758-1770

Classification of steganalysis techniques: A study

Author keywords

Data hiding; Signature steganalysis; Statistical steganalysis; Steganalysis; Steganography

Indexed keywords

DIGITAL STORAGE;

EID: 77955421242     PISSN: 10512004     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dsp.2010.02.003     Document Type: Article
Times cited : (153)

References (115)
  • 4
    • 0035472155 scopus 로고    scopus 로고
    • Detecting LSB steganography in color and gray-scale images
    • DOI 10.1109/93.959097
    • J. Fridrich, M. Goljan, and R. Du Detecting LSB steganography in color and gray-scale images IEEE Multimedia Magaz., Special Issue on Security October-November 2001 22 28 (Pubitemid 33018249)
    • (2001) IEEE Multimedia , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 5
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • N. Johnson, and S. Jajodia Exploring steganography: Seeing the unseen IEEE Comput. 31 2 1998 26 34
    • (1998) IEEE Comput. , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.1    Jajodia, S.2
  • 6
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • Springer-Verlag Berlin
    • N.F. Johnson, and S. Jajodia Steganalysis of images created using current steganography software Lecture Notes in Computer Science vol. 1525 1998 Springer-Verlag Berlin 273 289
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 7
    • 0001931684 scopus 로고    scopus 로고
    • A survey of steganographic techniques
    • N.F. Johnson, and S. Katzenbeisser A survey of steganographic techniques S. Katzenbeisser, F. Petitcolas, Information Hiding 2000 Artech House Norwood, MA 43 78
    • (2000) Information Hiding , pp. 43-78
    • Johnson, N.F.1    Katzenbeisser, S.2
  • 10
    • 11844252006 scopus 로고    scopus 로고
    • Cyber warfare: Steganography vs. steganalysis
    • Huaiqing Wang, and Shuozhong Wang Cyber warfare: Steganography vs. steganalysis Commun. ACM 47 October 2004 76 82
    • (2004) Commun. ACM , vol.47 , pp. 76-82
    • Wang, H.1    Wang, S.2
  • 13
    • 27944507950 scopus 로고    scopus 로고
    • Steganalysis attacks on stego images using stego-signatures and statistical image properties
    • Tariq Al Hawi, Mahmoud Al Qutayari, Hassan Barada, Steganalysis attacks on stego images using stego-signatures and statistical image properties, in: TENCON 2004, Region 10 Conference, vol. 2, 2004, pp. 104-107
    • (2004) TENCON 2004, Region 10 Conference , vol.2 , pp. 104-107
    • Hawi, T.A.1    Qutayari, M.A.2    Barada, H.3
  • 16
    • 0027305609 scopus 로고
    • MR image texture analysis-An approach to tissue characterization
    • R.A. Lerski MR image texture analysis-An approach to tissue characterization Magn. Resonance Imaging 11 1993 873 887
    • (1993) Magn. Resonance Imaging , vol.11 , pp. 873-887
    • Lerski, R.A.1
  • 17
    • 77955431596 scopus 로고    scopus 로고
    • http://home.comcast.net/~ebm.md/stego/softwarewindows.html
  • 19
    • 35248881927 scopus 로고    scopus 로고
    • Detecting low embedding rates
    • Springer-Verlag Berlin
    • A. Westfeld Detecting low embedding rates Lecture Notes in Computer Science vol. 2578 2002 Springer-Verlag Berlin 324 339
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 324-339
    • Westfeld, A.1
  • 23
    • 0036448130 scopus 로고    scopus 로고
    • Image steganalysis with binary similarity measures
    • Rochester, New York, September
    • I. Avcibas, N. Memon, B. Sankur, Image steganalysis with binary similarity measures, in: IEEE Int. Conf. on Image Processing, Rochester, New York, September 2002
    • (2002) IEEE Int. Conf. on Image Processing
    • Avcibas, I.1    Memon, N.2    Sankur, B.3
  • 24
    • 0037524382 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • S. Dumitrescu, X. Wu, and Z. Wang Detection of LSB steganography via sample pair analysis IEEE Trans. Signal Process. 2003 1995 2007
    • (2003) IEEE Trans. Signal Process. , pp. 1995-2007
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 25
    • 0036450555 scopus 로고    scopus 로고
    • On steganalysis of random LSB embedding in continuous-tone images
