메뉴 건너뛰기




Volumn 5, Issue 4, 2010, Pages 681-693

Quantitative structural steganalysis of Jsteg

Author keywords

JPEG steganography; Jsteg; least significant bit (LSB) embedding; maximum likelihood; precover assumption; zero message hypothesis

Indexed keywords

JPEG STEGANOGRAPHY; JSTEG; LEAST-SIGNIFICANT BIT (LSB) EMBEDDING; PRECOVER ASSUMPTION; ZERO MESSAGE HYPOTHESIS;

EID: 78649425529     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2056684     Document Type: Article
Times cited : (35)

References (28)
  • 1
    • 1442360452 scopus 로고    scopus 로고
    • Quantitative steganalysis of digital images: Estimating the secret message length
    • J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, "Quantitative steganalysis of digital images: Estimating the secret message length", ACM Multimedia Syst. J., vol. 9, no. 3, pp. 288-302, 2003.
    • (2003) ACM Multimedia Syst. J. , vol.9 , Issue.3 , pp. 288-302
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3    Soukal, D.4
  • 2
    • 71449120465 scopus 로고    scopus 로고
    • From blind to quantitative steganalysis
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21
    • T. Pevný, J. Fridrich, and A. D. Ker, "From blind to quantitative steganalysis", in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21, 2009, vol. 7254, pp. 0C 1-0C 14.
    • (2009) Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI , vol.7254
    • Pevný, T.1    Fridrich, J.2    Ker, A.D.3
  • 4
    • 78649411583 scopus 로고    scopus 로고
    • Detection of hidden information, covert channels and information flows
    • J. G. Voeller, Ed. New York: Wiley, Apr. 4
    • N. F. Johnson and P. Sallee, "Detection of hidden information, covert channels and information flows", in Wiley Handbook of Science Technology for Homeland Security, J. G. Voeller, Ed. New York: Wiley, Apr. 4, 2008.
    • (2008) Wiley Handbook of Science Technology for Homeland Security
    • Johnson, N.F.1    Sallee, P.2
  • 6
    • 0001849187 scopus 로고    scopus 로고
    • Attacks on steganographic systems
    • A. Pfitzmann, Ed., Dresden, Germany, Sep. 29-Oct. 1, Lecture Notes in Computer Science, Springer-Verlag, New York
    • A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems", in Proc. 3rd Int. Workshop Information Hiding, A. Pfitzmann, Ed., Dresden, Germany, Sep. 29-Oct. 1 1999, vol. 1768, Lecture Notes in Computer Science, pp. 61-75, Springer-Verlag, New York.
    • (1999) Proc. 3rd Int. Workshop Information Hiding , vol.1768 , pp. 61-75
    • Westfeld, A.1    Pfitzmann, A.2
  • 7
    • 0038675417 scopus 로고    scopus 로고
    • A fast and effective steganalytic technique against Jsteg-like algorithms
    • Melbourne, FL, Mar. 9-12
    • T. Zhang and X. Ping, "A fast and effective steganalytic technique against Jsteg-like algorithms", in Proc. ACM Symp. Applied Computing, Melbourne, FL, Mar. 9-12, 2003, pp. 307-311.
    • (2003) Proc. ACM Symp. Applied Computing , pp. 307-311
    • Zhang, T.1    Ping, X.2
  • 8
    • 10044282531 scopus 로고    scopus 로고
    • On estimation of secret message length in JSteg-like steganography
    • F. A. P. Petitcolas, Ed., Cambridge, U. K., Aug. 23-26
    • X. Yu, Y. Wang, and T. Tan, "On estimation of secret message length in JSteg-like steganography", in Proc. 17th Int. Conf. Pattern Recognition, F. A. P. Petitcolas, Ed., Cambridge, U. K., Aug. 23-26, 2004, vol. 4, pp. 673-676.
    • (2004) Proc. 17th Int. Conf. Pattern Recognition , vol.4 , pp. 673-676
    • Yu, X.1    Wang, Y.2    Tan, T.3
  • 9
    • 38849120767 scopus 로고    scopus 로고
    • Category attack for LSB embedding of JPEG images
