메뉴 건너뛰기




Volumn 5, Issue 4, 2010, Pages 705-720

Gibbs construction in steganography

Author keywords

Embedding impact; Gibbs sampling; Markov random field; steganography

Indexed keywords

DETECTABILITY; DISTORTION FUNCTIONS; EMBEDDING DISTORTION; EMBEDDING IMPACT; GIBBS SAMPLERS; GIBBS SAMPLING; MARKOV RANDOM FIELDS; OPTIMAL EMBEDDING; PRACTICAL ALGORITHMS; RATE-DISTORTION BOUNDS; SECURE STEGANOGRAPHY; STATISTICAL PHYSICS; THEORETICAL FRAMEWORK; THERMODYNAMIC INTEGRATION;

EID: 78149255931     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2077629     Document Type: Article
Times cited : (282)

References (39)
  • 1
    • 78649422691 scopus 로고    scopus 로고
    • Jul, Online. Available
    • P. Bas and T. Furon, BOWS-2 Jul. 2007 [Online]. Available: http://bows2.gipsa-lab.inpg.fr
    • (2007) BOWS-2
    • Bas, P.1    Furon, T.2
  • 2
    • 33749598442 scopus 로고    scopus 로고
    • Breaking Cauchy model-based JPEG steganography with first order statistics
    • P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, Eds., Sophia Antipolis, France, Sep. 13-15, Lecture Notes in Computer Science, Springer, Berlin
    • R. Böhme and A. Westfeld, "Breaking Cauchy model-based JPEG steganography with first order statistics", in Proc. 9th Eur. Symp. Research in Computer Security (ESORICS 2004), P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, Eds., Sophia Antipolis, France, Sep. 13-15, 2004, vol. 3193, Lecture Notes in Computer Science, pp. 125-140, Springer, Berlin.
    • (2004) Proc. 9th Eur. Symp. Research in Computer Security (ESORICS 2004) , vol.3193 , pp. 125-140
    • Böhme, R.1    Westfeld, A.2
  • 3
    • 49949092593 scopus 로고    scopus 로고
    • MPSteg-color: A new steganographic technique for color images
    • T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • G. Cancelli and M. Barni, "MPSteg-color: A new steganographic technique for color images", in Proc. 9th Int. Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 1-15, Springer-Verlag, Berlin.
    • (2007) Proc. 9th Int. Workshop Information Hiding , vol.4567 , pp. 1-15
    • Cancelli, G.1    Barni, M.2
  • 5
    • 0030539336 scopus 로고    scopus 로고
    • Markov chain Monte Carlo convergence diagnostics: A comparative review
    • Jun
    • M. K. Cowles and B. P. Carlin, "Markov chain Monte Carlo convergence diagnostics: A comparative review", J. Amer. Statist. Assoc., vol. 91, no. 434, pp. 883-904, Jun. 1996.
    • (1996) J. Amer. Statist. Assoc. , vol.91 , Issue.434 , pp. 883-904
    • Cowles, M.K.1    Carlin, B.P.2
  • 6
    • 14844285173 scopus 로고    scopus 로고
    • Some notes on steganography
    • Online. Available
    • R. Crandall, "Some notes on steganography", Steganography Mailing List 1998 [Online]. Available: http://os.inf.tu-dresden. de/~westfeld/crandall.pdf
    • (1998) Steganography Mailing List
    • Crandall, R.1
  • 7
    • 80051709471 scopus 로고    scopus 로고
    • Minimizing additive distortion in steganography using syndrome-trellis codes
    • to be published
    • T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes", IEEE Trans. Inf. Forensics Security, to be published.
    • IEEE Trans. Inf. Forensics Security
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 8
    • 77951871502 scopus 로고    scopus 로고
    • Minimizing embedding impact in steganography using trellis-coded quantization
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21
    • T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization", in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21, 2010, vol. 7541, pp. 05-01-05-14.
    • (2010) Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XII , vol.7541 , pp. 0501-0514
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 11
    • 30744445178 scopus 로고    scopus 로고
    • Perturbed quantization steganography
    • J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography", ACM Multimedia Syst. J., vol. 11, no. 2, pp. 98-107, 2005.
    • (2005) ACM Multimedia Syst. J. , vol.11 , Issue.2 , pp. 98-107
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 12
    • 21844452710 scopus 로고    scopus 로고
    • Writing on wet paper
    • DOI 10.1117/12.583160, 33, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
    • J. Fridrich, M. Goljan, D. Soukal, and P. Lisoněk, "Writing on wet paper", in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-20, 2005, vol. 5681, pp. 328-340. (Pubitemid 40952993)
    • (2005) Proceedings of SPIE - The International Society for Optical Engineering , vol.5681 , pp. 328-340
