메뉴 건너뛰기




Volumn 5, Issue 3, 2010, Pages 374-380

An experimental study on the security performance of YASS

Author keywords

Security performance; steganographic; Yet Another Steganographic Scheme (YASS)

Indexed keywords

EXPERIMENTAL STUDIES; INPUT IMAGE; JPEG COMPRESSED IMAGES; SECURITY PERFORMANCE; STEGANOGRAPHIC; STEGANOGRAPHIC SCHEMES;

EID: 77955691327     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2054082     Document Type: Article
Times cited : (7)

References (24)
  • 1
    • 49949091527 scopus 로고    scopus 로고
    • YASS: Yet another steganographic scheme that resists blind steganalysis
    • [Online]. Available, LNCS 4567
    • K. Solanki, A. Sarkar, and B. S. Manjunath, "YASS: Yet another steganographic scheme that resists blind steganalysis," in Proc. 9th Int. Workshop Information Hiding, 2007, pp. 16-31 [Online]. Available: http://vision.ece.ucsb.edu/data-hiding/resist-blind-steganalysis. shtml, LNCS 4567
    • (2007) Proc. 9th Int. Workshop Information Hiding , pp. 16-31
    • Solanki, K.1    Sarkar, A.2    Manjunath, B.S.3
  • 2
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • LNCS 2578
    • S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop Information Hiding, 2002, pp. 340-354, LNCS 2578.
    • (2002) Proc. 5th Int. Workshop Information Hiding , pp. 340-354
    • Lyu, S.1    Farid, H.2
  • 4
    • 33750555925 scopus 로고    scopus 로고
    • Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
    • Amsterdam, The Netherlands
    • Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, and C. Chen, "Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network," in Proc. IEEE Int. Conf. Multimedia and Expro, Amsterdam, The Netherlands, 2005.
    • (2005) Proc. IEEE Int. Conf. Multimedia and Expro
    • Shi, Y.Q.1    Xuan, G.2    Zou, D.3    Gao, J.4    Yang, C.5    Zhang, Z.6    Chai, P.7    Chen, W.8    Chen, C.9
  • 5
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • LNCS 3200
    • J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in Proc. 6th Int. Workshop Information Hiding, 2004, pp. 67-81, LNCS 3200.
    • (2004) Proc. 6th Int. Workshop Information Hiding , pp. 67-81
    • Fridrich, J.1
  • 6
    • 34548232251 scopus 로고    scopus 로고
    • Merging Markov and DCT features for multiclass JPEG steganalysis
    • Security, Steganography, and Watermarking of Multimedia Contents IX
    • T. Pevny and J. Fridrich, "Merging Markov and DCT features for multiclass JPEG steganalysis," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 2005, vol.6505, pp. 3.1-3.13.
    • (2005) Proc. SPIE Electronic Imaging , vol.6505 , pp. 31-313
    • Pevny, T.1    Fridrich, J.2
  • 7
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington DC
    • N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Security Symp., Washington, DC, 2001.
    • (2001) Proc. 10th USENIX Security Symp.
    • Provos, N.1
  • 8
    • 0005105932 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5-a steganographic algorithm)
    • LNCS 2137
    • A. Westfeld, "High capacity despite better steganalysis (F5-a steganographic algorithm)," in Proc. 4th Int. Workshop Information Hiding, 2001, pp. 289-302, LNCS 2137.
    • (2001) Proc. 4th Int. Workshop Information Hiding , pp. 289-302
    • Westfeld, A.1
  • 9
    • 33744753200 scopus 로고    scopus 로고
    • Model based methods for steganography and steganalysis
    • P. Sallee, "Model based methods for steganography and steganalysis," Int. J. Image Graphics, vol.5, no.1, pp. 167-190, 2005.
    • (2005) Int. J. Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 10
    • 42949124470 scopus 로고    scopus 로고
    • Influence of embedding strategies on security of steganographic methods in the JPEG domain
    • Security, Steganography, and Watermarking of Multimedia Contents X San Jose, CA, Jan.
    • J. Kodovsky and J. Fridrich, "Influence of embedding strategies on security of steganographic methods in the JPEG domain," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, Jan. 28-31, 2008.
    • (2008) Proc. SPIE Electronic Imaging , vol.28-31
    • Kodovsky, J.1    Fridrich, J.2
  • 12
    • 42949166748 scopus 로고    scopus 로고
    • Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis
    • Security, Steganography, and Watermarking of Multimedia Contents IX
    • A. Sarkar, K. Solanki, and B. S. Manjunath, "Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 2008, vol.6819, pp. 17.1-17.11.
    • (2008) Proc. SPIE Electronic Imaging , vol.6819 , pp. 171-1711
    • Sarkar, A.1    Solanki, K.2    Manjunath, B.S.3
  • 15
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • LNCS 4437
    • Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int. Workshop Information Hiding, 2007, pp. 249-264, LNCS 4437.
    • (2007) Proc. 8th Int. Workshop Information Hiding , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 16
    • 51749089283 scopus 로고    scopus 로고
    • JPEG image steganalysis utilizing both intrablock and interblock correlations
    • Seattle, WA, May
    • C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Proc. IEEE Int. Symp. Circuits and Systems, Seattle, WA, May 18-21, 2008.
    • (2008) Proc. IEEE Int. Symp. Circuits and Systems , vol.18-21
    • Chen, C.1    Shi, Y.Q.2
  • 18
    • 0035246564 scopus 로고    scopus 로고
    • Factor graphs and the sum-product algorithm
    • Feb.
    • F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, "Factor graphs and the sum-product algorithm," IEEE Trans. Inf. Theory, vol.47, no.2, pp. 498-519, Feb. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.2 , pp. 498-519
    • Kschischang, F.R.1    Frey, B.J.2    Loeliger, H.-A.3
  • 19
    • 69749094893 scopus 로고    scopus 로고
    • Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme
    • San Diego, CA, Oct.
    • A. Sarkar, L. Nataraj, B. S. Manjunath, and U. Madhow, "Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme," in Proc. IEEE Int. Conf. Image Processing, San Diego, CA, Oct. 12-15, 2008.
    • (2008) Proc. IEEE Int. Conf. Image Processing , vol.12-15
    • Sarkar, A.1    Nataraj, L.2    Manjunath, B.S.3    Madhow, U.4
  • 20
    • 77955704406 scopus 로고    scopus 로고
    • [Online]. Available:
    • NRCS Photo Gallery [Online]. Available: http://photogallery.nrcs. usda.gov
  • 21
    • 77955672547 scopus 로고    scopus 로고
    • CorelDraw Image CD, Online]. Available:
    • CorelDraw Image CD [Online]. Available: http://www.corel.com
  • 23
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • LNCS 4437
    • Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Int.Workshop Information Hiding, 2007, pp. 314-327, LNCS 4437.
    • (2007) Proc. 8th Int.Workshop Information Hiding , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 24
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • Dallas, TX, Sep. 20-21
    • J. Fridrich, T. Pevny, and J. Kodovsky, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. ACM Workshop on Multimedia and Security, Dallas, TX, Sep. 20-21, 2007, pp. 3-14.
    • (2007) Proc. ACM Workshop on Multimedia and Security , pp. 3-14
    • Fridrich, J.1    Pevny, T.2    Kodovsky, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.