    • Y.-Q. Shi, B. Jeon, Y. Shi, and B. Jeon, Eds., Jeju Island, Korea, Nov. 8-10, Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • K. Lee, A. Westfeld, and S. Lee, "Category attack for LSB embedding of JPEG images", in Proc. 5th Int. Workshop Digital Watermarking, Y.-Q. Shi, B. Jeon, Y. Shi, and B. Jeon, Eds., Jeju Island, Korea, Nov. 8-10, 2006, vol. 4283, Lecture Notes in Computer Science, pp. 35-48, Springer-Verlag, Berlin.
    • (2006) Proc. 5th Int. Workshop Digital Watermarking , vol.4283 , pp. 35-48
    • Lee, K.1    Westfeld, A.2    Lee, S.3
  • 10
    • 56749107134 scopus 로고    scopus 로고
    • Weighted stego-image steganalysis for JPEG covers
    • K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science, Springer-Verlag, New York
    • R. Böhme, "Weighted stego-image steganalysis for JPEG covers", in Proc. 10th Int. Workshop Information Hiding, K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, 2007, vol. 5284, Lecture Notes in Computer Science, pp. 178-194, Springer-Verlag, New York.
    • (2007) Proc. 10th Int. Workshop Information Hiding , vol.5284 , pp. 178-194
    • Böhme, R.1
  • 11
    • 49949111194 scopus 로고    scopus 로고
    • Generalized category attack-improving histogram-based attack on JPEG LSB embedding
    • T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • K. Lee and A. Westfeld, "Generalized category attack-improving histogram-based attack on JPEG LSB embedding", in Proc. 9th Int. Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 378-392, Springer-Verlag, Berlin.
    • (2007) Proc. 9th Int. Workshop Information Hiding , vol.4567 , pp. 378-392
    • Lee, K.1    Westfeld, A.2
  • 12
    • 56749177021 scopus 로고    scopus 로고
    • Generic adoption of spatial steganalysis to transformed domain
    • K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science, Springer-Verlag, New York
    • A. Westfeld, "Generic adoption of spatial steganalysis to transformed domain", in Proc. 10th Int. Workshop Information Hiding, K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, 2007, vol. 5284, Lecture Notes in Computer Science, pp. 161-177, Springer-Verlag, New York.
    • (2007) Proc. 10th Int. Workshop Information Hiding , vol.5284 , pp. 161-177
    • Westfeld, A.1
  • 13
    • 0035472155 scopus 로고    scopus 로고
    • Detecting LSB steganography in color and gray-scale images
    • DOI 10.1109/93.959097
    • J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images", IEEE Multimedia, Special Issue on Security, vol. 8, no. 4, pp. 22-28, Oct./Dec. 2001. (Pubitemid 33018249)
    • (2001) IEEE Multimedia , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 14
    • 35248901820 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pairs analysis
    • F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 7-9, Lecture Notes in Computer Science, Springer-Verlag, New York
    • S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pairs analysis", in Proc. 5th Int. Workshop Information Hiding, F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 7-9, 2002, vol. 2578, Lecture Notes in Computer Science, pp. 355-372, Springer-Verlag, New York.
    • (2002) Proc. 5th Int. Workshop Information Hiding , vol.2578 , pp. 355-372
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 18
    • 49949117942 scopus 로고    scopus 로고
    • Afusionofmaximal likelihood and structural steganalysis
    • T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • A. D. Ker, "Afusionofmaximal likelihood and structural steganalysis", in Proc. 9th Int. Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 204-219, Springer-Verlag, Berlin.
    • (2007) Proc. 9th Int. Workshop Information Hiding , vol.4567 , pp. 204-219
    • Ker, A.D.1
  • 19
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • P. Sallee, "Model-based methods for steganography and steganalysis", Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