    • Fridrich, J.1    Goljan, M.2    Lisonek, P.3    Soukal, D.4
  • 13
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21
    • J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities", in Proc. 9th ACM Multimedia & Security Workshop, J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21, 2007, pp. 3-14.
    • (2007) Proc. 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 14
    • 0021518209 scopus 로고
    • Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images
    • Nov
    • S. Geman and D. Geman, "Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images", IEEE Trans. Pattern Anal. Mach. Intell., vol. 6, no. 6, pp. 721-741, Nov. 1984.
    • (1984) IEEE Trans. Pattern Anal. Mach. Intell. , vol.6 , Issue.6 , pp. 721-741
    • Geman, S.1    Geman, D.2
  • 15
    • 33645695370 scopus 로고    scopus 로고
    • A graph-theoretic approachto steganography
    • J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., Salzburg, Austria, Sep. 19-21, Lecture Notes in Computer Science
    • S. Hetzl and P. Mutzel, "A graph-theoretic approachto steganography", in Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security (CMS 2005), J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., Salzburg, Austria, Sep. 19-21, 2005, vol. 3677, Lecture Notes in Computer Science, pp. 119-128.
    • (2005) Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security (CMS 2005) , vol.3677 , pp. 119-128
    • Hetzl, S.1    Mutzel, P.2
  • 16
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • Jun
    • A. D. Ker, "Steganalysis of LSB matching in grayscale images", IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, Jun. 2005.
    • (2005) IEEE Signal Process. Lett. , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 17
    • 38049111044 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer-Verlag, New York
    • A. D. Ker, "Batch steganography and pooled steganalysis", in Proc. 8th Int. Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 265-281, Springer-Verlag, New York.
    • (2006) Proc. 8th Int. Workshop Information Hiding , vol.4437 , pp. 265-281
    • Ker, A.D.1
  • 18
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer-Verlag, New York
    • Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography", in Proc. 8th Int. Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 314-327, Springer-Verlag, New York.
    • (2006) Proc. 8th Int. Workshop Information Hiding , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 19
    • 56749154804 scopus 로고    scopus 로고
    • On completeness of feature spaces in blind steganalysis
    • A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U. K., Sep. 22-23
    • J. Kodovský and J. Fridrich, "On completeness of feature spaces in blind steganalysis", in Proc. 10th ACM Multimedia & Security Workshop, A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U. K., Sep. 22-23, 2008, pp. 123-132.
    • (2008) Proc. 10th ACM Multimedia & Security Workshop , pp. 123-132
    • Kodovský, J.1    Fridrich, J.2
  • 20
    • 77951862698 scopus 로고    scopus 로고
    • Modern steganalysis can detect YASS
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21
    • J. Kodovský, T. Pevný, and J. Fridrich, "Modern steganalysis can detect YASS", in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21, 2010, vol. 7541, pp. 02-01-02-11.
    • (2010) Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XII , vol.7541 , pp. 0201-0211
    • Kodovský, J.1    Pevný, T.2    Fridrich, J.3
  • 22
    • 70449644855 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix", in Proc. 11th ACM Multimedia & Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 75-84.
    • (2009) Proc. 11th ACM Multimedia & Security Workshop , pp. 75-84
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 23
    • 78649409548 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, Jun. 28-30, Lecture Notes in Computer Science, Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography", in Proc. 12th Int. Workshop Information Hiding, R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, Jun. 28-30, 2010, Lecture Notes in Computer Science, Springer-Verlag, New York.
    • (2010) Proc. 12th Int. Workshop Information Hiding
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 25
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington, DC, Aug. 13-17
    • N. Provos, "Defending against statistical steganalysis", in Proc. 10th USENIX Security Symp., Washington, DC, Aug. 13-17, 2001, pp. 323-335.
