메뉴 건너뛰기




Volumn , Issue , 2010, Pages 474-479

A high-performance YASS-like scheme using randomized big-blocks

Author keywords

JPEG; Randomization; Steganalysis; Steganography; YASS

Indexed keywords

DATA EMBEDDING; DETECTION RATES; JPEG; JPEG COMPRESSION; RANDOMIZATION; SELF-CALIBRATION TECHNIQUES; SIZE AND POSITION; STATISTICAL ANALYSIS; STEGANALYSIS; STEGANOGRAPHIC SCHEMES; YASS;

EID: 78349262285     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICME.2010.5582542     Document Type: Conference Paper
Times cited : (10)

References (17)
  • 4
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington DC, USA
    • N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Security Symposium,Washington DC, USA, 2001, pp. 323-335.
    • (2001) Proc. 10th USENIX Security Symposium , pp. 323-335
    • Provos, N.1
  • 6
    • 35248884299 scopus 로고    scopus 로고
    • Steganalysis of jpeg images: Breaking the f5 algorithm
    • Noordwijkerhout, The Netherlands
    • J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of jpeg images: Breaking the f5 algorithm," in Proc. 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 7-9, 2002, pp. 310-323.
    • (2002) Proc. 5th International Workshop on Information Hiding , vol.7-9 , pp. 310-323
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 8
    • 33749598442 scopus 로고    scopus 로고
    • Breaking cauchy modelbased jpeg steganography with first order statistics
    • Sophia Antipolis, French Riviera, France
    • R. Bohme and A. Westfeld, "Breaking cauchy modelbased jpeg steganography with first order statistics," in Proc. 9th European Symposium on Research in Computer Security, Sophia Antipolis, French Riviera, France, 2004, pp. 125-140.
    • (2004) Proc. 9th European Symposium on Research in Computer Security , pp. 125-140
    • Bohme, R.1    Westfeld, A.2
  • 9
    • 20444372785 scopus 로고    scopus 로고
    • Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes
    • Toronto, Canada, May
    • J. Fridrich, "Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes," in Proc. 6th International Workshop on Information Hiding, Toronto, Canada, May23-25, 2004.
    • (2004) Proc. 6th International Workshop on Information Hiding , pp. 23-25
    • Fridrich, J.1
  • 10
    • 38049166461 scopus 로고    scopus 로고
    • A markov process based approach to effective attacking jpeg steganography
    • Alexandria, VA, USA
    • Y. Q. Shi, Chunhua Chen, andWen Chen, "A markov process based approach to effective attacking jpeg steganography," in Proc. 8th International Workshop on Information Hiding, Alexandria, VA, USA, 10-12, 2006, pp. 249-264.
    • (2006) Proc. 8th International Workshop on Information Hiding , vol.10-12 , pp. 249-264
    • Shi, Y.Q.1    Chen Andwen Chen, C.2
  • 12
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," in IEEE Trans. Inform. Theory, May 2001, vol. 47, pp. 1423-1443. (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.