메뉴 건너뛰기




Volumn 6, Issue 4, 2011, Pages 211-225

KL-sense secure image steganography

Author keywords

Conditional entropy; Data hiding; Kullback Liebler divergence; Markov chain; Steganography

Indexed keywords

EMBEDDINGS; ENTROPY; HIGHER ORDER STATISTICS; MARKOV PROCESSES;

EID: 84857206460     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2011.045229     Document Type: Article
Times cited : (9)

References (32)
  • 3
    • 3042519430 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Cachin, C. (2004) 'An information-theoretic model for steganography', Information and Computation, Vol. 192, No. 1, pp.41-56.
    • (2004) Information and Computation , vol.192 , Issue.1 , pp. 41-56
    • Cachin, C.1
  • 5
    • 33847692468 scopus 로고    scopus 로고
    • Image steganography and steganalysis: Concepts and practice
    • Chandramouli, R., Kharrazi, M. and Memon, N. (2003) 'Image steganography and Steganalysis: Concepts and Practice', Proc. SPIE Security and Watermarking of Multimedia Contents, Special session on Steganalysis, pp.35-49. (Pubitemid 38334541)
    • (2003) Lecture Notes in Computer Science , Issue.2939 , pp. 35-49
    • Chandramouli, R.1    Kharrazi, M.2    Memon, N.3
  • 7
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • Chen, B. and Wornell, G.W. (2001) 'Quantization index modulation: a class of provably good methods for digital watermarking and information embedding', IEEE Transactions on Information Theory, pp.1423-1443. (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 8
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Christopher, B.J.C. (1998) 'A tutorial on support vector machines for pattern recognition', Data Mining and Knowledge Discovery, Vol. 2, pp.121-167.
    • (1998) Data Mining and Knowledge Discovery , vol.2 , pp. 121-167
    • Christopher, B.J.C.1
  • 9
    • 0037524382 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • Dumitrescu, S., Wu, X. and Wang, Z. (2003) 'Detection of LSB steganography via sample pair analysis', IEEE Transactions on Signal Processing, Vol. 51, No. 7, pp.1995-2007.
    • (2003) IEEE Transactions on Signal Processing , vol.51 , Issue.7 , pp. 1995-2007
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 13
    • 0242414140 scopus 로고    scopus 로고
    • Steganalysis of additive noise modelable information hiding
    • Harmsen, J.J. and Pearlman, W.A. (2003) 'Steganalysis of additive noise modelable information hiding', Proc. SPIE Electronic Imaging, pp.21-24.
    • (2003) Proc. SPIE Electronic Imaging , pp. 21-24
    • Harmsen, J.J.1    Pearlman, W.A.2
  • 14
    • 0031996445 scopus 로고    scopus 로고
    • Exploring steganography: Seeing the unseen
    • Johnson, N.F. and Jajodia, S. (1998) 'Exploring steganography: seeing the unseen', Signal Processing Laboratory (EPLF), IEEE Computer, Vol. 31, No. 2, pp.26-34. (Pubitemid 128555329)
    • (1998) Computer , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2
  • 15
    • 0001931684 scopus 로고    scopus 로고
    • A survey of steganographic techniques
    • Johnson, N.F. and Jajodia, S. (2000) 'A survey of steganographic techniques', Information Hiding, pp.43-78.
    • (2000) Information Hiding , pp. 43-78
    • Johnson, N.F.1    Jajodia, S.2
  • 16
    • 33746613626 scopus 로고    scopus 로고
    • A general framework for the structural steganalysis of LSB replacement
    • LNCS 3727
    • Ker, A.D. (2005) 'A general framework for the structural steganalysis of LSB replacement', Proc. 7th Information Hiding Workshop, Vol. LNCS 3727, pp.296-311.
    • (2005) Proc. 7th Information Hiding Workshop , pp. 296-311
    • Ker, A.D.1
  • 17
    • 33947707398 scopus 로고    scopus 로고
    • Security and robustness enhancement for image data hiding
