메뉴 건너뛰기




Volumn 7, Issue 2, 2012, Pages 445-454

From blind to quantitative steganalysis

Author keywords

Blind steganalysis; message length estimation; quantitative steganalysis; regression

Indexed keywords

BLIND STEGANALYSIS; FEATURE VECTORS; FORENSIC TOOLS; GENERAL METHOD; MESSAGE LENGTH; REGRESSION; SPATIAL DOMAINS; STEGANALYSIS; STEGANOGRAPHIC ALGORITHMS; SUPPORT VECTOR REGRESSION (SVR);

EID: 84858191862     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2175918     Document Type: Conference Paper
Times cited : (62)

References (39)
  • 1
    • 1442360452 scopus 로고    scopus 로고
    • Quantitative steganalysis of digital images: Estimating the secret message length
    • J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, "Quantitative steganalysis of digital images: Estimating the secret message length," ACM Multimedia Syst. J., vol. 9, no. 3, pp. 288-302, 2003.
    • (2003) ACM Multimedia Syst.J. , vol.9 , Issue.3 , pp. 288-302
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3    Soukal, D.4
  • 2
    • 35248901820 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 7-9, Lecture Notes in Computer Science, Springer- Verlag, New York
    • S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," in Proc. 5th Int. Workshop Information Hiding, F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 7-9, 2002, vol. 2578, Lecture Notes in Computer Science, pp. 355-372, Springer-Verlag, New York.
    • (2002) Proc. 5th Int. Workshop Information Hiding , vol.2578 , pp. 355-372
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 3
    • 0038675417 scopus 로고    scopus 로고
    • A fast and effective steganalytic technique against JSteg-like algorithms
    • Melbourne, FL, Mar. 9-12
    • T. Zhang and X. Ping, "A fast and effective steganalytic technique against JSteg-like algorithms," in Proc. ACM Symp. Applied Computing, Melbourne, FL, Mar. 9-12, 2003, pp. 307-311.
    • (2003) Proc. ACM Symp. Applied Computing , pp. 307-311
    • Zhang, T.1    Ping, X.2
  • 5
    • 33645663780 scopus 로고    scopus 로고
    • A general framework for structural analysis of LSB replacement
    • M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez- González, Eds., Barcelona, Spain, Jun. 6-8, Lecture Notes in Computer Science, Springer- Verlag, Berlin
    • A. D. Ker, "A general framework for structural analysis of LSB replacement," in Proc. 7th Int. Workshop Information Hiding, M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez-González, Eds., Barcelona, Spain, Jun. 6-8, 2005, vol. 3727, Lecture Notes in Computer Science, pp. 296-311, Springer-Verlag, Berlin.
    • (2005) Proc. 7th Int. Workshop Information Hiding , vol.3727 , pp. 296-311
    • Ker, A.D.1
  • 6
    • 49949111194 scopus 로고    scopus 로고
    • Generalized category attack-Improving histogram- based attack on JPEG LSB embedding
    • T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds. Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer- Verlag
    • K. Lee and A.Westfeld, "Generalized category attack-Improving histogram- based attack on JPEG LSB embedding," in Proc. 9th Int.Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, Lecture Notes in Computer Science, pp. 378-392, Springer-Verlag.
    • (2007) Proc. 9th Int.Workshop Information Hiding , pp. 378-392
    • Lee, K.1    Westfeld, A.2
  • 7
    • 56749107134 scopus 로고    scopus 로고
    • Weighted stego-image steganalysis for JPEG covers
    • K. Solanki, Ed., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science, Springer- Verlag, New York
    • R. Böhme, "Weighted stego-image steganalysis for JPEG covers," in Proc. 10th Int. Workshop Information Hiding, K. Solanki, Ed., Santa Barbara, CA, Jun. 19-21, 2008, Lecture Notes in Computer Science, pp. 178-194, Springer-Verlag, New York.
    • (2008) Proc. 10th Int. Workshop Information Hiding , pp. 178-194
    • Böhme, R.1
  • 8
    • 56749177021 scopus 로고    scopus 로고
    • Generic adoption of spatial steganalysis to transformed domain
    • K. Solanki, Ed., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science, Springer- Verlag, New York
    • A. Westfeld, "Generic adoption of spatial steganalysis to transformed domain," in Proc. 10th Int. Workshop Information Hiding, K. Solanki, Ed., Santa Barbara, CA, Jun. 19-21, 2008, Lecture Notes in Computer Science, pp. 161-177, Springer-Verlag, New York.
