메뉴 건너뛰기




Volumn 8303, Issue , 2012, Pages

Optimizing pixel predictors for steganalysis

Author keywords

classifier; optimization; pixel predictor; Steganalysis; steganography

Indexed keywords

CO-OCCURRENCE-MATRIX; COMBINED FEATURES; DATA-DRIVEN APPROACH; DETECTION ACCURACY; DIGITAL IMAGE; FEATURE SPACE; FUNCTIONAL FORMS; IMAGE MODELS; JOINT STATISTICS; OPTIMIZATION PROBLEMS; STEGANALYSIS; STEGO IMAGE;

EID: 84858225018     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.905753     Document Type: Conference Paper
Times cited : (22)

References (30)
  • 2
    • 56749107134 scopus 로고    scopus 로고
    • Weighted stego-image steganalysis for JPEG covers
    • K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, Santa Barbara, CA, June 19-21, Springer-Verlag, New York
    • R. Böhme. Weighted stego-image steganalysis for JPEG covers. In K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 178-194, Santa Barbara, CA, June 19-21, 2007. Springer-Verlag, New York.
    • (2007) Lecture Notes in Computer Science , vol.5284 , pp. 178-194
    • Böhme, R.1
  • 4
    • 84858226621 scopus 로고    scopus 로고
    • Software available at
    • J. Borggaard, 2009, Software available at http://people.sc.fsu.edu/ ~jburkardt/m-src/nelder-mead/nelder-mead.html.
    • (2009)
    • Borggaard, J.1
  • 5
    • 79954489095 scopus 로고    scopus 로고
    • Feature restoration and distortion metrics
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Francisco, CA, January 23-26
    • V. Chonev and A. D. Ker. Feature restoration and distortion metrics. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages 0G01-0G14, San Francisco, CA, January 23-26, 2011.
    • (2011) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII , vol.7880
    • Chonev, V.1    Ker, A.D.2
  • 7
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, Noordwijkerhout, The Netherlands, October 7-9, Springer-Verlag, New York
    • H. Farid and L. Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 340-354, Noordwijkerhout, The Netherlands, October 7-9, 2002. Springer-Verlag, New York.
    • (2002) Lecture Notes in Computer Science , vol.2578 , pp. 340-354
    • Farid, H.1    Siwei, L.2
  • 9
    • 79954457569 scopus 로고    scopus 로고
    • Design of adaptive steganographic schemes for digital images
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Francisco, CA, January 23-26
    • T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages OF 1-14, San Francisco, CA, January 23-26, 2011.
    • (2011) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII , vol.7880
    • Filler, T.1    Fridrich, J.2
  • 12
  • 14
    • 80053003434 scopus 로고    scopus 로고
    • Breaking HUGO - The process discovery
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
    • J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Breaking HUGO - the process discovery. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, pages 85-101, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Lecture Notes in Computer Science , pp. 85-101
    • Fridrich, J.1    Kodovský, J.2    Goljan, M.3    Holub, V.4
  • 15
    • 80053047483 scopus 로고    scopus 로고
    • Steganalysis of content-adaptive steganography in spatial domain
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
    • J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Steganalysis of content-adaptive steganography in spatial domain. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, pages 102-117, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Lecture Notes in Computer Science , pp. 102-117
    • Fridrich, J.1    Kodovský, J.2    Goljan, M.3    Holub, V.4
  • 17
    • 80052990656 scopus 로고    scopus 로고
    • A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
    • G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, pages 71-84, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Lecture Notes in Computer Science , pp. 71-84
    • Gül, G.1    Kurugollu, F.2
  • 20
    • 56749154804 scopus 로고    scopus 로고
    • On completeness of feature spaces in blind steganalysis
    • A. D. Ker, J. Dittmann, and J. Fridrich, editors, Oxford, UK, September 22-23
    • J. Kodovský and J. Fridrich. On completeness of feature spaces in blind steganalysis. In A. D. Ker, J. Dittmann, and J. Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123-132, Oxford, UK, September 22-23, 2008.
    • (2008) Proceedings of the 10th ACM Multimedia & Security Workshop , pp. 123-132
    • Kodovský, J.1    Fridrich, J.2
  • 21
    • 79954474492 scopus 로고    scopus 로고
    • Steganalysis in high dimensions: Fusing classifiers built on random subspaces
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Francisco, CA, January 23-26
    • J. Kodovský and J. Fridrich. Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages OL 1-13, San Francisco, CA, January 23-26, 2011.
    • (2011) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII , vol.7880
    • Kodovský, J.1    Fridrich, J.2
  • 23
    • 80054777166 scopus 로고    scopus 로고
    • On dangers of overtraining steganography to incomplete cover model
    • J. Dittmann, S. Craver, and C. Heitzenrater, editors, Niagara Falls, NY, September 29-30
    • J. Kodovský, J. Fridrich, and V. Holub. On dangers of overtraining steganography to incomplete cover model. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 69-76, Niagara Falls, NY, September 29-30, 2011.
    • (2011) Proceedings of the 13th ACM Multimedia & Security Workshop , pp. 69-76
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 26
    • 70449644855 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
    • T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 75-84, Princeton, NJ, September 7-8, 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 75-84
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 28
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, Calgary, Canada, June 28-30, Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
    • (2010) Lecture Notes in Computer Science , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.