    • Rochester, New York, September
    • S. Dumitrescu, X. Wu, N. Memon, On steganalysis of random LSB embedding in continuous-tone images, in: IEEE Int. Conf. on Image Processing, Rochester, New York, September 2002
    • (2002) IEEE Int. Conf. on Image Processing
    • Dumitrescu, S.1    Wu, X.2    Memon, N.3
  • 26
    • 56649114639 scopus 로고    scopus 로고
    • Steganalysis of LSB embedding in multimedia signals
    • S. Dumitrescu, X. Wu, Steganalysis of LSB embedding in multimedia signals, in: IEEE ICME 2002, vol. 1, 2002, pp. 581-584
    • (2002) IEEE ICME 2002 , vol.1 , pp. 581-584
    • Dumitrescu, S.1    Wu, X.2
  • 27
    • 14844309336 scopus 로고    scopus 로고
    • Improving LSB steganalysis using marginal and joint probabilistic distributions
    • Magdeburg, Germany, September 20-21, 2004 ACM
    • Benoit Roue, Patrick Bas, and Jean-Marc Chassery Improving LSB steganalysis using marginal and joint probabilistic distributions Proc. 6th Workshop on Multimedia & Security, MM&Sec 2004 Magdeburg, Germany, September 20-21, 2004 2004 ACM
    • (2004) Proc. 6th Workshop on Multimedia & Security, MM&Sec 2004
    • Roue, B.1    Bas, P.2    Chassery, J.-M.3
  • 28
    • 33645669455 scopus 로고    scopus 로고
    • An improved sample pairs method for detection of LSB embedding
    • Toronto, ON, Canada, May
    • P. Lu, X. Luo, Q. Tang, L. Shen, An improved sample pairs method for detection of LSB embedding, in: Proc. 6th Int. Workshop Inf. Hiding, Toronto, ON, Canada, May 2004
    • (2004) Proc. 6th Int. Workshop Inf. Hiding
    • Lu, P.1    Luo, X.2    Tang, Q.3    Shen, L.4
  • 29
    • 27844504298 scopus 로고    scopus 로고
    • A new framework of LSB steganalysis of Digital Media
    • Sorina Dumitrescu, and Xiaolin Wu A new framework of LSB steganalysis of Digital Media IEEE Trans. Signal Process. 53 October 2005 3936 3947
    • (2005) IEEE Trans. Signal Process. , vol.53 , pp. 3936-3947
    • Dumitrescu, S.1    Wu, X.2
  • 31
    • 0141563850 scopus 로고    scopus 로고
    • Reliable detection of LSB steganography based on difference image histogram
    • T. Zhang, X. Ping, Reliable detection of LSB steganography based on difference image histogram, in: Proc. ICASSP, vol. I, 2003, pp. 545-548
    • (2003) Proc. ICASSP , vol.1 , pp. 545-548
    • Zhang, T.1    Ping, X.2
  • 34
  • 42
    • 77955423363 scopus 로고    scopus 로고
    • Isotropy-based detection and estimation: A general framework of LSB steganalysis
    • X. Yu, T. Tan, and Y. Wang Isotropy-based detection and estimation: A general framework of LSB steganalysis IEEE Trans. Image Process. 11 5 2005 509 517
    • (2005) IEEE Trans. Image Process. , vol.11 , Issue.5 , pp. 509-517
    • Yu, X.1    Tan, T.2    Wang, Y.3
  • 47
    • 0041308536 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Noordwijkerhout, The Netherlands
    • S. Lyu, H. Farid, Detecting hidden messages using higher-order statistics and support vector machines, in: 5th Int. Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 2002
    • (2002) 5th Int. Workshop on Information Hiding
    • Lyu, S.1    Farid, H.2
  • 48
    • 84947277755 scopus 로고    scopus 로고
    • An Implementation of Key-Based Digital Signal Steganography
    • Springer-Verlag New York
    • T. Sharp An Implementation of Key-Based Digital Signal Steganography Lecture Notes in Computer Science vol. 2137 2001 Springer-Verlag New York 13 26
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 13-26
    • Sharp, T.1
  • 49
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • A.D. Ker Steganalysis of LSB matching in grayscale images IEEE Signal Process. Lett. 12 6 June 2005 441 444
    • (2005) IEEE Signal Process. Lett. , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 51
    • 34047217902 scopus 로고    scopus 로고
    • Image complexity and feature extraction for steganalysis of LSB matching steganography
    • Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete M. Ribeiro, Image complexity and feature extraction for steganalysis of LSB matching steganography, in: IEEE Int. Conf. on Pattern Recognition, vol. 2, 2006, pp. 267-270
