메뉴 건너뛰기




Volumn 7880, Issue , 2011, Pages

Feature restoration and distortion metrics

Author keywords

Feature Restoration; Mahalanobis Distance; NP Completeness; Numerical Stability; Quadratic Programming; Steganalysis; Steganography

Indexed keywords

FEATURE RESTORATION; MAHALANOBIS DISTANCE; NP-COMPLETENESS; NUMERICAL STABILITIES; STEGANALYSIS;

EID: 79954489095     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.872574     Document Type: Conference Paper
Times cited : (7)

References (24)
  • 1
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • [Proc. 5th Information Hiding Workshop], Springer
    • Farid, H. and Lyu, S., "Detecting hidden messages using higher-order statistics and support vector machines," in [Proc. 5th Information Hiding Workshop], Springer LNCS 2578, 340-354 (2002).
    • (2002) LNCS , vol.2578 , pp. 340-354
    • Farid, H.1    Lyu, S.2
  • 2
    • 33645676686 scopus 로고    scopus 로고
    • New blind steganalysis and its implications
    • Security, Steganography and Watermarking of Multimedia Contents VIII
    • Goljan, M., Fridrich, J., and Holotyak, T., "New blind steganalysis and its implications," in [Security, Steganography and Watermarking of Multimedia Contents VIII], Proc. SPIE 6072, 0101-0113 (2006).
    • (2006) Proc. SPIE , vol.6072 , pp. 101-113
    • Goljan, M.1    Fridrich, J.2    Holotyak, T.3
  • 3
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • [Proc. 8th Information Hiding Workshop], Springer
    • Shi, Y., Chen, C., and Chen, W., "A Markov process based approach to effective attacking JPEG steganography," in [Proc. 8th Information Hiding Workshop], Springer LNCS 4437, 249-264 (2006).
    • (2006) LNCS , vol.4437 , pp. 249-264
    • Shi, Y.1    Chen, C.2    Chen, W.3
  • 4
    • 34548232251 scopus 로고    scopus 로고
    • Merging Markov and DCT features for multi-class JPEG steganalysis
    • Security, Steganography and Watermarking of Multimedia Contents IX
    • Pevný, T. and Fridrich, J., "Merging Markov and DCT features for multi-class JPEG steganalysis," in [Security, Steganography and Watermarking of Multimedia Contents IX], Proc. SPIE 6505, 0301-0314 (2007).
    • (2007) Proc. SPIE , vol.6505 , pp. 301-314
    • Pevný, T.1    Fridrich, J.2
  • 5
    • 77951862698 scopus 로고    scopus 로고
    • Modern steganalysis can detect YASS
    • Media Forensics and Security XII
    • Kodovsky, J., Pevný, T., and Fridrich, J., "Modern steganalysis can detect YASS," in [Media Forensics and Security XII], Proc. SPIE 7541, 0201-0211 (2010).
    • (2010) Proc. SPIE , vol.7541 , pp. 201-211
    • Kodovsky, J.1    Pevný, T.2    Fridrich, J.3
  • 7
    • 14844285173 scopus 로고    scopus 로고
    • Some notes on steganography
    • available from
    • Crandall, R., "Some notes on steganography," (1998). Steganography Mailing List, available from http://os.inf.tu-dresden.de/ ~westfeld/crandall.pdf.
    • (1998) Steganography Mailing List
    • Crandall, R.1
  • 8
    • 38049181797 scopus 로고    scopus 로고
    • On steganographic embedding efficiency
    • [Proc. 8th Information Hiding Workshop], Springer
    • Fridrich, J., Lisoněk, P., and Soukal, D., "On steganographic embedding efficiency," in [Proc. 8th Information Hiding Workshop], Springer LNCS 4437, 282-296 (2006).
    • (2006) LNCS , vol.4437 , pp. 282-296
    • Fridrich, J.1    Lisoněk, P.2    Soukal, D.3
  • 9
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • [Proc. 8th Information Hiding Workshop], Springer
    • Kim, Y., Duric, Z., and Richards, D., "Modified matrix encoding technique for minimal distortion steganography," in [Proc. 8th Information Hiding Workshop], Springer LNCS 4437, 314-327 (2006).
    • (2006) LNCS , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 10
    • 77951871502 scopus 로고    scopus 로고
    • Minimizing embedding impact in steganography using trellis-coded quantization
    • Media Forensics and Security XII
    • Filler, T., Judas, J., and Fridrich, J., "Minimizing embedding impact in steganography using trellis-coded quantization," in [Media Forensics and Security XII], Proc. SPIE 7541, 0501-0514 (2010).
    • (2010) Proc. SPIE , vol.7541 , pp. 501-514
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 11
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • [Proc. 12th Information Hiding Workshop], Springer
    • Pevný, T., Filler, T., and Bas, P., "Using high-dimensional image models to perform highly undetectable steganography," in [Proc. 12th Information Hiding Workshop], Springer LNCS 6387, 161-177 (2010).
    • (2010) LNCS , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 14
    • 77955372544 scopus 로고    scopus 로고
    • Evaluation of distance measures for multi-class classification in binary SVM decision tree
    • Artificial Intelligence and Soft Computing, Springer
    • Madzarov, G. and Gjorgjevikj, D., "Evaluation of distance measures for multi-class classification in binary SVM decision tree," in [Artificial Intelligence and Soft Computing], Springer LNCS 6113, 437-444 (2010).
    • (2010) LNCS , vol.6113 , pp. 437-444
    • Madzarov, G.1    Gjorgjevikj, D.2
  • 16
    • 26444479778 scopus 로고
    • Optimization by simulated annealing
    • Kirkpatrick, S., Gelatt, C., and Vecchi, M., "Optimization by simulated annealing," Science 220(4598), 671-680 (1983).
    • (1983) Science , vol.220 , Issue.4598 , pp. 671-680
    • Kirkpatrick, S.1    Gelatt, C.2    Vecchi, M.3
  • 18
    • 0030493826 scopus 로고    scopus 로고
    • A reflective newton method for minimizing a quadratic function subject to bounds on some of the variables
    • Coleman, T. and Li, Y., "A reflective newton method for minimizing a quadratic function subject to bounds on some of the variables," SIAM Journal on Optimization 6(4), 1040-1058 (1996).
    • (1996) SIAM Journal on Optimization , vol.6 , Issue.4 , pp. 1040-1058
    • Coleman, T.1    Li, Y.2
  • 20
    • 70350499655 scopus 로고    scopus 로고
    • Feature reduction and payload location with WAM steganalysis
    • Media Forensics and Security XI
    • Ker, A. and Lubenko, I., "Feature reduction and payload location with WAM steganalysis," in [Media Forensics and Security XI], Proc. SPIE 7254, 0801-0811 (2009).
    • (2009) Proc. SPIE , vol.7254 , pp. 801-811
    • Ker, A.1    Lubenko, I.2
  • 22
    • 0019342691 scopus 로고
    • Randomised algorithms
    • Welsh, D., "Randomised algorithms," Discrete Applied Mathematics 5(1), 133-145 (1983).
    • (1983) Discrete Applied Mathematics , vol.5 , Issue.1 , pp. 133-145
    • Welsh, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.