메뉴 건너뛰기




Volumn 19, Issue 2, 2010, Pages

JPEG image steganalysis using joint discrete cosine transform domain features

Author keywords

[No Author keywords available]

Indexed keywords

DCT COEFFICIENTS; DOMAIN FEATURE; FEATURE SETS; INTER-BLOCK CORRELATIONS; INTRINSIC CHARACTERISTICS; JPEG IMAGE; STEGANALYSIS; STEGO IMAGE;

EID: 80055096091     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.3421972     Document Type: Article
Times cited : (9)

References (31)
  • 1
    • 44649098085 scopus 로고    scopus 로고
    • A review on blind detection for image steganography
    • X. Y. Luo, D. S. Wang, P. Wang, and F. L. Liu, "A review on blind detection for image steganography," Signal Process. 88(9), 2138-2157 (2008).
    • (2008) Signal Process. , vol.88 , Issue.9 , pp. 2138-2157
    • Luo, X.Y.1    Wang, D.S.2    Wang, P.3    Liu, F.L.4
  • 2
    • 84937814312 scopus 로고    scopus 로고
    • F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis
    • Information Hiding
    • A. Westfeld, "F5 a steganographic algorithm: High capacity despite better steganalysis," in Proc. 4th Int. Workshop on Information Hiding, Pittsburgh, pp. 289-302, Springer Verlag, Berlin (2001). (Pubitemid 33367674)
    • (2001) Lecture Notes in Computer Science , Issue.2137 , pp. 289-302
    • Westfeld, A.1
  • 3
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington, DC, USENIX Assoc., Berkeley, CA
    • N. Provos, "Defending against statistical steganalysis," in Proc. 10th Usenix Security Symp, Washington, DC, pp. 323-335, USENIX Assoc., Berkeley, CA (2001).
    • (2001) Proc. 10th Usenix Security Symp , pp. 323-335
    • Provos, N.1
  • 4
    • 14844326111 scopus 로고    scopus 로고
    • Model based steganography
    • Seoul, Korea, Springer Verlag, Berlin
    • P. Sallee, "Model based steganography," in Proc. Digital Watermarking: 2 Int. Workshop, Seoul, Korea, pp. 174-188, Springer Verlag, Berlin (2003).
    • (2003) Proc. Digital Watermarking: 2 Int. Workshop , pp. 174-188
    • Sallee, P.1
  • 9
  • 10
    • 0036452586 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistical models
    • Rochester, NY
    • H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, pp. 905-908 (2002).
    • (2002) Proc. IEEE Int. Conf. Image Processing , pp. 905-908
    • Farid, H.1
  • 11
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Berlin, Springer Verlag, Berlin
    • S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop on Information Hiding Information Hiding, Berlin, pp. 340-354, Springer Verlag, Berlin (2003).
    • (2003) Proc. 5th Int. Workshop on Information Hiding Information Hiding , pp. 340-354
    • Lyu, S.1    Farid, H.2
  • 12
    • 33847717054 scopus 로고    scopus 로고
    • Optimized feature extraction for learning-based image steganalysis
    • DOI 10.1109/TIFS.2006.890517
    • Y. Wang and P. Moulin, "Optimized feature extraction for learningbased image steganalysis," IEEE Trans. Inf. Forensics Security 2(1), 31-45 (2007). (Pubitemid 46375829)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.1 , pp. 31-45
    • Wang, Y.1    Moulin, P.2
  • 14
    • 42949152730 scopus 로고    scopus 로고
    • Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function
    • Atlanta
    • H. Chen, Y. Q. Shi, W. Chen, and G. R. Xuan, "Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function," in Proc. IEEE Int. Conf. on Image Processing, Atlanta, pp. 105-108 (2006).
    • (2006) Proc. IEEE Int. Conf. on Image Processing , pp. 105-108
    • Chen, H.1    Shi, Y.Q.2    Chen, W.3    Xuan, G.R.4
  • 15
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • Alexandria, VA, Springer Verlag, Berlin
    • Y. Q. Shi, C. H. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int. Workshop on Information Hiding, Alexandria, VA, pp. 249-264, Springer Verlag, Berlin (2006).
