메뉴 건너뛰기




Volumn 8, Issue 2, 2013, Pages 361-373

Effect of cover quantization on steganographic fisher information

Author keywords

Fisher information; precover; quantization; scaling; square root law; Steganography

Indexed keywords

FISHER INFORMATION; PRECOVER; QUANTIZATION; SCALING; SQUARE ROOTS;

EID: 84872311781     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2235832     Document Type: Article
Times cited : (13)

References (29)
  • 1
    • 84955563192 scopus 로고    scopus 로고
    • Stretching the limits of steganography
    • Information Hiding
    • R. Anderson, R. J. Anderson, Ed., "Stretching the limits of steganography," in Proc. 1st Int. Workshop Information Hiding, Cambridge, U.K., May 30-Jun. 1 1996, vol. 1174, Lecture Notes in Computer Science, pp. 39-48, Springer-Verlag, Berlin. (Pubitemid 126155025)
    • (1996) Lecture Notes in Computer Science , Issue.1174 , pp. 39-48
    • Anderson, R.1
  • 3
    • 84872317467 scopus 로고    scopus 로고
    • A gametheoretic approach to content-adaptive steganography
    • Berkeley, CA, May 15-18 TBD, Lecture Notes in Computer Science
    • R. Böhme and P. Schöttle,M. Kirchner and D. Ghosal, Eds., "A gametheoretic approach to content-adaptive steganography," in Proc. 14th Int. Conf. Information Hiding, Berkeley, CA, May 15-18, 2012, vol. TBD, Lecture Notes in Computer Science.
    • (2012) Proc. 14th Int. Conf. Information Hiding
    • Böhme, R.1    Schöttle, P.2    Kirchner, M.3    Ghosal, D.4
  • 4
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Apr. 14-17 Lecture Notes in Computer Science Springer- Verlag, New York
    • C. Cachin, D. Aucsmith, Ed., "An information-theoretic model for steganography," in Proc. 2nd Int. Workshop Information Hiding, Portland, OR, Apr. 14-17, 1998, vol. 1525, Lecture Notes in Computer Science, pp. 306-318, Springer-Verlag, New York.
    • (1998) Proc. 2nd Int. Workshop Information Hiding, Portland, or , vol.1525 , pp. 306-318
    • Cachin, C.1    Aucsmith, D.2
  • 6
    • 70350445582 scopus 로고    scopus 로고
    • Fisher information determines capacity of-secure steganography
    • S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany Jun. 7-10 Lecture Notes in Computer Science Springer- Verlag, New York
    • T. Filler and J. Fridrich, "Fisher information determines capacity of-secure steganography," in Proc. 11th Int. Conf. Information Hiding, S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7-10, 2009, vol. 5806, Lecture Notes in Computer Science, pp. 31-47, Springer-Verlag, New York.
    • (2009) Proc. 11th Int. Conf. Information Hiding , vol.5806 , pp. 31-47
    • Filler, T.1    Fridrich, J.2
  • 9
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun.
    • J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 11
    • 85036644695 scopus 로고    scopus 로고
    • New JPEG steganographic scheme with high security performance
    • Oct. 1-3 Lecture Notes in Computer Science Springer- Verlag, New York
    • F.Huang,Y.Q. Shi, and J. Huang,H.-J. Kim, Y. Q. Shi, andM.Barni, Eds., "New JPEG steganographic scheme with high security performance," in Proc. 9th Int. Workshop on Digital Watermarking, Seoul, Korea, Oct. 1-3, 2010, vol. 6526, Lecture Notes in Computer Science, pp. 189-201, Springer-Verlag, New York.
    • (2010) Proc. 9th Int. Workshop on Digital Watermarking, Seoul, Korea , vol.6526 , pp. 189-201
    • Huang, F.1    Shi, Y.Q.2    Huang, J.3    Kim, H.-J.4    Shi, Y.Q.5    Barni, M.6
  • 12
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • DOI 10.1109/LSP.2006.891319
    • A. D. Ker, "A capacity result for batch steganography," IEEE Signal Process. Lett., vol. 14, no. 8, pp. 525-528, 2007. (Pubitemid 47250022)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.D.1
  • 13
    • 49949117942 scopus 로고    scopus 로고
    • A fusion of maximal likelihood and structural steganalysis
    • Jun. 11-13 Lecture Notes in Computer Science Springer- Verlag, Berlin
    • A. D. Ker, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., "A fusion of maximal likelihood and structural steganalysis," in Proc. 9th Int. Workshop Information Hiding, Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 204-219, Springer-Verlag, Berlin.
