메뉴 건너뛰기




Volumn 8303, Issue , 2012, Pages

Co-occurrence steganalysis in high dimensions

Author keywords

[No Author keywords available]

Indexed keywords

CO-OCCURRENCE; DETECTION ACCURACY; DIGITAL IMAGE; HIGH DIMENSIONS; HIGHER ORDER; SPATIAL DOMAINS; STATE OF THE ART; STEGANALYSIS; TRANSFER DOMAINS;

EID: 84858244890     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.908914     Document Type: Conference Paper
Times cited : (6)

References (21)
  • 1
    • 84858225327 scopus 로고    scopus 로고
    • http://www. data-compression.com/vq.html.
  • 2
    • 0018918171 scopus 로고
    • An algorithm for vector quantizer design. Communications
    • jan
    • Y. Linde A., Buzo, and R. Gray. An algorithm for vector quantizer design. Communications, IEEE Transactions on, 28(1):84-95, jan 1980.
    • (1980) IEEE Transactions on , vol.28 , Issue.1 , pp. 84-95
    • Linde, Y.1    Buzo, A.2    Gray, R.3
  • 3
    • 80053005547 scopus 로고    scopus 로고
    • "Break Our Steganographic System" - The ins and outs of organizing BOSS
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
    • P. Bas, I. Filler, and T. Pevny. "Break Our Steganographic System" - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Lecture Notes in Computer Science
    • Bas, P.1    Filler, I.2    Pevny, T.3
  • 4
    • 34948856944 scopus 로고    scopus 로고
    • High-dimensional statistical distance for region-of-interest tracking: Application to combining a soft geometric constraint with radiometry
    • Minneapolis, MN, Juiie 18-23
    • S. Boltz, E. Debreuve, and M. Barlaud. High-dimensional statistical distance for region-of-interest tracking: Application to combining a soft geometric constraint with radiometry. In Proceedings IEEE, Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2007, pages 1-8, Minneapolis, MN, Juiie 18-23, 2007.
    • (2007) Proceedings IEEE, Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2007 , pp. 1-8
    • Boltz, S.1    Debreuve, E.2    Barlaud, M.3
  • 6
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • J. Fridrich, editor, Information Hiding, 6th International Workshop, Toronto, Canada, May 23-25, Springer-Verlag, New York
    • J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J. Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67-81, Toronto, Canada, May 23-25, 2004. Springer-Verlag, New York.
    • (2004) Lecture Notes in Computer Science , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 7
    • 84858213266 scopus 로고    scopus 로고
    • Steganalysis of spatially-adaptive steganography
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th, International Workshop, Prague, Czech Republic, May 18-20
    • J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Steganalysis of spatially-adaptive steganography. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th, International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Lecture Notes in Computer Science
    • Fridrich, J.1    Kodovský, J.2    Goljan, M.3    Holub, V.4
  • 8
    • 80052990656 scopus 로고    scopus 로고
    • A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)
    • T. Filler, T. Pevý, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
    • G. Gül and F. Kurugollu. A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevý, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, pages 71-84, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Lecture Notes in Computer Science , pp. 71-84
    • Gül, G.1    Kurugollu, F.2
  • 10
    • 70449646940 scopus 로고    scopus 로고
    • Calibration revisited
    • J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
    • J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63-74, Princeton, NJ, September 7-8, 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 63-74
    • Kodovský, J.1    Fridrich, J.2
  • 11
    • 79954474492 scopus 로고    scopus 로고
    • Steganalysis in hgh dimensions: Fusing classifiers built on random subspaces
    • N. D. Memon, E.J. Delp, P. W. Wong, and J. Dittmann, editors, San Francisco, CA, January 23-26
    • J. Kodovský and J. Fridrich. Steganalysis in hgh dimensions: Fusing classifiers built on random subspaces. In N. D. Memon, E.J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia, XIII, volume 7880, San Francisco, CA, January 23-26, 2011.
    • (2011) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia, XIII , vol.7880
    • Kodovský, J.1    Fridrich, J.2
  • 15
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • P. W. L. Fong, R. Böhme, and Rei Safavi-Naini, editors, Information Hiding, 12th International Workshop. Calgary, Canada, June 28-30
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In P. W. L. Fong, R. Böhme, and Rei Safavi-Naini, editors, Information Hiding, 12th International Workshop. Lecture Notes in Computer Science, Calgary, Canada, June 28-30, 2010.
    • (2010) Lecture Notes in Computer Science
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 16
    • 56749152307 scopus 로고    scopus 로고
    • Benchmarking for steganography
    • K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, Santa Barbara, CA, June 19-21, Springer-Verlag, New York
    • T. Pevný and J. Fridrich. Benchmarking for steganography. In K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 251-267, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York.
    • (2008) Lecture Notes in Computer Science , vol.5284 , pp. 251-267
    • Pevný, T.1    Fridrich, J.2
  • 17
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • J. L. Camenisch, C. S. Collberg, N. F . Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, Alexandria, VA, July 10-12, Springer-Verlag, New York
    • Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L. Camenisch, C. S. Collberg, N. F . Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249-264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
    • (2006) Lecture Notes in Computer Science , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 19
    • 49949091527 scopus 로고    scopus 로고
    • YASS: Yet another steganographic scheme that resists blind steganalysis
    • T. Furon, F. Cayre, G. Doërr, and P. Bas, editors, Information Hiding, 9th International Workshop, Saint Malo, France, June 11-13, Springer-Verlag, New York
    • K. Solanki, A. Sarkar, and B. S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. In T. Furon, F. Cayre, G. Doërr, and P. Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 16-31, Saint Malo, France, June 11-13, 2007. Springer-Verlag, New York.
    • (2007) Lecture Notes in Computer Science , vol.4567 , pp. 16-31
    • Solanki, K.1    Sarkar, A.2    Manjunath, B.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.