메뉴 건너뛰기




Volumn 20, Issue 1, 2011, Pages

New framework for using image contents in blind steganalysis systems

Author keywords

[No Author keywords available]

Indexed keywords

BLIND IMAGE STEGANALYSIS; BLIND STEGANALYSIS; DECISION MAKING PROCESS; DETECTION ACCURACY; EVALUATION CRITERIA; FUZZY APPROACH; IMAGE CONTENT; INPUT IMAGE; TESTING PHASE; TRAINING PHASE; TRAINING PROCESS;

EID: 80055088455     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.3554413     Document Type: Article
Times cited : (38)

References (38)
  • 2
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, "Digital image steganography: survey and analysis of current methods," Signal Process. 90(3), 727-752 (2010).
    • (2010) Signal Process. , vol.90 , Issue.3 , pp. 727-752
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Mc Kevitt, P.4
  • 3
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
    • DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    • J. Fridrich, T. Pevny, and J. Kodovsky, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. ACM 9th Workshop on Multimedia and Security, Dallas, Texas, pp. 3-14, ACM, Washington, DC (2007). (Pubitemid 351203799)
    • (2007) MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 , pp. 3-14
    • Fridrich, J.1    Pevny, T.2    Kodovsky, J.3
  • 4
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • ACM, Washington DC
    • N. Provos, "Defending Against Statistical Steganalysis," in Proc. 10th USENIX Security Symposium, pp. 323-335, ACM, Washington DC (2001).
    • (2001) Proc. 10th USENIX Security Symposium , pp. 323-335
    • Provos, N.1
  • 5
    • 84937814312 scopus 로고    scopus 로고
    • F5-a steganographic algorithm: high capacity despite better steganalysis
    • Information Hiding
    • A. Westfeld, "High Capacity Despite Better Steganalysis (F5-A SteganographicAlgorithm)," in 4th Intl.Workshop on InformationHiding, Lect. Notes Comp. Sci. 2137, 289-302 (2001). (Pubitemid 33367674)
    • (2001) Lecture Notes in Computer Science , Issue.2137 , pp. 289-302
    • Westfeld, A.1
  • 6
    • 35048819204 scopus 로고    scopus 로고
    • Model-based steganography
    • P. Sallee, "Model-based steganography," in Proc. Intl. Workshop Digital Watermarking, Lect. Notes Comp. Sci. 2939, 154-167 (2003). (Pubitemid 38334550)
    • (2003) Lecture Notes in Computer Science , Issue.2939 , pp. 154-167
    • Sallee, P.1
  • 7
    • 30744445178 scopus 로고    scopus 로고
    • Perturbed quantization steganography
    • DOI 10.1007/s00530-005-0194-3
    • J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography," ACM Multimedia System Journal 11(2), 98-107 (2005). (Pubitemid 43099511)
    • (2005) Multimedia Systems , vol.11 , Issue.2 , pp. 98-107
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 9
    • 44649167523 scopus 로고    scopus 로고
    • High-performance JPEG steganography using complementary embedding strategy
    • C. Liu and S. Liao, "High-performance JPEG steganography using complementary embedding strategy," Pattern Recogn. 41, 2945-2955 (2008).
    • (2008) Pattern Recogn. , vol.41 , pp. 2945-2955
    • Liu, C.1    Liao, S.2
  • 10
    • 55549107155 scopus 로고    scopus 로고
    • PM1 steganography in JPEG images using genetic algorithm
    • L. Yu, Y. Zhao, R. Ni, and Z. Zhu, "PM1 steganography in JPEG images using genetic algorithm," Soft Comput. 13(4), 393-400 (2009).
    • (2009) Soft Comput. , vol.13 , Issue.4 , pp. 393-400
    • Yu, L.1    Zhao, Y.2    Ni, R.3    Zhu, Z.4
  • 11
    • 44649098085 scopus 로고    scopus 로고
    • A review on blind detection for image steganography
    • X. Y. Luo, D. S. Wang, P. Wang, and F. L. Liu, "A review on blind detection for image steganography," Signal Process. 88(9), 2138-2157 (2008).