    • DOI 10.1109/TMM.2006.888005
    • Liu, N., Amin, P. and Subbalakshmi, K.P. (2007) 'Joint security and robustness enhancement for quantization based data embedding', IEEE Transactions on Circuits and Systems for Video Technology, Vol. 9, No. 3, pp.466-474. (Pubitemid 46486584)
    • (2007) IEEE Transactions on Multimedia , vol.9 , Issue.3 , pp. 466-474
    • Liu, N.1    Amin, P.2    Subbalakshmi, K.P.3
  • 20
    • 33144467852 scopus 로고    scopus 로고
    • On joint coding for watermarking and encryption
    • DOI 10.1109/TIT.2005.860427
    • Merhav, N. (2006) 'On joint coding for watermarking and encryption', IEEE Transactions on Information Theory, Vol. 52, No. 1, pp.190-205. (Pubitemid 43263127)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.1 , pp. 190-205
    • Merhav, N.1
  • 22
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography
    • Provos, N. and Honeyman, P. (1998) 'Hide and seek: an introduction to steganography', IEEE Security and Privacy Mag., Vol. 1, No. 3, pp.32-44.
    • (1998) IEEE Security and Privacy Mag. , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 23
    • 34249303456 scopus 로고    scopus 로고
    • Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking
    • Qiao, L. and Cox, I.J. (2007) 'Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking', IEEE Transactions on Information Forensics and Security, Vol. 2, No. 2, pp.127-139.
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.2 , pp. 127-139
    • Qiao, L.1    Cox, I.J.2
  • 25
    • 20444455326 scopus 로고    scopus 로고
    • Technical Report, School of Computing and Mathematics, Nottingham Trent University, UK
    • Schaefer, G. and Stich, M. (2003), UCID - An Uncompressed Colour Image Database, http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html, Technical Report, School of Computing and Mathematics, Nottingham Trent University, UK.
    • (2003) UCID - An Uncompressed Colour Image Database
    • Schaefer, G.1    Stich, M.2
  • 28
    • 13244289969 scopus 로고    scopus 로고
    • Secret key estimation in sequential steganography
    • DOI 10.1109/TSP.2004.839925
    • Trivedi, S. and Chandramouli, R. (2005) 'Secret key estimation in sequential steganography', IEEE Transaction on signal processing, Vol. 53, No. 2, pp.746-757. (Pubitemid 40181768)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.2 , pp. 746-757
    • Trivedi, S.1    Chandramouli, R.2
  • 29
    • 45249103920 scopus 로고    scopus 로고
    • Perfectly secure steganography: Capacity, error exponents, and code constructions
    • Wang, Y. and Moulin, P. (2008) 'Perfectly secure steganography: capacity, error exponents, and code constructions', IEEE Transactions on Information Theory, Vol. 54, No. 6, pp.2706-2722.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2706-2722
    • Wang, Y.1    Moulin, P.2
  • 31
    • 0141638479 scopus 로고    scopus 로고
    • Joint security and robustness enhancement for quantization based data embedding
    • Wu, M. (2003) 'Joint security and robustness enhancement for quantization based data embedding', IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp.831-841.
    • (2003) IEEE Transactions on Circuits and Systems for Video Technology , vol.13 , Issue.8 , pp. 831-841
    • Wu, M.1
  • 32
    • 0031143282 scopus 로고    scopus 로고
    • Rate-distortion theory for the Shannon cipher system
    • PII S0018944897023158
    • Yamamoto, H. (1997) 'Rate-distortion theory for the Shannon cipher system', IEEE Transactions on Information Theory, Vol. 43, No. 3, pp.827-835. (Pubitemid 127828006)
    • (1997) IEEE Transactions on Information Theory , vol.43 , Issue.3 , pp. 827-835
    • Yamamoto, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.