메뉴 건너뛰기




Volumn 48, Issue 8, 2009, Pages

Adaptive batch steganography considering image embedding capacity

Author keywords

batch steganography; embedding capacity; ensemble methods; multiple cove images; steganalysis; support vector machine

Indexed keywords

BATCH STEGANOGRAPHY; EMBEDDING CAPACITY; ENSEMBLE METHODS; MULTIPLE COVE IMAGES; STEGANALYSIS; SUPPORT VECTOR;

EID: 80055086123     PISSN: 00913286     EISSN: 15602303     Source Type: Journal    
DOI: 10.1117/1.3204231     Document Type: Article
Times cited : (6)

References (32)
  • 1
    • 84937814312 scopus 로고    scopus 로고
    • F5-a steganographic algorithm: High capacity despite better steganalysis
    • Information Hiding
    • A., Westfeld, " F5-a steganographic algorithm: high capacity despite better steganalysis, " in, Proc. of 4th Int. Workshop on Information Hiding, Vol. 2137, pp. 289-302, Springer, Berlin/Heidelberg (Apr. 2001). (Pubitemid 33367674)
    • (2001) Proc. of 4th Int. Workshop on Information Hiding , Issue.2137 , pp. 289-302
    • Westfeld, A.1
  • 2
    • 35048819204 scopus 로고    scopus 로고
    • Model-based steganography
    • P., Sallee, " Model-based steganography, " in, Proc. of Int. Workshop on Digital Watermarking, Seoul, Vol. 2939, pp. 154-167, Springer, Berlin/Heidelberg (Oct. 2003). (Pubitemid 38334550)
    • (2003) Proc. of Int. Workshop on Digital Watermarking , Issue.2939 , pp. 154-167
    • Sallee, P.1
  • 5
    • 67249089206 scopus 로고    scopus 로고
    • Adaptive steganography method based on contourlet transform
    • IEEE, Beijing
    • H., Sajedi and M., Jamzad, " Adaptive steganography method based on contourlet transform, " in, Proc. of 9th Int. Conf. Signal Processing, pp. 745-748, IEEE, Beijing (2008).
    • (2008) Proc. of 9th Int. Conf. Signal Processing , pp. 745-748
    • Sajedi, H.1    Jamzad, M.2
  • 6
    • 0242576325 scopus 로고    scopus 로고
    • Steganography capacity: A steganalysis perspective
    • spi PSISDG 0277-786X 10.1117/12.479732
    • R., Chandramouli and N. D., Memon, " Steganography capacity: a steganalysis perspective, ", Proc. SPIE, 5020, 173-177 (2003). spi PSISDG 0277-786X 10.1117/12.479732
    • (2003) Proc. SPIE , vol.5020 , pp. 173-177
    • Chandramouli, R.1    Memon, N.D.2
  • 7
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
    • DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    • J., Fridrich, T., Pevny, and J., Kodovsky, " Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities, " in, Proc. of 10th ACM Workshop on Multimedia and Security (MM&Sec'08), Dallas, pp. 3-14, ACM, New York (Sept. 2007). (Pubitemid 351203799)
    • (2007) MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 , pp. 3-14
    • Fridrich, J.1    Pevny, T.2    Kodovsky, J.3
  • 8
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Springer, Berlin/Heidelberg (Apr.)
    • C., Cachin, " An information-theoretic model for steganography, " in, Proc. of 2nd Int. Workshop on Information Hiding, Prtland, OR, Vol. 1525/1998, pp. 306-318, Springer, Berlin/Heidelberg (Apr. 1998).
    • (1998) Proc. of 2nd Int. Workshoon Information Hiding, Prtland, or , vol.1525 , Issue.1998 , pp. 306-318
    • Cachin, C.1
  • 9
    • 0036709581 scopus 로고    scopus 로고
    • A framework for evaluating the data-hiding capacity of image sources
    • DOI 10.1109/TIP.2002.802512, PII 1011092002802512
    • P., Moulin and M. K., Mihcak, " A framework for evaluating the data hiding capacity of image sources, ", IEEE Trans. Image Process., 11, 1029-1042 (2002). iei IIPRE4 1057-7149 10.1109/TIP.2002.802512 (Pubitemid 35250386)
    • (2002) IEEE Transactions on Image Processing , vol.11 , Issue.9 , pp. 1029-1042
    • Moulin, P.1    Mihcak, M.K.2
  • 10
  • 11
    • 57149128996 scopus 로고    scopus 로고
    • Perturbation hiding and the batch steganography problem
    • Springer, Berlin/Heidelberg (May)
    • A. D., Ker, " Perturbation hiding and the batch steganography problem, " in, Proc. of 10th Information Hiding Workshop, IH 2008, Santa Barbara, CA, pp. 45-59, Springer, Berlin/Heidelberg (May, 2008).
    • (2008) Proc. of 10th Information Hiding Workshop, IH 2008, Santa Barbara, CA , pp. 45-59
    • Ker, A.D.1
  • 13
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • DOI 10.1109/LSP.2006.891319
    • A. D., Ker, " A capacity result for batch steganography, ", IEEE Signal Process. Lett., 14 (8), 525-528 (2007). isp ISPLEM 1070-9908 10.1109/LSP.2006.891319 (Pubitemid 47250022)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.D.1
  • 15
    • 33947106261 scopus 로고    scopus 로고
    • A new fuzzy support vector machine based on the weighted margin
    • 10.1007/s11063-004-1640-5
    • T., Qing and W., Jue, " A new fuzzy support vector machine based on the weighted margin, ", Neural Process. Lett., 20 (3), 139-150 (2004). 10.1007/s11063-004-1640-5
