메뉴 건너뛰기




Volumn 2, Issue 2, 2011, Pages 142-172

A survey on image steganography and steganalysis

Author keywords

Digital image; Information hiding; Steganalysis; Steganography

Indexed keywords

DIGITAL IMAGE; FUNDAMENTAL CONCEPTS; IMAGE STEGANOGRAPHY; INFORMATION HIDING; RESEARCH TRENDS; SPATIAL REPRESENTATIONS; STEGANALYSIS; STEGANOGRAPHIC SECURITY;

EID: 79960738044     PISSN: 20734212     EISSN: 20734239     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (402)

References (89)
  • 2
    • 84955568589 scopus 로고    scopus 로고
    • Information hiding terminology-results of an informal plenary meeting and additional proposals
    • Springer
    • Birgit P tzmann, Information hiding terminology-results of an informal plenary meeting and additional proposals, Proc. of the First International Workshop on Information Hiding, vol. 1174, pp. 347-350. Springer, 1996.
    • (1996) Proc. of the First International Workshop On Information Hiding , vol.1174 , pp. 347-350
    • Tzmann, B.P.1
  • 3
    • 11844252006 scopus 로고    scopus 로고
    • Cyber warfare: Steganography vs. steganalysis
    • Huaiqing Wang and Shuozhong Wang, Cyber warfare: Steganography vs. steganalysis, Communications of the ACM, vol. 47, no. 10, pp. 76-82, 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.10 , pp. 76-82
    • Wang, H.1    Wang, S.2
  • 5
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography
    • Niels Provos and Peter Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, vol. 1, no.3, pp. 32-44, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 7
    • 0001217738 scopus 로고
    • Simmons, The prisoners' problem and the subliminal channel
    • Gustavus J. Simmons, The prisoners' problem and the subliminal channel, Proc. of CRYPTO'83, pp. 51-67, 1983.
    • (1983) Proc. of CRYPTO'83 , pp. 51-67
    • Gustavus, J.1
  • 9
    • 3042519430 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Christian Cachin, An information-theoretic model for steganography, Information and Computation, vol. 192, no. 1, pp. 41-56, 2004.
    • (2004) Information and Computation , vol.192 , Issue.1 , pp. 41-56
    • Cachin, C.1
  • 12
    • 34547405250 scopus 로고    scopus 로고
    • Steganography in binary image by checking data-carrying eligibility of boundary pixels
    • G. Liang, S. Wang, and X. Zhang, Steganography in binary image by checking data-carrying eligibility of boundary pixels, Journal of Shanghai University, vol. 11, no. 3, pp. 272-277, 2007.
    • (2007) Journal of Shanghai University , vol.11 , Issue.3 , pp. 272-277
    • Liang, G.1    Wang, S.2    Zhang, X.3
  • 13
    • 0038527408 scopus 로고    scopus 로고
    • Data hiding on 3-d triangle meshes
    • F. Cayre and B. Macq, Data hiding on 3-d triangle meshes, IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 939-949, 2003.
    • (2003) IEEE Trans. Signal Processing , vol.51 , Issue.4 , pp. 939-949
    • Cayre, F.1    Macq, B.2
  • 16
    • 0032634270 scopus 로고    scopus 로고
    • Principle and applications of bpcs steganography
    • SPIE
    • Eiji Kawaguchi and Richard O. Eason, Principle and applications of bpcs steganography, In Multimedia Systems and Applications, vol. 3528, pp. 464-473, SPIE, 1998.
    • (1998) Multimedia Systems and Applications , vol.3528 , pp. 464-473
    • Kawaguchi, E.1    Eason, R.O.2
  • 17
    • 84892764719 scopus 로고    scopus 로고
    • Attacks on steganographic systems-breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools-and some lessons learned
    • Springer
