메뉴 건너뛰기




Volumn 37, Issue 12, 2010, Pages 7469-7482

Audio steganalysis with Hausdorff distance higher order statistics using a rule based decision tree paradigm

Author keywords

Audio steganalysis; Hausdorff distance statistics; Information forensics; Rule based decision tree approach

Indexed keywords

ALTERNATING DECISION TREES; AUDIO FILES; AUDIO SIGNAL; AUDIO STEGANALYSIS; COVERT COMMUNICATIONS; DECISION STUMPS; DECISION TREE CLASSIFIERS; DETECTION ACCURACY; DETECTION PERFORMANCE; FEATURE SPACE; FORENSIC STEGANALYSIS; HAUSDORFF DISTANCE; HIGHER ORDER STATISTICS; INFORMATION FORENSICS; INFORMATION HIDING; LOGICAL MODELS; MACHINE-LEARNING; RULE-BASED APPROACH; RULE-BASED DECISION TREES; SENSITIVE FEATURES; SUBLIMINAL CHANNEL; WATERMARKING ALGORITHMS;

EID: 77955712820     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2010.04.012     Document Type: Article
Times cited : (23)

References (59)
  • 2
    • 77955715856 scopus 로고    scopus 로고
    • Wave files from
    • Audio wave files (2006). Wave files from http://www.wavsurfer.com.
    • (2006) Audio Wave Files
  • 3
    • 31344443662 scopus 로고    scopus 로고
    • Audio steganalysis with content independent measures
    • I. Avcibas Audio steganalysis with content independent measures IEEE Signal Processing Letters 13 2 2006 92 95
    • (2006) IEEE Signal Processing Letters , vol.13 , Issue.2 , pp. 92-95
    • Avcibas, I.1
  • 7
    • 4243801800 scopus 로고    scopus 로고
    • Available from
    • Brown, A. (2008). S-tools version 4.0. Available from http://members.tripod.com/steganography/stego/s-tools4.html.
    • (2008) S-tools Version 4.0
    • Brown, A.1
  • 9
    • 84957868624 scopus 로고    scopus 로고
    • An information theoretic model for steganography
    • David Aucsmith (Ed.) Springer: Portland, Oregon, USA
    • Cachin, C. (1998). An information theoretic model for steganography. In David Aucsmith (Ed.), Information hiding, second international workshop, lecture notes in computer science (Vol. 1525, pp. 306-318.11). Springer: Portland, Oregon, USA.
    • (1998) Information Hiding, Second International Workshop, Lecture Notes in Computer Science , vol.1525 , pp. 306-31811
    • Cachin, C.1
  • 11
    • 77950863690 scopus 로고    scopus 로고
    • Evolutionary decision trees and software metrics for module defects identification
    • M. Chi Evolutionary decision trees and software metrics for module defects identification International Journal of Computer and Information Science 2 2008 273 277
    • (2008) International Journal of Computer and Information Science , vol.2 , pp. 273-277
    • Chi, M.1
  • 17
    • 35048835739 scopus 로고    scopus 로고
    • Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • J. Fridrich Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes Jessica J. Fridrich, Information hiding, 6th international workshop, IH 2004, lecture notes in computer science Vol. 3200 2004 Springer Toronto, Canada 67 81
    • (2004) Information Hiding, 6th International Workshop, IH 2004, Lecture Notes in Computer Science , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 23
    • 8844234222 scopus 로고    scopus 로고
    • Cepstral domain modification of audio signals for data embedding: Preliminary results
    • Edward J. Delp, & Ping Wah Wong (Eds.) Society of Photo-optical Instrumentation Engineers: San Jose, California, USA
    • Gopalan, K. (2004). Cepstral domain modification of audio signals for data embedding: preliminary results. In Edward J. Delp, & Ping Wah Wong (Eds.), Security, steganography, and watermarking of multimedia contents VI, SPIE 2004, electronic imaging science and technology (Vol. 5306 pp. 151-161). Society of Photo-optical Instrumentation Engineers: San Jose, California, USA.