    • (2006) IEEE Int. Conf. on Pattern Recognition , vol.2 , pp. 267-270
    • Liu, Q.1    Sung, A.H.2    Xu, J.3    Ribeiro, B.M.4
  • 52
    • 13244253845 scopus 로고    scopus 로고
    • How realistic is photorealistic
    • S. Lyu, and H. Farid How realistic is photorealistic IEEE Trans. Signal Process. 53 2 2005 845 850
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.2 , pp. 845-850
    • Lyu, S.1    Farid, H.2
  • 55
    • 0038758858 scopus 로고    scopus 로고
    • Active steganalysis of spread spectrum image steganography
    • Bangkok, Thailand, May
    • R. Chandramouli, K.P. Subbalakshmi, Active steganalysis of spread spectrum image steganography, in: IEEE Int. Symp. on Circuits and Systems, Bangkok, Thailand, vol. 3, May 2003, pp. 830-833
    • (2003) IEEE Int. Symp. on Circuits and Systems , vol.3 , pp. 830-833
    • Chandramouli, R.1    Subbalakshmi, K.P.2
  • 56
    • 84950459514 scopus 로고
    • Adapting to unknown smoothness via wavelet shrinkage
    • D.L. Donoho, and I.M. Johnstone Adapting to unknown smoothness via wavelet shrinkage J. Amer. Statist. Assoc. 90 1995 1200 1224
    • (1995) J. Amer. Statist. Assoc. , vol.90 , pp. 1200-1224
    • Donoho, D.L.1    Johnstone, I.M.2
  • 61
    • 17044402475 scopus 로고    scopus 로고
    • Reliable detection of BPCS-steganography in natural images
    • X. Yu, T. Tan, Y. Wang, Reliable detection of BPCS-steganography in natural images, in: Proc. of ICIG, 2004
    • (2004) Proc. of ICIG
    • Yu, X.1    Tan, T.2    Wang, Y.3
  • 63
    • 77955429505 scopus 로고    scopus 로고
    • JPEG-JSteg-V4 http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4. diff.gz
  • 64
    • 0038675417 scopus 로고    scopus 로고
    • A fast and effective steganalytic technique against JSteg-like algorithms
    • Florida, USA, March 9-12
    • T. Zhang, X. Ping, A fast and effective steganalytic technique against JSteg-like algorithms, in: ACM Symposium on Applied Computing, Florida, USA, March 9-12, 2003
    • (2003) ACM Symposium on Applied Computing
    • Zhang, T.1    Ping, X.2
  • 65
    • 84937814312 scopus 로고    scopus 로고
    • F5 - A steganographic algorithm. High capacity despite better steganalysis
    • A. Westfeld F5 - A steganographic algorithm. High capacity despite better steganalysis I.S. Moskowitz, Information Hiding, Fourth Int. Workshop Lecture Notes in Computer Science vol. 2137 2001 Springer-Verlag Berlin, Heidelberg 289 302
    • (2001) Information Hiding, Fourth Int. Workshop Lecture Notes in Computer Science , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 66
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of JPEG images: Breaking the F5 algorithm
    • Noordwijkerhout, The Netherlands, October
    • J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG images: Breaking the F5 algorithm, in: Proc. 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, October 2002, pp. 310-323
    • (2002) Proc. 5th Information Hiding Workshop , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 69
    • 10044282531 scopus 로고    scopus 로고
    • On estimation of secret message length in JSteg-like steganography
    • X. Yu, Y. Wang, T. Tan, On estimation of secret message length in JSteg-like steganography, in: Proc. of 7th ICPR, 2004
    • (2004) Proc. of 7th ICPR
    • Yu, X.1    Wang, Y.2    Tan, T.3
  • 70
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • Springer
    • J. Fridrich Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes Proc. Inf. Hiding Workshop Lecture Notes in Computer Science vol. 3200 2004 Springer 67 81
    • (2004) Proc. Inf. Hiding Workshop Lecture Notes in Computer Science , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 72
    • 33749598442 scopus 로고    scopus 로고
    • Breaking Cauchy model-based JPEG steganography with first order statistics
    • R. Bohme, and A. Westfeld Breaking Cauchy model-based JPEG steganography with first order statistics ESORICS 2004 Lecture Notes in Computer Science vol. 3193 2004 125 140
    • (2004) ESORICS 2004 Lecture Notes in Computer Science , vol.3193 , pp. 125-140
