메뉴 건너뛰기




Volumn 55, Issue 6, 2012, Pages 653-666

Steganography: A class of secure and robust algorithms

Author keywords

[No Author keywords available]

Indexed keywords

DCT DOMAIN; FINITE DOMAINS; INFORMATION HIDING; ROBUST ALGORITHM; STEGANOGRAPHIC ALGORITHMS; TOPOLOGICAL CHAOS;

EID: 84861847686     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxr116     Document Type: Article
Times cited : (13)

References (41)
  • 1
    • 85177693003 scopus 로고    scopus 로고
    • Rainbow: Arobust and invisible non-blindwatermark for network flows
    • San Diego, February. The Internet Society, Washington DC/Reston
    • Houmansadr, A., Kiyavash, N. and Borisov, N. (2009) Rainbow: ARobust and Invisible Non-BlindWatermark for Network Flows. Proc. Network and Distributed System Security Symp., NDSS 2009, San Diego, February. The Internet Society, Washington DC/Reston.
    • (2009) Proc. Network and Distributed System Security Symp., NDSS 2009
    • Houmansadr, A.1    Kiyavash, N.2    Borisov, N.3
  • 6
    • 33846161265 scopus 로고    scopus 로고
    • Chaos-based multipurpose imagewatermarking algorithm
    • Congxu, Z., Xuefeng, L. and Zhihua, L. (2006) Chaos-based multipurpose imagewatermarking algorithm. Wuhan Univ. J. Nat. Sci., 11, 1675-1678.
    • (2006) Wuhan Univ. J. Nat. Sci. , vol.11 , pp. 1675-1678
    • Congxu, Z.1    Xuefeng, L.2    Zhihua, L.3
  • 7
    • 34247361264 scopus 로고    scopus 로고
    • A novel digital watermark algorithm based on chaotic maps
    • Wu, X. and Guan, Z.-H. (2007) A novel digital watermark algorithm based on chaotic maps. Phys. Lett. A, 365, 403-406.
    • (2007) Phys. Lett. A , vol.365 , pp. 403-406
    • Wu, X.1    Guan, Z.-H.2
  • 8
    • 39449113677 scopus 로고    scopus 로고
    • Kerckhoffs-based embedding security classes for WOA data hiding
    • DOI 10.1109/TIFS.2007.916006
    • Cayre, F. and Bas, P. (2008) Kerckhoffs-based embedding security classes for woa data hiding. IEEE Trans. Inf. Forensics Sec., 3, 1-15. (Pubitemid 351270068)
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.1 , pp. 1-15
    • Cayre, F.1    Bas, P.2
  • 13
    • 0000248011 scopus 로고    scopus 로고
    • Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding
    • Cirencester, UK, Berlin, December, Lecture Notes in Computer Science. Springer
    • Shujun, L., Qi, L., Wenmin, L., Xuanqin, M. and Yuanlong, C. (2001) Statistical Properties of Digital Piecewise Linear Chaotic Maps and their Roles in Cryptography and Pseudo-Random Coding. Cryptography and Coding, 8th IMA Int. Conf., Cirencester, UK, Berlin, December, Lecture Notes in Computer Science 2260, pp. 205-221. Springer.
    • (2001) Cryptography and Coding, 8th IMA Int. Conf , vol.2260 , pp. 205-221
    • Shujun, L.1    Qi, L.2    Wenmin, L.3    Xuanqin, M.4    Yuanlong, C.5
  • 15
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Portland, Oregon, USA, Berlin, April, Lecture Notes in Computer Science. Springer
    • Cachin, C. (1998) An Information-Theoretic Model for Steganography. Information Hiding, 2nd Int. Workshop, Portland, Oregon, USA, Berlin, April, Lecture Notes in Computer Science 1525, pp. 306-318. Springer.
    • (1998) Information Hiding, 2nd Int. Workshop , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 16
    • 0002561772 scopus 로고    scopus 로고
    • An information-theoretic approach to steganography and watermarking
    • Dresden, Germany, Berlin, September,. Springer
    • Mittelholzer, T. (1999) An Information-Theoretic Approach to Steganography and Watermarking. Information Hiding, Third International Workshop, IH'99, Dresden, Germany, Berlin, September, pp. 1-16. Springer.