    • (2005) Int. J. Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 20
    • 0036450555 scopus 로고    scopus 로고
    • On steganalysis of random LSB embedding in continuous-tone images
    • Rochester, NY, Sep. 22-25
    • S. Dumitrescu, X. Wu, and N. D. Memon, "On steganalysis of random LSB embedding in continuous-tone images", in Proc. IEEE, Int. Conf. Image Processing (ICIP 2002), Rochester, NY, Sep. 22-25, 2002, pp. 324-339.
    • (2002) Proc. IEEE, Int. Conf. Image Processing (ICIP 2002) , pp. 324-339
    • Dumitrescu, S.1    Wu, X.2    Memon, N.D.3
  • 21
    • 35048859775 scopus 로고    scopus 로고
    • An improved sample pairs method for detection of LSB embedding
    • J. Fridrich, Ed., Toronto, Canada, May 23-25, Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • P. Lu, X. Luo, Q. Tang, and L. Shen, "An improved sample pairs method for detection of LSB embedding", in Proc. 6th Int. Workshop Information Hiding, J. Fridrich, Ed., Toronto, Canada, May 23-25, 2004, vol. 3200, Lecture Notes in Computer Science, pp. 116-127, Springer-Verlag, Berlin.
    • (2004) Proc. 6th Int. Workshop Information Hiding , vol.3200 , pp. 116-127
    • Lu, P.1    Luo, X.2    Tang, Q.3    Shen, L.4
  • 22
    • 33645663780 scopus 로고    scopus 로고
    • A general framework for structural analysis of LSB replacement
    • M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez- González, Eds., Barcelona, Spain, Jun. 6-8, Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • A. D. Ker, "A general framework for structural analysis of LSB replacement", in Proc. 7th Int. Workshop Information Hiding, M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez-González, Eds., Barcelona, Spain, Jun. 6-8, 2005, vol. 3727, Lecture Notes in Computer Science, pp. 296-311, Springer-Verlag, Berlin.
    • (2005) Proc. 7th Int. Workshop Information Hiding , vol.3727 , pp. 296-311
    • Ker, A.D.1
  • 24
    • 34249326204 scopus 로고    scopus 로고
    • Derivation of error distribution in least squares steganalysis
    • Jun
    • A. D. Ker, "Derivation of error distribution in least squares steganalysis", IEEE Trans. Inf. Forensics Security, vol. 2, no. 2, pp. 140-148, Jun. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.2 , pp. 140-148
    • Ker, A.D.1
  • 25
    • 70449646940 scopus 로고    scopus 로고
    • Calibration revisited
    • J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
    • J. Kodovský and J. Fridrich, "Calibration revisited", in Proc. 11th ACM Multimedia & Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009.
    • (2009) Proc. 11th ACM Multimedia & Security Workshop
    • Kodovský, J.1    Fridrich, J.2
  • 26
    • 70350562893 scopus 로고    scopus 로고
    • The square root law of steganographic capacity for Markov covers
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21
    • T. Filler, A. D. Ker, and J. Fridrich, "The Square Root Law of steganographic capacity for Markov covers", in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21, 2009, vol. 7254, pp. 08 1-08 11.
    • (2009) Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI , vol.7254 , pp. 081-0811
    • Filler, T.1    Ker, A.D.2    Fridrich, J.3
  • 28
    • 51749089283 scopus 로고    scopus 로고
    • JPEG image steganalysis utilizing both intrablock and interblock correlations
    • May
    • C. Chen and Y. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations", in IEEE Int. Symp. Circuits and Systems, 2008 (ISCAS 2008), May 2008, pp. 3029-3032.
    • (2008) IEEE Int. Symp. Circuits and Systems, 2008 (ISCAS 2008) , pp. 3029-3032
    • Chen, C.1    Shi, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.