    • A. Westfeld and A. Pfitzmann, Attacks on steganographic systems-breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools-and some lessons learned. Proc. of the 3rd Information Hiding Workshop, vol. 1768, pp. 61-76, Springer, 1999.
    • (1999) Proc. of the 3rd Information Hiding Workshop , vol.1768 , pp. 61-76
    • Westfeld, A.1    Pfitzmann, A.2
  • 18
    • 84947277755 scopus 로고    scopus 로고
    • An implementation of key-based digital signal steganography
    • Springer
    • T. Sharp, An implementation of key-based digital signal steganography, Proc. of the 4th Information Hiding Workshop, vol. 2137, pp. 13-26, Springer, 2001.
    • (2001) Proc. of the 4th Information Hiding Workshop , vol.2137 , pp. 13-26
    • Sharp, T.1
  • 19
  • 23
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value diRerencing
    • D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value diRerencing, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.9-10 , pp. 1613-1626
    • Wu, D.C.1    Tsai, W.H.2
  • 24
    • 11844253853 scopus 로고    scopus 로고
    • Steganography using multiple-base notational system and human vision sensitivity
    • Xinpeng Zhang and Shuozhong Wang, Steganography using multiple-base notational system and human vision sensitivity, IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67-70, 2005.
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.1 , pp. 67-70
    • Zhang, X.1    Wang, S.2
  • 25
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • B. Chen and G. W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
    • (2001) IEEE Trans. Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 26
    • 32644446054 scopus 로고    scopus 로고
    • High-performance jpeg steganography using quantization index modulation in dct domain
    • H. Noda, M. Niimi, and E. Kawaguchi, High-performance jpeg steganography using quantization index modulation in dct domain, Pattern Recognition Letters, vol. 27, no. 5, pp. 455-461, 2006.
    • (2006) Pattern Recognition Letters , vol.27 , Issue.5 , pp. 455-461
    • Noda, H.1    Niimi, M.2    Kawaguchi, E.3
  • 28
    • 84871249493 scopus 로고    scopus 로고
    • Derek Upham, Jsteg
    • Derek Upham, Jsteg, http://zooid.org/ paul/crypto/jsteg/.
  • 29
    • 84871181561 scopus 로고    scopus 로고
    • Allan Latham, Jphide
    • Allan Latham, Jphide, http://linux01.gwdg.de/ alatham/stego.html.
  • 30
    • 84937814312 scopus 로고    scopus 로고
    • F5-a steganographic algorithm: High capacity despite better steganalysis
    • Springer
    • Andrew Westfeld, F5-a steganographic algorithm: high capacity despite better steganalysis, Proc. of the 4th Information Hiding Workshop, vol. 2137, pp. 289-302, Springer, 2001.
    • (2001) Proc. of the 4th Information Hiding Workshop , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 33
    • 49949091527 scopus 로고    scopus 로고
    • Yass: Yet another steganographic scheme that resists blind steganalysis
    • Springer
    • K. Solanki, A. Sarkar, and B. S. Manjunath, Yass: Yet another steganographic scheme that resists blind steganalysis,Proc. of the 9th Information Hiding Workshop, Springer, vol. 4567, pp. 16-31, 2007.
    • (2007) Proc. of the 9th Information Hiding Workshop , vol.4567 , pp. 16-31
    • Solanki, K.1    Sarkar, A.2    Manjunath, B.S.3
  • 34
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes
    • Springer
    • J. Fridrich, Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes, Proc. of the 6th Information Hiding Workshop, Springer, vol. 3200, pp. 67-81, 2004.
    • (2004) Proc. of the 6th Information Hiding Workshop , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 37