    • (2004) Neural Process. Lett. , vol.20 , Issue.3 , pp. 139-150
    • Qing, T.1    Jue, W.2
  • 16
  • 17
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • DOI 10.1023/A:1009715923555
    • C. J. C., Burges, " A tutorial on support vector machines for pattern recognition, ", Data Min. Knowl. Discov., 2, 121-167 (1998). awj DMKDFD 1384-5810 10.1023/A:1009715923555 (Pubitemid 128126769)
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-168
    • Burges, C.J.C.1
  • 18
    • 0242288813 scopus 로고    scopus 로고
    • The support vector machine under test
    • DOI 10.1016/S0925-2312(03)00431-4
    • D., Meyer, F., Leisch, and K., Hornik, " The support vector machine under test, ", Neurocomputing, 55, 169-186 (2003). 9g3 NRCGEO 0925-2312 10.1016/S0925-2312(03)00431-4 (Pubitemid 37336675)
    • (2003) Neurocomputing , vol.55 , Issue.1-2 , pp. 169-186
    • Meyer, D.1    Leisch, F.2    Hornik, K.3
  • 19
    • 21844474312 scopus 로고    scopus 로고
    • Benchmarking steganographic and steganalysis techniques
    • DOI 10.1117/12.587375, 26, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
    • M., Kharrazi, T. H., Sencar, and N., Memon, " Benchmarking steganographic and steganalysis techniques, " in, Security, Steganography, and Watermarking of Multimedia Contents VII, Proc. SPIE, 5681, 252-263 (2005). spi PSISDG 0277-786X 10.1117/12.587375 (Pubitemid 40952986)
    • (2005) Proceedings of SPIE - The International Society for Optical Engineering , vol.5681 , pp. 252-263
    • Kharrazi, M.1    Sencar, H.T.2    Memon, N.3
  • 20
    • 33645696636 scopus 로고    scopus 로고
    • Image steganalysis with binary similarity measures
    • DOI 10.1155/ASP.2005.2749, PII S1110865705505110
    • I., Avcibas, M., Kharrazi, N., Memon, and B., Sankur, " Image steganalysis with binary similarity measures, ", EURASIP J. Appl. Signal Process. 2005, 2749-2757 (2005). cws ZZZZZZ 1110-8657 10.1155/ASP.2005.2749 (Pubitemid 44178258)
    • (2005) Eurasip Journal on Applied Signal Processing , vol.2005 , Issue.17 , pp. 2749-2757
    • Avcibas, I.1    Kharrazi, M.2    Memon, N.3    Sankur, B.4
  • 21
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • The Netherlands, Springer-Verlag (Oct.)
    • S., Lyu and H., Farid, " Detecting hidden messages using higher-order statistics and support vector machines, " in, Proc. of 5th Int. Workshop on Information Hiding, The Netherlands, pp. 340-354, Springer-Verlag (Oct. 2002).
    • (2002) Proc. of 5th Int. Workshoon Information Hiding , pp. 340-354
    • Lyu, S.1    Farid, H.2
  • 22
    • 8844256156 scopus 로고    scopus 로고
    • Steganalysis using color wavelet statistics and one-class support vector machines
    • spi PSISDG 0277-786X 10.1117/12.526012
    • S., Lyu and H., Farid, " Steganalysis using color wavelet statistics and one-class support vector machines, " in, Security Steganography, and Watermarking of Multimedia Contents VI, Proc. SPIE, 5306, 35-45 (2004). spi PSISDG 0277-786X 10.1117/12.526012
    • (2004) Security Steganography, and Watermarking of Multimedia Contents VI, Proc. SPIE , vol.5306 , pp. 35-45
    • Lyu, S.1    Farid, H.2
  • 24
    • 80053403826 scopus 로고    scopus 로고
    • Ensemble methods in machine learning
    • 9fi LNCSD9 0302-9743 10.1007/3-540-45014-9-1
    • T. G., Dietterich, " Ensemble methods in machine learning, " in, Multiple Classifier Systems, Lect. Notes Comput. Sci., 1857, 1-15, (2001). 9fi LNCSD9 0302-9743 10.1007/3-540-45014-9-1
    • (2001) Multiple Classifier Systems, Lect. Notes Comput. Sci. , vol.1857 , pp. 1-15
    • Dietterich, T.G.1
  • 25
    • 0001963082 scopus 로고    scopus 로고
    • A short introduction to boosting
    • Y., Freund and R., Schapire, " A short introduction to boosting, ", J. Jpn. Soc. Artif. Intell., 14 (5), 771-780 (1999).
    • (1999) J. Jpn. Soc. Artif. Intell. , vol.14 , Issue.5 , pp. 771-780
    • Freund, Y.1    Schapire, R.2
  • 28
    • 42949152730 scopus 로고    scopus 로고
    • Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function
    • Atlanta, IEEE
    • C., Chen, Y. Q., Shi, W., Chen, and G., Xuan, " Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function, " in, Proc. of ICIP, Atlanta, IEEE, pp. 105-108 (2006).
    • (2006) Proc. of ICIP , pp. 105-108
    • Chen, C.1    Shi, Y.Q.2    Chen, W.3    Xuan, G.4
  • 32
    • 33847325331 scopus 로고    scopus 로고
    • Achieving higher stability in watermarking according to image complexity
    • M., Jamzad and F., Yaghmaee, " Achieving higher stability in watermarking according to image complexity, ", Scientia Iranica J., 13 (4), 404-412 (2006). (Pubitemid 46321900)
    • (2006) Scientia Iranica , vol.13 , Issue.4 , pp. 404-412
    • Jamzad, M.1    Yaghmaee, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.