메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1-10

Batch steganography in the real world

Author keywords

Anomaly detection; Batch steganography; Embedding strategies; Steganalysis

Indexed keywords

ANOMALY DETECTION; BLIND STEGANALYSIS; EMBEDDING DISTORTION; EMBEDDING METHOD; EMBEDDING STRATEGIES; EXPERT KNOWLEDGE; NON-LINEAR RELATIONSHIPS; PAYLOAD ALLOCATION; REAL WORLD DATA; STEGANALYSIS;

EID: 84867439249     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2361407.2361409     Document Type: Conference Paper
Times cited : (54)

References (25)
  • 3
    • 79952507965 scopus 로고    scopus 로고
    • Minimizing additive distortion functions with non-binary embedding operation in steganography
    • 2010 IEEE International Workshop on
    • T. Filler and J. Fridrich. Minimizing additive distortion functions with non-binary embedding operation in steganography. In Information Forensics and Security (WIFS), 2010 IEEE International Workshop on, pages 1-6, 2010.
    • (2010) Information Forensics and Security (WIFS) , pp. 1-6
    • Filler, T.1    Fridrich, J.2
  • 4
    • 79954457569 scopus 로고    scopus 로고
    • Design of adaptive steganographic schemes for digital images
    • N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp III, editors SPIE
    • T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp III, editors, Media Watermarking, Security, and Forensics XIV, volume 7880 of Proc. SPIE, page 78800F. SPIE, 2011.
    • (2011) Media Watermarking, Security, and Forensics XIV, Volume 7880 of Proc. SPIE
    • Filler, T.1    Fridrich, J.2
  • 7
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
    • MM&Sec ACM
    • J. Fridrich, T. Pevńy, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities. In Proc. 9th ACM Workshop on Multimedia and Security, MM&Sec, pages 3-14. ACM, 2007.
    • (2007) Proc. 9th ACM Workshop on Multimedia and Security , pp. 3-14
    • Fridrich, J.1    Pevńy, T.2    Kodovský, J.3
  • 9
    • 84867457778 scopus 로고    scopus 로고
    • ver. 0.5.1 released October last accessed April 2012
    • S. Hetzl. Implementation of the Steghide algorithm ver. 0.5.1 (released October 2003). http://steghide.sourceforge.net/, last accessed April 2012.
    • (2003) Implementation of the Steghide Algorithm
    • Hetzl, S.1
  • 11
    • 38049111044 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • J. Camenisch, C. Collberg, N. Johnson, and P. Sallee, editors Springer
    • A. D. Ker. Batch steganography and pooled steganalysis. In J. Camenisch, C. Collberg, N. Johnson, and P. Sallee, editors, Proc. 8th Information Hiding Workshop, volume 4437 of LNCS, pages 265-281. Springer, 2006.
    • (2006) Proc. 8th Information Hiding Workshop, Volume 4437 of LNCS , pp. 265-281
    • Ker, A.D.1
  • 13
    • 57149128996 scopus 로고    scopus 로고
    • Perturbation hiding and the batch steganography problem
    • K. Solanki, K. Sullivan, and U. Madhow, editors Springer
    • A. D. Ker. Perturbation hiding and the batch steganography problem. In K. Solanki, K. Sullivan, and U. Madhow, editors, Proc. 10th Information Hiding Workshop, volume 5284 of LNCS, pages 45-59. Springer, 2008.
    • (2008) Proc. 10th Information Hiding Workshop, Volume 5284 of LNCS , pp. 45-59
    • Ker, A.D.1
  • 15
    • 84858188731 scopus 로고    scopus 로고
    • Identifying a steganographer in realistic and heterogeneous data sets
    • N. Memon, A. Alattar, and E. Delp III, editors SPIE
    • A. D. Ker and T. Pevný. Identifying a steganographer in realistic and heterogeneous data sets. In N. Memon, A. Alattar, and E. Delp III, editors, Media Watermarking, Security, and Forensics XIV, volume 8303 of Proc. SPIE, pages 0N01-0N13. SPIE, 2012.
    • (2012) Media Watermarking, Security, and Forensics XIV, Volume 8303 of Proc. SPIE
    • Ker, A.D.1    Pevný, T.2
  • 18
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • P. W. L. Fong, R. Böhme, and R. Safavi-Naini, editors Springer
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In P. W. L. Fong, R. Böhme, and R. Safavi-Naini, editors, Proc. 12th Information Hiding Workshop, volume 6387 of LNCS, pages 161-177. Springer, 2010.
    • (2010) Proc. 12th Information Hiding Workshop, Volume 6387 of LNCS , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 19
    • 34548232251 scopus 로고    scopus 로고
    • Merging Markov and DCT features for multi-class JPEG steganalysis
    • E. J. Delp III and P. W. Wong, editors SPIE
    • T. Pevný and J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J. Delp III and P. W. Wong, editors, Media Watermarking, Security, and Forensics IX, volume 6505, pages 03-14. SPIE, 2007.
    • (2007) Media Watermarking, Security, and Forensics IX , vol.6505 , pp. 03-14
    • Pevný, T.1    Fridrich, J.2
  • 20
    • 84858191862 scopus 로고    scopus 로고
    • From blind to quantitative steganalysis
    • IEEE Transactions on
    • T. Pevný, J. Fridrich, and A. D. Ker. From blind to quantitative steganalysis. Information Forensics and Security, IEEE Transactions on, 7(2):445-454, 2012.
    • (2012) Information Forensics and Security , vol.7 , Issue.2 , pp. 445-454
    • Pevný, T.1    Fridrich, J.2    Ker, A.D.3
  • 21
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • SSYM USENIX Association
    • N. Provos. Defending against statistical steganalysis. In Proc. 10th Conference on USENIX Security Symposium - Volume 10, SSYM, pages 323-335. USENIX Association, 2001.
    • (2001) Proc. 10th Conference on USENIX Security Symposium , vol.10 , pp. 323-335
    • Provos, N.1
  • 22
    • 84867446509 scopus 로고    scopus 로고
    • ver. 2.0 released October last accessed April 2012
    • N. Provos. Implementation of the OutGuess algorithm ver. 2.0 (released October 2001). http://www.outguess.org/, last accessed April 2012.
    • (2001) Implementation of the OutGuess Algorithm
    • Provos, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.