    • 77955691327 scopus 로고    scopus 로고
    • An experimental study on the security performance of yass
    • Fangjun Huang, Jiwu Huang, and Yun Qing Shi, An experimental study on the security performance of yass, IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 374-380, 2010.
    • (2010) IEEE Trans. Information Forensics and Security , vol.5 , Issue.3 , pp. 374-380
    • Huang, F.1    Huang, J.2    Shi, Y.Q.3
  • 39
    • 51749089283 scopus 로고    scopus 로고
    • Jpeg image steganalysis utilizing both intra-block and inter-block correlations
    • C. Chen and Y. Q. Shi, Jpeg image steganalysis utilizing both intra-block and inter-block correlations, Proc. of ISCAS'08, pp. 3029-3032, 2008.
    • (2008) Proc. of ISCAS'08 , pp. 3029-3032
    • Chen, C.1    Shi, Y.Q.2
  • 41
    • 0037524382 scopus 로고    scopus 로고
    • Detection of lsb steganography via sample pair analysis
    • S. Dumitrescu, X. L. Wu, and Z. Wang, Detection of lsb steganography via sample pair analysis, IEEE Trans. Signal Processing, vol. 51, no. 7, pp. 1995-2007, 2003.
    • (2003) IEEE Trans. Signal Processing , vol.51 , Issue.7 , pp. 1995-2007
    • Dumitrescu, S.1    Wu, X.L.2    Wang, Z.3
  • 43
    • 33746613626 scopus 로고    scopus 로고
    • A general framework for the structural steganalysis of lsb replacement
    • A. D. Ker, A general framework for the structural steganalysis of lsb replacement, Proc. of the 7th Information Hiding Workshop, Springer, vol. 3727, pp. 296-311, 2005.
    • (2005) Proc. of the 7th Information Hiding Workshop, Springer , vol.3727 , pp. 296-311
    • Ker, A.D.1
  • 46
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of lsb matching in grayscale images
    • A. D. Ker. Steganalysis of lsb matching in grayscale images, IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, 2005.
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 49
    • 69949122982 scopus 로고    scopus 로고
    • Detection of +/-1 lsb steganography based on the amplitude of histogram local extrema
    • G. Cancelli, G. Doerr, I. J. Cox, and M. Barni, Detection of +/-1 lsb steganography based on the amplitude of histogram local extrema, Proc. of ICIP'08, pp. 1288-1291, 2008.
    • (2008) Proc. of ICIP'08 , pp. 1288-1291
    • Cancelli, G.1    Doerr, G.2    Cox, I.J.3    Barni, M.4
  • 50
    • 48149084629 scopus 로고    scopus 로고
    • Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels
    • F. J. Huang, B. Li, and J. W. Huang, Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels, Proc. of ICIP'07, vol. 1, pp. 401-404, 2007.
    • (2007) Proc. of ICIP'07 , vol.1 , pp. 401-404
    • Huang, F.J.1    Li, B.2    Huang, J.W.3
  • 53
    • 33750175796 scopus 로고    scopus 로고
    • Steganalysis of stochastic modulation steganography
    • J. H. He and J. W. Huang, Steganalysis of stochastic modulation steganography, Science in China Series: F-Information Sciences, vol. 49, no. 3, pp. 273-285, 2006.
    • (2006) Science In China Series: F-Information Sciences , vol.49 , Issue.3 , pp. 273-285
    • He, J.H.1    Huang, J.W.2
  • 55
    • 0347355319 scopus 로고    scopus 로고
    • Vulnerability of pixel-value diRerencing steganography to histogram analysis and modication for enhanced security
    • X. P. Zhang and S. Z. Wang, Vulnerability of pixel-value diRerencing steganography to histogram analysis and modication for enhanced security, Pattern Recognition Letters, vol. 25, no. 3, pp. 331-339,2004.
    • (2004) Pattern Recognition Letters , vol.25 , Issue.3 , pp. 331-339
    • Zhang, X.P.1    Wang, S.Z.2
  • 56
    • 67650175930 scopus 로고    scopus 로고