    • Bohme, R.1    Westfeld, A.2
  • 76
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • B. Chen, and G.W. Wornell Quantization index modulation: A class of provably good methods for digital watermarking and information embedding IEEE Trans. Inform. Theory 47 4 2001 1423 1443 (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 79
    • 4444292018 scopus 로고    scopus 로고
    • Steganalysis based on wavelet texture analysis and neural network
    • HangZhou, China
    • Shaohui Liu, Hongxun Yao, Wen Goa, Steganalysis based on wavelet texture analysis and neural network, in: Proc. of WCICA 2004, HangZhou, China, 2004
    • (2004) Proc. of WCICA 2004
    • Liu, S.1    Yao, H.2    Goa, W.3
  • 80
    • 0036474679 scopus 로고    scopus 로고
    • Wavelet-based texture retrival using generalized Gaussian density and Kullback-Leibler distance
    • Minh N. Do, and Martin Vetterli Wavelet-based texture retrival using generalized Gaussian density and Kullback-Leibler distance IEEE Trans. Image Process. II 2 2002 146 158
    • (2002) IEEE Trans. Image Process. , vol.2 , Issue.2 , pp. 146-158
    • Do, M.N.1    Vetterli, M.2
  • 81
    • 20444447558 scopus 로고    scopus 로고
    • Steganalysis of quantization index modulation data hiding
    • Singapore, October
    • K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, B.S. Manjunath, Steganalysis of quantization index modulation data hiding, in: Proc. ICIP, Singapore, October 2004, pp. 1165-1168
    • (2004) Proc. ICIP , pp. 1165-1168
    • Sullivan, K.1    Bi, Z.2    Madhow, U.3    Chandrasekaran, S.4    Manjunath, B.S.5
  • 82
    • 21844435251 scopus 로고    scopus 로고
    • Stochastic approach to secret message length estimation in ±k embedding steganography
    • DOI 10.1117/12.584201, 67, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
    • T. Holotyak, J. Fridrich, D. Soukal, Stochastic approach to secret message length estimation in ±k embedding steganography, in: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, 2005, pp. 673-684 (Pubitemid 40953023)
    • (2005) Proceedings of SPIE - The International Society for Optical Engineering , vol.5681 , pp. 673-684
    • Holotyak, T.1    Fridrich, J.2    Soukal, D.3
  • 83
    • 0030701261 scopus 로고    scopus 로고
    • Image coding based on mixture modeling of wavelet coefficients and a fast estimation quantization framework
    • March
    • S.M. LoPresto, K. Ramchandran, M.T. Orchard, Image coding based on mixture modeling of wavelet coefficients and a fast estimation quantization framework, in: Proc. Data Compression Conf., March 1997
    • (1997) Proc. Data Compression Conf.
    • Lopresto, S.M.1    Ramchandran, K.2    Orchard, M.T.3
  • 86
  • 89
  • 90
    • 11244267101 scopus 로고    scopus 로고
    • Steganalysis of boundary-based steganography using autoregressive model of digital boundaries
    • M. Jiang, X. Wu, E.K. Wong, N. Memon, Steganalysis of boundary-based steganography using autoregressive model of digital boundaries, in: IEEE Int. Conf. on Pattern Recognition, 2004
    • (2004) IEEE Int. Conf. on Pattern Recognition
    • Jiang, M.1    Wu, X.2    Wong, E.K.3    Memon, N.4
  • 92
    • 3743128603 scopus 로고    scopus 로고
    • Text image compression using soft pattern matching
    • Paul G. Howard Text image compression using soft pattern matching Comput. J. 40 2-3 1997 146 156
    • (1997) Comput. J. , vol.40 , Issue.23 , pp. 146-156
    • Howard, P.G.1
  • 94
    • 0036452586 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistical models
    • Rochester, NY, September
    • H. Farid, Detecting hidden messages using higher-order statistical models, in: Proc. IEEE Int. Conf. Image Process., Rochester, NY, vol. 2, September 2002, pp. 905-908
    • (2002) Proc. IEEE Int. Conf. Image Process. , vol.2 , pp. 905-908
    • Farid, H.1
  • 95
    • 0023383122 scopus 로고
    • Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques
    • P. Vaidyanathan Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques IEEE ASSP Magaz. 4 3 1987 4 20