    • (1999) Information Hiding, Third International Workshop, IH'99 , pp. 1-16
    • Mittelholzer, T.1
  • 17
    • 0035790994 scopus 로고    scopus 로고
    • Considerations onwatermarking security
    • Cannes, France, Washington, DC, October. IEEE Computer Society
    • Kalker, T. (2001) Considerations onWatermarking Security. 2001 IEEE 4th Workshop on Multimedia Signal Processing, Cannes, France, Washington, DC, October, pp. 201-206. IEEE Computer Society.
    • (2001) 2001 IEEE 4th Workshop on Multimedia Signal Processing , pp. 201-206
    • Kalker, T.1
  • 19
    • 21844463487 scopus 로고    scopus 로고
    • Watermarking security: Theory and practice
    • DOI 10.1109/TSP.2005.855418
    • Cayre, F., Fontaine, C. and Furon, T. (2005) Watermarking security: theory and practice. IEEE Trans. Signal Process., 53, 3976-3987. (Pubitemid 41638248)
    • (2005) IEEE Transactions on Signal Processing , vol.53 , Issue.10 , pp. 3976-3987
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 20
    • 80052439767 scopus 로고    scopus 로고
    • Secret dither estimation in lattice-quantization data hiding:A set-membership approach
    • San Jose, CA, Bellingham, WA, January. Society of Photo-Optical Instrumentation Engineers
    • Perez-Freire, L., Pérez-Gonzalez, F. and Comesana, P. (2006) Secret Dither Estimation in Lattice-Quantization Data Hiding:A Set-Membership Approach. Security, Steganography, andWatermarking of Multimedia Contents, San Jose, CA, Bellingham, WA, January, pp. 1-12. Society of Photo-Optical Instrumentation Engineers.
    • (2006) Security, Steganography, andWatermarking of Multimedia Contents , pp. 1-12
    • Perez-Freire, L.1    Pérez-Gonzalez, F.2    Comesana, P.3
  • 21
    • 0001217738 scopus 로고
    • The prisoners'problem and the subliminal channel
    • University of California, Santa Barbara, New York, August. Plenum Press
    • Simmons, G. J. (1984) The Prisoners'Problem and the Subliminal Channel. Advances in Cryptology, Proc. CRYPTO'83, University of California, Santa Barbara, New York, August, pp. 51-67. Plenum Press.
    • (1984) Advances in Cryptology, Proc. CRYPTO'83 , pp. 51-67
    • Simmons, G.J.1
  • 22
    • 80052422034 scopus 로고    scopus 로고
    • On the link between strongly connected iteration graphs and chaotic boolean discrete-time dynamical systems
    • Oslo, Norway, Berlin, August, Lecture Notes in Computer Science 6914. Springer
    • Bahi, J., Couchot, J.-F., Guyeux, C. and Richard, A. (2011) On the Link between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems. FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory, Oslo, Norway, Berlin, August, Lecture Notes in Computer Science 6914, pp. 126-137. Springer.
    • (2011) FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory , pp. 126-137
    • Bahi, J.1    Couchot, J.-F.2    Guyeux, C.3    Richard, A.4
  • 25
    • 31144478351 scopus 로고    scopus 로고
    • Image information and visual quality
    • DOI 10.1109/TIP.2005.859378
    • Sheikh, H. R. and Bovik, A. C. (2006) Image information and visual quality. IEEE Trans. Image Process., 15, 430-444. (Pubitemid 43126168)
    • (2006) IEEE Transactions on Image Processing , vol.15 , Issue.2 , pp. 430-444
    • Sheikh, H.R.1    Bovik, A.C.2
  • 27
    • 77950648432 scopus 로고    scopus 로고
    • A two-step framework for constructing blind image quality indices
    • Moorthy, A. K. M. and Bovik, A. C. (2010)A two-step framework for constructing blind image quality indices. IEEE Signal Process. Lett., 17, 513-516.
    • (2010) IEEE Signal Process. Lett. , vol.17 , pp. 513-516
    • Moorthy, A.K.M.1    Bovik, A.C.2
  • 28
    • 84861842935 scopus 로고    scopus 로고