    • (2008) Signal Process. , vol.88 , Issue.9 , pp. 2138-2157
    • Luo, X.Y.1    Wang, D.S.2    Wang, P.3    Liu, F.L.4
  • 13
    • 0037524382 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • S. Dumitrescu,X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. Signal Process. 51(7), 1995-2007 (2003).
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.7 , pp. 1995-2007
    • Dumitrescux. Wu, S.1    Wang, Z.2
  • 20
    • 0036530067 scopus 로고    scopus 로고
    • Statistical evaluation of image quality measures
    • DOI 10.1117/1.1455011
    • I. Avcibas, B. Sankur, and K. Sayood, "Statistical evaluation of image quality measures," J. Electron. Imaging 11(2), 206-223 (2002). (Pubitemid 34536986)
    • (2002) Journal of Electronic Imaging , vol.11 , Issue.2 , pp. 206-223
    • Avcibas, I.1    Sankur, B.2    Sayood, K.3
  • 21
  • 22
    • 0004064292 scopus 로고    scopus 로고
    • Detecting steganographic messages in digital images
    • Dartmouth College, Hanover, NH
    • H. Farid, "Detecting steganographic messages in digital images," Technical Report TR2001-412, Dartmouth College, Hanover, NH (2001).
    • (2001) Technical Report TR2001-412
    • Farid, H.1
  • 30
    • 34147139894 scopus 로고    scopus 로고
    • Blind image steganalysis based on statistical analysis of empirical matrix
    • DOI 10.1109/ICPR.2006.332, 1699719, Proceedings - 18th International Conference on Pattern Recognition, ICPR 2006
    • X. C. Chen, Y. H. Wang, T. N. Tan, and L. Guo, "Blind image steganalysis based on statistical analysis of empirical matrix," in Proc. 18th Intl. Conf. Pattern Recognition, Vol. 3, 1107-1110, IEEE, Hong Kong, China (2006). (Pubitemid 46553314)
    • (2006) Proceedings - International Conference on Pattern Recognition , vol.3 , pp. 1107-1110
    • Chen, X.1    Wang, Y.2    Tan, T.3    Guo, L.4
  • 31
    • 34250775433 scopus 로고    scopus 로고
    • JPEG steganalysis using empirical transitionmatrix in block DCT domain
    • IEEE, Victoria, BC, Canada
    • D. D. Fu, Y. Q. Shi, D. K. Zou, and G. R. Xuan, "JPEG steganalysis using empirical transitionmatrix in block DCT domain," in Proc. IEEE Intl. Workshop Multimedia Signal Processing, pp. 310-313, IEEE, Victoria, BC, Canada (2006).
    • (2006) Proc. IEEE Intl. Workshop Multimedia Signal Processing , pp. 310-313
    • Fu, D.D.1    Shi, Y.Q.2    Zou, D.K.3    Xuan, G.R.4
  • 34
    • 29044433896 scopus 로고    scopus 로고
    • A feature-based classification technique for blind image steganalysis
    • W. N. Lie and G. S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Trans. Multimedia 7(6), 1007-1020 (2005).
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.6 , pp. 1007-1020
    • Lie, W.N.1    Lin, G.S.2
  • 35
    • 80055096091 scopus 로고    scopus 로고
    • JPEG image steganalysis using joint discrete cosine transform domain features
    • Z. Xia, X. Sun,W. Liang, J. Qin, and F. Li, "JPEG image steganalysis using joint discrete cosine transform domain features," J. Electron. Imaging 19, 023006 (2010).
    • (2010) J. Electron. Imaging , vol.19 , pp. 023006
    • Xia, Z.1    Sunw. Liang, X.2    Qin, J.3    Li, F.4
  • 36
    • 80055086123 scopus 로고    scopus 로고
    • ABS: Adaptive batch steganography
    • H. Sajedi and M. Jamzad, "ABS: Adaptive Batch Steganography," J. Opt. Eng. 48(8), 087002 (2009).
    • (2009) J. Opt. Eng. , vol.48 , Issue.8 , pp. 087002
    • Sajedi, H.1    Jamzad, M.2
  • 37
    • 0022808786 scopus 로고
    • A computational approach to edge detection
    • J. Canny, "A computational approach to edge detection," IEEE Trans. Pattern Anal. Mach. Intell. 8, 679-698 (1986).
    • (1986) IEEE Trans. Pattern Anal. Mach. Intell. , vol.8 , pp. 679-698
    • Canny, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.