    • (1987) IEEE ASSP Magaz. , vol.4 , Issue.3 , pp. 4-20
    • Vaidyanathan, P.1
  • 96
    • 0023311471 scopus 로고
    • A theory of multirate filter banks
    • M. Vetterli A theory of multirate filter banks IEEE Trans. ASSP 35 3 1987 356 372
    • (1987) IEEE Trans. ASSP , vol.35 , Issue.3 , pp. 356-372
    • Vetterli, M.1
  • 97
    • 0001153439 scopus 로고
    • Subband transforms
    • Kluwer Academic Publishers
    • E. Simoncelli, and E. Adelson Subband transforms Subband Image Coding 1990 Kluwer Academic Publishers 143 192
    • (1990) Subband Image Coding , pp. 143-192
    • Simoncelli, E.1    Adelson, E.2
  • 98
    • 0000764772 scopus 로고
    • The use of multiple measures in taxonomic problems
    • R. Fisher The use of multiple measures in taxonomic problems Ann. Eugenics 7 1936 179 188
    • (1936) Ann. Eugenics , vol.7 , pp. 179-188
    • Fisher, R.1
  • 102
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C.J.C. Burges A tutorial on support vector machines for pattern recognition Data Mining Knowl. Discov. 2 1998 121 167
    • (1998) Data Mining Knowl. Discov. , vol.2 , pp. 121-167
    • Burges, C.J.C.1
  • 106
    • 33646760642 scopus 로고    scopus 로고
    • Steganalysis, of halftone images
    • 18-23 March
    • M. Jiang, E.K. Wong, N. Memon, X. Wu Steganalysis, of halftone images, in: IEEE ICASSP'05, vol. 2, 18-23 March 2005, pp. 793-796
    • (2005) IEEE ICASSP'05 , vol.2 , pp. 793-796
    • Jiang, M.1    Wong, E.K.2    Memon, N.3    Wu, X.4
  • 107
    • 29044433896 scopus 로고    scopus 로고
    • A feature based classification technique for blind image steganalysis
    • Wen-Nung Lie, and Guo-Shiang Lin A feature based classification technique for blind image steganalysis IEEE Trans. Multimedia 7 6 December 2005 1007 1020
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.6 , pp. 1007-1020
    • Lie, W.-N.1    Lin, G.-S.2
  • 108
    • 33746647772 scopus 로고    scopus 로고
    • Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
    • Springer-Verlag Berlin
    • G. Xuan Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions Lecture Notes in Computer Science vol. 3727 2005 Springer-Verlag Berlin 262 277
    • (2005) Lecture Notes in Computer Science , vol.3727 , pp. 262-277
    • Xuan, G.1
  • 110
    • 34247562352 scopus 로고    scopus 로고
    • Steganalysis based on Markov model of thresholded prediction-error image
    • Dekun Zou, Yun Q. Shi, Wei Su, Guorong Xuan, Steganalysis based on Markov model of thresholded prediction-error image, IEEE, ICME, 2006
    • (2006) IEEE, ICME
    • Zou, D.1    Shi, Y.Q.2    Su, W.3    Xuan, G.4
  • 111
    • 33750555925 scopus 로고    scopus 로고
    • Image steganalysis based on moments of characteristic functions using wavelet decomposition
    • Yun Q. Shi, et al., Image steganalysis based on moments of characteristic functions using wavelet decomposition, in: Prediction-Error Image and Neural Network, ICME, 2005, pp. 269-272
    • (2005) Prediction-Error Image and Neural Network, ICME , pp. 269-272
    • Shi, Y.Q.1
  • 112
    • 77955418570 scopus 로고    scopus 로고
    • Blind image steganalysis based on statistical analysis of empirical matrix
    • Xiaochuan Chen, Yunghong Wang, Tieniu Tan, Lei Guo, Blind image steganalysis based on statistical analysis of empirical matrix, IEEE, ICPR, 2006
    • (2006) IEEE, ICPR
    • Chen, X.1    Wang, Y.2    Tan, T.3    Guo, L.4
  • 113
    • 0242576337 scopus 로고    scopus 로고
    • Active steganalysis of sequential steganography
    • Santa Clara, CA
    • S. Trivedi, R. Chandramouli, Active steganalysis of sequential steganography, in: SPIE Conf., Santa Clara, CA, 2003, pp. 123-130
    • (2003) SPIE Conf. , pp. 123-130
    • Trivedi, S.1    Chandramouli, R.2
  • 114
    • 15844379524 scopus 로고    scopus 로고
    • Texture based steganalysis: Results for color images
    • Patricia Lafferty, Farid Ahmad, Texture based steganalysis: Results for color images, in: Proc. of SPIE, vol. 5561, 2004
    • (2004) Proc. of SPIE , vol.5561
    • Lafferty, P.1    Ahmad, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.