    • accessed October 14, 2011
    • (2011). Psnr-hvs-m page. http://www. ponomarenko. info/psnrhv sm. htm (accessed October 14, 2011).
    • (2011) Psnr-Hvs-M Page
  • 29
    • 84861881447 scopus 로고    scopus 로고
    • accessed October 14, 2011
    • (2011). Biqi page. http://live. ece. utexas. edu/research/quality/BIQI- release. zip (accessed October 14, 2011).
    • (2011) Biqi Page
  • 31
    • 79954570840 scopus 로고    scopus 로고
    • Watermarking scheme for color images using wavelet transform based texture properties and secret sharing
    • V. Dharwadkar, N. V. and Amberker, B. B. (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. Int. J. Inf. Commun. Eng., 6, 93-100.
    • (2010) Int. J. Inf. Commun. Eng. , vol.6 , pp. 93-100
    • Dharwadkar, V.1    Amberker, B.B.2
  • 33
    • 70350509599 scopus 로고    scopus 로고
    • Invisible watermarking based on creation and robust insertion-extraction of image adaptivewatermarks
    • Mohanty, S. P. and Bhargava, B. K. (2008) Invisible watermarking based on creation and robust insertion-extraction of image adaptivewatermarks. ACMTrans. Multimedia Comput. Commun. Appl., 5, 12:1-12:22.
    • (2008) ACMTrans. Multimedia Comput. Commun. Appl. , vol.5 , pp. 121-1222
    • Mohanty, S.P.1    Bhargava, B.K.2
  • 34
    • 77749320486 scopus 로고    scopus 로고
    • Robust digital watermarking scheme using contourlet transform
    • Mohan, B. and Kumar, S. (2008) Robust digital watermarking scheme using contourlet transform. IJCSNS Int. J. Comput. Sci. Netw. Sec., 8, 43-51.
    • (2008) IJCSNS Int. J. Comput. Sci. Netw. Sec. , vol.8 , pp. 43-51
    • Mohan, B.1    Kumar, S.2
  • 37
    • 57849098679 scopus 로고    scopus 로고
    • Combined dwt-dct digital imagewatermarking
    • Al-Haj, A. (2007) Combined dwt-dct digital imagewatermarking. J. Comput. Sci., 3, 740-746.
    • (2007) J. Comput. Sci. , vol.3 , pp. 740-746
    • Al-Haj, A.1
  • 39
    • 51749089283 scopus 로고    scopus 로고
    • Jpeg image steganalysis utilizing both intrablock and interblock correlations
    • Seattle, Washington, USA, Washington, DC, May. IEEE Computer Society
    • Chen, C. and Shi, Y. Q. (2008) Jpeg Image Steganalysis Utilizing both Intrablock and Interblock Correlations. Int. Symp. Circuits and Systems (ISCAS 2008), Seattle, Washington, USA, Washington, DC, May, pp. 3029-3032. IEEE Computer Society.
    • (2008) Int. Symp. Circuits and Systems (ISCAS 2008 , pp. 3029-3032
    • Chen, C.1    Shi, Y.Q.2
  • 40
    • 69949114432 scopus 로고    scopus 로고
    • Blind image steganalysis based on run-length histogram analysis
    • San Diego, CA, USA, Washington, DC, October. IEEE Computer Society
    • Dong, J. and Tan, T. (2008) Blind Image Steganalysis based on Run-Length Histogram Analysis. Proc. Int. Conf. Image Processing, ICIP 2008, San Diego, CA, USA, Washington, DC, October, pp. 2064-2067. IEEE Computer Society.
    • (2008) Proc. Int. Conf. Image Processing, ICIP 2008 , pp. 2064-2067
    • Dong, J.1    Tan, T.2
  • 41
    • 80053047483 scopus 로고    scopus 로고
    • Steganalysis of content-adaptive steganography in spatial domain
    • Prague, Czech Republic, Berlin, May Lecture Notes in Computer Science. Springer
    • Fridrich, J. J., Kodovský, J., Holub, V. and Goljan, M. (2011) Steganalysis of Content-Adaptive Steganography in Spatial Domain. Information Hiding-13th Int. Conf., IH 2011, Prague, Czech Republic, Berlin, May Lecture Notes in Computer Science, pp. 102-117. Springer.
    • (2011) Information Hiding-13th Int. Conf., IH 2011 , pp. 102-117
    • Fridrich, J.J.1    Kodovský, J.2    Holub, V.3    Goljan, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.