    • (2006) Proc. 8th Int. Workshop on Information Hiding , pp. 249-264
    • Shi, Y.Q.1    Chen, C.H.2    Chen, W.3
  • 16
    • 51749089283 scopus 로고    scopus 로고
    • JPEG image steganalysis utilizing both intrablock and interblock correlations
    • Seattle
    • C. H. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Proc. IEEE Int. Symp. on Circuits and Systems, Seattle, pp. 3029-3032 (2008).
    • (2008) Proc. IEEE Int. Symp. on Circuits and Systems , pp. 3029-3032
    • Chen, C.H.1    Shi, Y.Q.2
  • 17
    • 29044433896 scopus 로고    scopus 로고
    • A feature-based classification technique for blind image steganalysis
    • DOI 10.1109/TMM.2005.858377
    • W.-N. Lie and G.-S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Trans. Multimedia 7(6), 1007-1020 (2005). (Pubitemid 41789113)
    • (2005) IEEE Transactions on Multimedia , vol.7 , Issue.6 , pp. 1007-1020
    • Lie, W.-N.1    Lin, G.-S.2
  • 21
    • 56749170425 scopus 로고    scopus 로고
    • Multi-class detector of current steganographic methods for JPEG format
    • T. Pevný and J. Fridrich, "Multi-class detector of current steganographic methods for JPEG format," IEEE Trans. Inf. Forensics Security 3(4), 635-650 (2008).
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.4 , pp. 635-650
    • Pevný, T.1    Fridrich, J.2
  • 23
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
    • DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    • J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th ACM Workshop on Multimedia & Security, Dallas, pp. 3-14, ACM, New York (2007). (Pubitemid 351203799)
    • (2007) MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 , pp. 3-14
    • Fridrich, J.1    Pevny, T.2    Kodovsky, J.3
  • 25
    • 0036871099 scopus 로고    scopus 로고
    • Context-based entropy coding of block transform coefficients for image compression
    • J. Tu and T. D. Tran, "Context-based entropy coding of block transform coefficients for image compression," IEEE Trans. Image Process. 11(11), 1271-1283 (2002).
    • (2002) IEEE Trans. Image Process. , vol.11 , Issue.11 , pp. 1271-1283
    • Tu, J.1    Tran, T.D.2
  • 26
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C. J. C. Burges, "A tutorial on support vector machines for pattern recognition," Data Min. Knowl. Discov. 2(2), 121-167 (1998). (Pubitemid 128695475)
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 30
    • 34548832563 scopus 로고    scopus 로고
    • Effect of recompression on attacking JPEG steganographic schemes - An experimental study
    • 4252876, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
    • Y. Q. Shi, C. H. Chen, W. Chen, and M. P. Kaundinya, "Effect of recompression on attacking JPEG steganographic schemes-An experimental study," in Proc. IEEE Int. Symp. on Circuits and Systems, New Orleans, pp. 1265-1268, IEEE, Piscataway, NJ (2007). (Pubitemid 47448746)
    • (2007) Proceedings - IEEE International Symposium on Circuits and Systems , pp. 1265-1268
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3    Kaundinya, M.P.4
  • 31
    • 34250775433 scopus 로고    scopus 로고
    • JPEG steganalysis using empirical transition matrix in block DCT domain
    • Victoria, Canada, IEEE, Piscataway, NJ
    • D. D. Fu, Y. Q. Shi, D. K. Zou, and G. R. Xuan, "JPEG steganalysis using empirical transition matrix in block DCT domain," in Proc. IEEE Workshop on Multimedia Signal Processing, Victoria, Canada, pp. 310-313, IEEE, Piscataway, NJ (2006).
    • (2006) Proc. IEEE Workshop on Multimedia Signal Processing , pp. 310-313
    • Fu, D.D.1    Shi, Y.Q.2    Zou, D.K.3    Xuan, G.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.