    • (2001) Proc. 10th USENIX Security Symp. , pp. 323-335
    • Provos, N.1
  • 26
    • 60449120149 scopus 로고    scopus 로고
    • Fields of experts
    • Jan
    • S. Roth and M. J. Black, "Fields of experts", Int. J. Comput. Vision, vol. 82, no. 2, pp. 205-229, Jan. 2009.
    • (2009) Int. J. Comput. Vision , vol.82 , Issue.2 , pp. 205-229
    • Roth, S.1    Black, M.J.2
  • 27
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
    • V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding", in Proc. 11th ACM Multimedia & Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 131-140.
    • (2009) Proc. 11th ACM Multimedia & Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 28
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • P. Sallee, "Model-based methods for steganography and steganalysis", Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
    • (2005) Int. J. Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 29
    • 69749094893 scopus 로고    scopus 로고
    • Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme
    • San Diego, CA, Oct. 12-15
    • A. Sarkar, L. Nataraj, B. S. Manjunath, and U. Madhow, "Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme", in Proc. IEEE, Int. Conf. Image Processing (ICIP 2008), San Diego, CA, Oct. 12-15, 2008, pp. 1292-1295.
    • (2008) Proc. IEEE, Int. Conf. Image Processing (ICIP 2008) , pp. 1292-1295
    • Sarkar, A.1    Nataraj, L.2    Manjunath, B.S.3    Madhow, U.4
  • 31
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer-Verlag, New York
    • Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography", in Proc. 8th Int. Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 249-264, Springer-Verlag, New York.
    • (2006) Proc. 8th Int. Workshop Information Hiding , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 32
    • 49949091527 scopus 로고    scopus 로고
    • YASS: Yet another steganographic scheme that resists blind steganalysis
    • T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer-Verlag, New York
    • K. Solanki, A. Sarkar, and B. S. Manjunath, "YASS: Yet another steganographic scheme that resists blind steganalysis", in Proc. 9th Int. Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 16-31, Springer-Verlag, New York.
    • (2007) Proc. 9th Int. Workshop Information Hiding , vol.4567 , pp. 16-31
    • Solanki, K.1    Sarkar, A.2    Manjunath, B.S.3
  • 34
    • 78649417993 scopus 로고    scopus 로고
    • Erasure entropy
    • Seattle, WA, Jul. 9-14
    • S. Verdú and T. Weissman, "Erasure entropy", in Proc. ISIT, Seattle, WA, Jul. 9-14, 2006.
    • (2006) Proc. ISIT
    • Verdú, S.1    Weissman, T.2
  • 35
    • 55349119524 scopus 로고    scopus 로고
    • The information lost in erasures
    • Nov
    • S. Verdú and T. Weissman, "The information lost in erasures", IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5030-5058, Nov. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.11 , pp. 5030-5058
    • Verdú, S.1    Weissman, T.2
  • 36
    • 39749147672 scopus 로고    scopus 로고
    • Determining the density of states for classical statistical models: A random walk algorithm to produce a flat histogram
    • arXiv:cond-mat/0107006v1
    • F. Wang and D. P. Landau, "Determining the density of states for classical statistical models: A random walk algorithm to produce a flat histogram", Phys. Rev. E, vol. 64, no. 5, p. 056101, 2001, arXiv:cond-mat/0107006v1.
    • (2001) Phys. Rev. E , vol.64 , Issue.5 , pp. 056101
    • Wang, F.1    Landau, D.P.2
  • 37
    • 35048813035 scopus 로고    scopus 로고
    • Exploiting preserved statistics for steganalysis
    • J. Fridrich, Ed., Toronto, Canada, May 23-25, Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • A. Westfeld and R. Böhme, "Exploiting preserved statistics for steganalysis", in Proc. 6th Int. Workshop Information Hiding, J. Fridrich, Ed., Toronto, Canada, May 23-25, 2004, vol. 3200, Lecture Notes in Computer Science, pp. 82-96, Springer-Verlag, Berlin.
    • (2004) Proc. 6th Int. Workshop Information Hiding , vol.3200 , pp. 82-96
    • Westfeld, A.1    Böhme, R.2
  • 39
    • 34247247816 scopus 로고    scopus 로고
    • Efficient double-layered steganographic embedding
    • Apr
    • X. Zhang, W. Zhang, and S. Wang, "Efficient double-layered steganographic embedding", Electron. Lett., vol. 43, pp. 482-483, Apr. 2007.
    • (2007) Electron. Lett. , vol.43 , pp. 482-483
    • Zhang, X.1    Zhang, W.2    Wang, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.