    • (2004) Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE 2004, Electronic Imaging Science and Technology , vol.5306 , pp. 151-161
    • Gopalan, K.1
  • 24
    • 28444487777 scopus 로고    scopus 로고
    • Available from
    • Hetzl, S. (2003). Steghide. Available from http://steghide.sourceforge. net.
    • (2003) Steghide
    • Hetzl, S.1
  • 33
  • 34
    • 0022597806 scopus 로고
    • Tree classifier design with a permutation statistic
    • X. Li, and R.C. Dubes Tree classifier design with a permutation statistic Pattern Recognition 19 1986 229 235
    • (1986) Pattern Recognition , vol.19 , pp. 229-235
    • Li, X.1    Dubes, R.C.2
  • 38
    • 38049075376 scopus 로고    scopus 로고
    • A novel intrusion detection method based on combining ensemble learning with induction-enhanced particle swarm algorithm
    • Haikou, Hainan, China
    • Minn, F. (2007). A novel intrusion detection method based on combining ensemble learning with induction-enhanced particle swarm algorithm. In Proceedings of the international conference on natural computation, ICNC '07, IEEE (pp. 520-524). Haikou, Hainan, China.
    • (2007) Proceedings of the International Conference on Natural Computation, ICNC '07, IEEE , pp. 520-524
    • Minn, F.1
  • 39
    • 0019058733 scopus 로고
    • Automated classification of nucleated blood cells using a binary tree classifier
    • J. Mui, and K.S. Fu Automated classification of nucleated blood cells using a binary tree classifier IEEE Transactions on Pattern Analysis Machine Intelligence 2 1980 429 443
    • (1980) IEEE Transactions on Pattern Analysis Machine Intelligence , vol.2 , pp. 429-443
    • Mui, J.1    Fu, K.S.2
  • 40
    • 0032075445 scopus 로고    scopus 로고
    • Robust image watermarking in the spatial domain
    • N. Nikolaidis, and I. Pitas Robust image watermarking in the spatial domain Signal Processing 66 1998 385 403
    • (1998) Signal Processing , vol.66 , pp. 385-403
    • Nikolaidis, N.1    Pitas, I.2
  • 41
    • 29044433896 scopus 로고    scopus 로고
    • A feature based classification technique for blind image steganalysis
    • L.W. Nung, and L.G. Shiang A feature based classification technique for blind image steganalysis IEEE Transactions on Multimedia 7 6 2005 1007 1020
    • (2005) IEEE Transactions on Multimedia , vol.7 , Issue.6 , pp. 1007-1020
    • Nung, L.W.1    Shiang, L.G.2
  • 44
    • 33745384504 scopus 로고    scopus 로고
    • Detection of audio covert channels using statistical footprints of hidden messages
    • H. Özer, B. Sankur, N. Memon, and I. Avcibas Detection of audio covert channels using statistical footprints of hidden messages Elsevier Digital Signal Processing 16 2006 389 401
    • (2006) Elsevier Digital Signal Processing , vol.16 , pp. 389-401
    • Özer, H.1    Sankur, B.2    Memon, N.3    Avcibas, I.4
  • 51
    • 77953759247 scopus 로고    scopus 로고
    • Decision tree classifier for network intrusion detection with GA-based feature selection
    • G. Stein, B. Chen, A.S. Wu, and K.A. Hua Decision tree classifier for network intrusion detection with GA-based feature selection Mário Guimarães, Proceedings of the 43rd annual southeast regional conference Vol. 2 2005 ACM Kennesaw, Georgia, Alabama, USA 136 141
    • (2005) Proceedings of the 43rd Annual Southeast Regional Conference , vol.2 , pp. 136-141
    • Stein, G.1    Chen, B.2    Wu, A.S.3    Hua, K.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.