메뉴 건너뛰기




Volumn , Issue , 2010, Pages 199-211

Steganography using Gibbs random fields

Author keywords

embedding impact; Gibbs sampling; Markov random field; steganography

Indexed keywords

DETECTABILITY; DISTORTION FUNCTIONS; EMBEDDING ALGORITHMS; EMBEDDING DISTORTION; EMBEDDING IMPACT; GIBBS RANDOM FIELD; GIBBS SAMPLERS; GIBBS SAMPLING; MARKOV RANDOM FIELD; OPTIMAL EMBEDDING; PRACTICAL METHOD; SECURE STEGANOGRAPHY; STATISTICAL PHYSICS; STEGANOGRAPHIC ALGORITHMS;

EID: 78149253209     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1854229.1854266     Document Type: Conference Paper
Times cited : (8)

References (34)
  • 1
    • 78149259499 scopus 로고    scopus 로고
    • July
    • P. Bas and T. Furon. BOWS-2. http://bows2.gipsa-lab.inpg.fr, July 2007.
    • (2007)
    • Bas, P.1    Furon, T.2
  • 2
    • 49949092593 scopus 로고    scopus 로고
    • MPSteg-color: A new steganographic technique for color images
    • Information Hiding, 9th International Workshop, Saint Malo, France, June 11-13
    • G. Cancelli and M. Barni. MPSteg-color: A new steganographic technique for color images. In Information Hiding, 9th International Workshop, volume 4567 of Lect. Notes in Computer Sc., pages 1-15, Saint Malo, France, June 11-13, 2007.
    • (2007) Lect. Notes in Computer Sc. , vol.4567 , pp. 1-15
    • Cancelli, G.1    Barni, M.2
  • 4
    • 0030539336 scopus 로고    scopus 로고
    • Markov chain Monte Carlo convergence diagnostics: A comparative review
    • June
    • M. K. Cowles and B. P. Carlin. Markov chain Monte Carlo convergence diagnostics: A comparative review. Journal of the American Statistical Association, 91(434):883-904, June 1996.
    • (1996) Journal of the American Statistical Association , vol.91 , Issue.434 , pp. 883-904
    • Cowles, M.K.1    Carlin, B.P.2
  • 10
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • Dallas, TX, September 20-21
    • J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
    • (2007) Proceedings of the 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 11
    • 0021518209 scopus 로고
    • Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images
    • November
    • S. Geman and D. Geman. Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 6(6):721-741, November 1984.
    • (1984) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.6 , Issue.6 , pp. 721-741
    • Geman, S.1    Geman, D.2
  • 12
    • 33645695370 scopus 로고    scopus 로고
    • A graph-theoretic approach to steganography
    • Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21
    • S. Hetzl and P. Mutzel. A graph-theoretic approach to steganography. In Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, volume 3677 of Lect. Notes in Computer Sc., pages 119-128, Salzburg, Austria, September 19-21, 2005.
    • (2005) Lect. Notes in Computer Sc. , vol.3677 , pp. 119-128
    • Hetzl, S.1    Mutzel, P.2
  • 13
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • June
    • A. D. Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6):441-444, June 2005.
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 14
    • 38049111044 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • Information Hiding, 8th Intern. Workshop, Alexandria, VA, July 10-12
    • A. D. Ker. Batch steganography and pooled steganalysis. In Information Hiding, 8th Intern. Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 265-281, Alexandria, VA, July 10-12, 2006.
    • (2006) Lect. Notes in Computer Sc. , vol.4437 , pp. 265-281
    • Ker, A.D.1
  • 16
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • Information Hiding, 8th Intern. Workshop, Alexandria, VA, July 10-12
    • Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In Information Hiding, 8th Intern. Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 314-327, Alexandria, VA, July 10-12, 2006.
    • (2006) Lect. Notes in Computer Sc. , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 21
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Information Hiding, 12th International Conference, Calgary, Alberta, Canada, June 28-30. Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, 12th International Conference, Lect. Notes in Computer Sc., Calgary, Alberta, Canada, June 28-30, 2010. Springer-Verlag, New York.
    • (2010) Lect. Notes in Computer Sc.
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 24
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • Princeton, NJ, Sept.
    • V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131-140, Princeton, NJ, Sept. 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 25
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • P. Sallee. Model-based methods for steganography and steganalysis. International Journal of Image Graphics, 5(1):167-190, 2005.
    • (2005) International Journal of Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 28
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • Information Hiding, 8th Intern. Workshop, Alexandria, VA, July 10-12
    • Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In Information Hiding, 8th Intern. Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 249-264, Alexandria, VA, July 10-12, 2006.
    • (2006) Lect. Notes in Computer Sc. , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 30
    • 21844461602 scopus 로고    scopus 로고
    • Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain
    • E. J. Delp and P. W. Wong, editors, San Jose, CA, January 16-20
    • D. Soukal, J. Fridrich, and M. Goljan. Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 595-606, San Jose, CA, January 16-20, 2005.
    • (2005) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII , vol.5681 , pp. 595-606
    • Soukal, D.1    Fridrich, J.2    Goljan, M.3
  • 32
    • 55349119524 scopus 로고    scopus 로고
    • The information lost in erasures
    • November
    • S. Verdú and T. Weissman. The information lost in erasures. IEEE Trans. on Information Theory, 54(11):5030-5058, November 2008.
    • (2008) IEEE Trans. on Information Theory , vol.54 , Issue.11 , pp. 5030-5058
    • Verdú, S.1    Weissman, T.2
  • 33
    • 39749147672 scopus 로고    scopus 로고
    • Determining the density of states for classical statistical models: A random walk algorithm to produce a flat histogram
    • arXiv:cond-mat/0107006v1
    • F. Wang and D. P. Landau. Determining the density of states for classical statistical models: A random walk algorithm to produce a flat histogram. Phys. Rev. E, 64(5):056101, 2001. arXiv:cond-mat/0107006v1.
    • (2001) Phys. Rev. E , vol.64 , Issue.5 , pp. 056101
    • Wang, F.1    Landau, D.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.