    • (2008) Proc. 10th Int. Workshop Information Hiding , pp. 161-177
    • Westfeld, A.1
  • 9
    • 21844461602 scopus 로고    scopus 로고
    • Maximum likelihood estimation of secret message length embedded using steganography in spatial domain
    • E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-20
    • D. Soukal, J. Fridrich, and M. Goljan, "Maximum likelihood estimation of secret message length embedded using steganography in spatial domain," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-20, 2005, vol. 5681, pp. 595-606.
    • (2005) Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII , vol.5681 , pp. 595-606
    • Soukal, D.1    Fridrich, J.2    Goljan, M.3
  • 10
    • 85036614203 scopus 로고    scopus 로고
    • Blind quantitative steganalysis based on feature fusion and gradient boosting
    • Berlin, Heidelberg, Springer- Verlag
    • Q. Guan, J. Dong, and T. Tan, "Blind quantitative steganalysis based on feature fusion and gradient boosting," in Proc. 9th Int. Conf. DigitalWatermarking (IWDW'10), Berlin, Heidelberg, 2011, pp. 266-279, Springer-Verlag.
    • (2011) Proc. 9th Int. Conf. DigitalWatermarking (IWDW'10) , pp. 266-279
    • Guan, Q.1    Dong, J.2    Tan, T.3
  • 11
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • Mar.
    • S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 12
    • 33746647772 scopus 로고    scopus 로고
    • Steganalysis based onmultiple features formed by statistical moments of wavelet characteristic functions
    • M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez- González, Eds., Barcelona, Spain, Jun. 6-8, Lecture Notes in Computer Science, Springer- Verlag, Berlin
    • G.Xuan,Y. Q. Shi, J.Gao, D. Zou, C.Yang,Z.Z.P.Chai, C.Chen, and W. Chen, "Steganalysis based onmultiple features formed by statistical moments of wavelet characteristic functions," in Proc. 7th Int. Workshop Information Hiding, M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez- González, Eds., Barcelona, Spain, Jun. 6-8, 2005, vol. 3727, Lecture Notes in Computer Science, pp. 262-277, Springer-Verlag, Berlin.
    • (2005) Proc. 7th Int. Workshop Information Hiding , vol.3727 , pp. 262-277
    • Xuan, G.1    Shi, Y.Q.2    Gao, J.3    Zou, D.4    Yang, C.5    Chai, Z.Z.P.6    Chen, C.7    Chen, W.8
  • 13
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer- Verlag, New York
    • Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int.Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 249-264, Springer-Verlag, New York.
    • (2006) Proc. 8th Int.Workshop Information Hiding , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 15
    • 70449644855 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • J. Dittmann, J. Fridrich, and S. Craver, Eds. New York, Sep. 7-8, ACM
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," in Proc. 11th Workshop on Multimedia & Security, J. Dittmann, J. Fridrich, and S. Craver, Eds., New York, Sep. 7-8, 2009, pp. 75-84, ACM.
    • (2009) Proc. 11th Workshop on Multimedia & Security , pp. 75-84
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 17
    • 34247562352 scopus 로고    scopus 로고
    • Steganalysis based on Markov model of thresholded prediction-error image
    • Toronto, Canada, Jul. 9-12
    • D. Zo, Y. Q. Shi,W. Su, and G. Xuan, "Steganalysis based on Markov model of thresholded prediction-error image," in Proc. IEEE Int. Conf. Multimedia and Expo., Toronto, Canada, Jul. 9-12, 2006, pp. 1365-1368.
    • (2006) Proc. IEEE Int. Conf. Multimedia and Expo. , pp. 1365-1368
    • Zo, D.1    Shi, Y.Q.2    Su, W.3    Xuan, G.4
  • 20
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5 - A steganographic algorithm)
    • I. S. Moskowitz, Ed., Pittsburgh, PA, Apr. 25-27, Lecture Notes in Computer Science, Springer- Verlag, New York
    • A. Westfeld, "High capacity despite better steganalysis (F5 - A steganographic algorithm)," in Proc. 4th Int. Workshop Information Hiding, I. S. Moskowitz, Ed., Pittsburgh, PA, Apr. 25-27, 2001, vol. 2137, Lecture Notes in Computer Science, pp. 289-302, Springer-Verlag, New York.
    • (2001) Proc. 4th Int. Workshop Information Hiding , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 23