    • Steganalysis of multiple-base notational system steganography
    • Bin Li, Yanmei Fang, and Jiwu Huang, Steganalysis of multiple-base notational system steganography, IEEE Signal Processing Letters, vol. 15, no. 493-496, 2008.
    • (2008) IEEE Signal Processing Letters , vol.15 , Issue.493-496
    • Li, B.1    Fang, Y.2    Huang, J.3
  • 66
    • 44649098085 scopus 로고    scopus 로고
    • A review on blind detection for image steganography
    • X. Y. Luo, D. S. Wang, P. Wang, and F. L. Liu, A review on blind detection for image steganography, Signal Processing, vol. 88, no. 9, pp. 2138-2157, 2008.
    • (2008) Signal Processing , vol.88 , Issue.9 , pp. 2138-2157
    • Luo, X.Y.1    Wang, D.S.2    Wang, P.3    Liu, F.L.4
  • 67
    • 0038343416 scopus 로고    scopus 로고
    • Steganalysis using image quality metrics
    • I. Avcibas, N. Memon, and B. Sankur, Steganalysis using image quality metrics, IEEE Trans. Image Processing, vol. 12, no. 2, pp. 221-229, 2003.
    • (2003) IEEE Trans. Image Processing , vol.12 , Issue.2 , pp. 221-229
    • Avcibas, I.1    Memon, N.2    Sankur, B.3
  • 68
    • 84868516320 scopus 로고    scopus 로고
    • Detecting hidden message using higher-order statistics and support vector machines
    • Lyu Siwei and H. Farid, Detecting hidden message using higher-order statistics and support vector machines, Proc. of the 5th Information Hiding Workshop, Springer, vol. 2578, pp. 131-142, 2002.
    • (2002) Proc. of the 5th Information Hiding Workshop, Springer , vol.2578 , pp. 131-142
    • Siwei, L.1    Farid, H.2
  • 73
    • 33847717054 scopus 로고    scopus 로고
    • Optimized feature extraction for learning-based image steganalysis
    • Y. Wang and P. Moulin, Optimized feature extraction for learning-based image steganalysis, IEEE Trans. Information Forensics and Security, vol. 2, no. 1, pp. 31-45, 2007.
    • (2007) IEEE Trans. Information Forensics and Security , vol.2 , Issue.1 , pp. 31-45
    • Wang, Y.1    Moulin, P.2
  • 75
    • 33645695834 scopus 로고    scopus 로고
    • Posted on steganography mailing list, 1998
    • R. Crandall, Some notes on steganography, Posted on steganography mailing list, http://os.inf.tudresden.de/ westfeld/crandall.pdf, 1998.
    • Some Notes On Steganography
    • Crandall, R.1
  • 77
    • 36248978560 scopus 로고    scopus 로고
    • A double layered plus-minus one data embedding scheme
    • W. M. Zhang, X. P. Zhang, and S. Z. Wang, A double layered plus-minus one data embedding scheme, IEEE Signal Processing Letters, vol. 14, no. 11, pp. 848-851, 2007.
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.11 , pp. 848-851
    • Zhang, W.M.1    Zhang, X.P.2    Wang, S.Z.3
  • 79
    • 45449087266 scopus 로고    scopus 로고
    • Constructing good covering codes for applications in steganography, LNCS Trans
    • JAurgen Bierbrauer and Jessica Fridrich, Constructing good covering codes for applications in steganography, LNCS Trans. Data Hiding and Multimedia Security III, vol. 4920, pp. 1-22, 2008.
    • (2008) Data Hiding and Multimedia Security III , vol.4920 , pp. 1-22
    • Bierbrauer, J.1    Fridrich, J.2
  • 88
    • 56749170425 scopus 로고    scopus 로고
    • Multiclass detector of current steganographic methods for jpeg format
    • Tomas Pevny and J. Fridrich, Multiclass detector of current steganographic methods for jpeg format, IEEE Trans. Information Forensics and Security, vol. 3, no. 4, pp. 635-650, 2008.
    • (2008) IEEE Trans. Information Forensics and Security , vol.3 , Issue.4 , pp. 635-650
    • Pevny, T.1    Fridrich, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.