    • 64249108718 scopus 로고    scopus 로고
    • [Online]. Available
    • A. Latham, Steganography [Online]. Available: http://linux01. gwdg.de/~alatham/stego.html
    • Steganography
    • Latham, A.1
  • 24
    • 84858403496 scopus 로고    scopus 로고
    • [Online]. Available
    • D. Upham, JSteg source [Online]. Available: http://zooid.org/~paul/ crypto/jsteg/
    • JSteg Source
    • Upham, D.1
  • 25
    • 35048819204 scopus 로고    scopus 로고
    • Model-based steganography
    • T. Kalker, I. J. Cox, and Y. M. Ro, Eds., Seoul, Korea, Oct. 20-22, Lecture Notes in Computer Science, Springer- Verlag, New York
    • P. Sallee, "Model-based steganography," in Proc. 2nd Int. Workshop Digital Watermarking, T. Kalker, I. J. Cox, and Y. M. Ro, Eds., Seoul, Korea, Oct. 20-22, 2003, vol. 2939, Lecture Notes in Computer Science, pp. 154-167, Springer-Verlag, New York.
    • (2003) Proc. 2nd Int. Workshop Digital Watermarking , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 26
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer- Verlag, New York
    • Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Int. Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 314-327, Springer-Verlag, New York.
    • (2006) Proc. 8th Int. Workshop Information Hiding , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 27
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21
    • J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. 9th ACM Multimedia & Security Workshop, J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21, 2007, pp. 3-14.
    • (2007) Proc. 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 29
    • 30744445178 scopus 로고    scopus 로고
    • Perturbed quantization steganography
    • J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography," ACM Multimedia Syst. J., vol. 11, no. 2, pp. 98-107, 2005.
    • (2005) ACM Multimedia Syst.J. , vol.11 , Issue.2 , pp. 98-107
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 30
    • 33645695370 scopus 로고    scopus 로고
    • Agraph-theoretic approach to steganography
    • J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., Salzburg, Austria, Sep. 19-21, Lecture Notes in Computer Science
    • S. Hetzl and P. Mutzel, "Agraph-theoretic approach to steganography," in Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security (CMS 2005), J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., Salzburg, Austria, Sep. 19-21, 2005, vol. 3677, Lecture Notes in Computer Science, pp. 119-128.
    • (2005) Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security (CMS 2005) , vol.3677 , pp. 119-128
    • Hetzl, S.1    Mutzel, P.2
  • 32
    • 69949122982 scopus 로고    scopus 로고
    • Detection of steganography based on the amplitude of histogram local extrema
    • San Diego, CA, Oct. 12-15
    • G. Cancelli, G. Doërr, I. Cox, and M. Barni, "Detection of steganography based on the amplitude of histogram local extrema," in Proc. IEEE Int. Conf. Image Processing (ICIP), San Diego, CA, Oct. 12-15, 2008.
    • (2008) Proc. IEEE Int. Conf. Image Processing (ICIP)
    • Cancelli, G.1    Doërr, G.2    Cox, I.3    Barni, M.4
  • 34
    • 84858429942 scopus 로고    scopus 로고
    • [Online]. Available
    • [Online]. Available: http://www.imagemagick.org
  • 35
    • 33748047804 scopus 로고    scopus 로고
    • LSB steganalysis based on higher-order statistics
    • A.M. Eskicioglu, J. Fridrich, and J. Dittmann, Eds., New York, NY, Aug. 1-2
    • S. Dumitrescu and X. Wu, "LSB steganalysis based on higher-order statistics," in Proc. 7th ACM Multimedia & Security Workshop, A.M. Eskicioglu, J. Fridrich, and J. Dittmann, Eds., New York, NY, Aug. 1-2, 2005, pp. 25-32.
    • (2005) Proc. 7th ACM Multimedia & Security Workshop , pp. 25-32
    • Dumitrescu, S.1    Wu, X.2
  • 37
    • 0000541109 scopus 로고
    • An extension of Shapiro and Wilk's test for normality to large samples
    • P. Royston, "An extension of Shapiro and Wilk's test for normality to large samples," Appl. Statist., vol. 31, pp. 115-124, 1982.
    • (1982) Appl. Statist. , vol.31 , pp. 115-124
    • Royston, P.1
  • 38
    • 84858403495 scopus 로고    scopus 로고
    • [Online]. Available
    • A. Greenspun [Online]. Available: http://www.greenspun.com
    • Greenspun, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.