    • (2007) Proc. 9th Int. Workshop Information Hiding, Saint Malo, France , vol.4567 , pp. 204-219
    • Ker, A.D.1    Furon, T.2    Cayre, F.3    Doërr, G.4    Bas, P.5
  • 14
    • 38849116275 scopus 로고    scopus 로고
    • The ultimate steganalysis benchmark?
    • DOI 10.1145/1288869.1288889, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    • A. D. Ker, J. Dittmann and J. Fridrich, Eds., "The ultimate steganalysis benchmark?," in Proc. 9th ACMMultimedia& SecurityWorkshop, Dallas, TX, Sep. 20-21, 2007, pp. 141-148. (Pubitemid 351203812)
    • (2007) MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 , pp. 141-148
    • Ker, A.D.1
  • 15
    • 70350440358 scopus 로고    scopus 로고
    • Estimating steganographic Fisher information in real images
    • Darmstadt, Germany Jun. 7-10 Lecture Notes in Computer Science Springer- Verlag, New York
    • A. D. Ker, S. Katzenbeisser and A.-R. Sadeghi, Eds., "Estimating steganographic Fisher information in real images," in Proc. 11th Int. Conf. Information Hiding, Darmstadt, Germany, Jun. 7-10, 2009, vol. 5806, Lecture Notes in Computer Science, pp. 73-88, Springer-Verlag, New York.
    • (2009) Proc. 11th Int. Conf. Information Hiding , vol.5806 , pp. 73-88
    • Ker, A.D.1    Katzenbeisser, S.2    Sadeghi, A.-R.3
  • 16
    • 78549231321 scopus 로고    scopus 로고
    • The square root law in stegosystems with imperfect information
    • Calgary, Canada, Jun. 28-30 Lecture Notes in Computer Science Springer- Verlag, New York
    • A. D. Ker, R. Böhme and R. Safavi-Naini, Eds., "The square root law in stegosystems with imperfect information," in Proc. 12th Int. Conf. Information Hiding, Calgary, Canada, Jun. 28-30, 2010, vol. 6387, Lecture Notes in Computer Science, pp. 145-160, Springer-Verlag, New York.
    • (2010) Proc. 12th Int. Conf. Information Hiding , vol.6387 , pp. 145-160
    • Ker, A.D.1    Böhme, R.2    Safavi-Naini, R.3
  • 18
    • 78649425529 scopus 로고    scopus 로고
    • Quantitative structural steganalysis of Jsteg
    • Dec.
    • J. Kodovský and J. Fridrich, "Quantitative structural steganalysis of Jsteg," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 681-693, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 681-693
    • Kodovský, J.1    Fridrich, J.2
  • 20
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • Apr.
    • J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 432-444
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 22
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun.
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 24
    • 84867591559 scopus 로고    scopus 로고
    • An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents
    • Kyoto, Japan, Mar 25-30
    • C.Wang and J.Ni, "An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents," in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 25-30, 2012.
    • (2012) Proc. IEEE ICASSP
    • Wang, C.1    Ni, J.2
  • 26
    • 45249103920 scopus 로고    scopus 로고
    • Perfectly secure steganography: Capacity, error exponents, and code constructions
    • Jun
    • Y. Wang and P. Moulin, "Perfectly secure steganography: Capacity, error exponents, and code constructions," IEEE Trans. Inf. Theory, Special Issue on Security, vol. 55, no. 6, pp. 2706-2722, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory, Special Issue on Security , vol.55 , Issue.6 , pp. 2706-2722
    • Wang, Y.1    Moulin, P.2
  • 27
    • 84937814312 scopus 로고    scopus 로고
    • F5-A steganographic algorithm: High capacity despite better steganalysis
    • Information Hiding
    • A. Westfeld, I. S. Moskowitz, Ed., "High capacity despite better steganalysis (F5-A steganographic algorithm)," in Proc. 4th Int. Workshop Information Hiding, Pittsburgh, PA, Apr. 25-27, 2001, vol. 2137, Lecture Notes in Computer Science, pp. 289-302, Springer-Verlag, New York. (Pubitemid 33367674)
    • (2001) Lecture Notes in Computer Science , Issue.2137 , pp. 289-302
    • Westfeld, A.1
  • 29
    • 34247562352 scopus 로고    scopus 로고
    • Steganalysis based on Markov model of thresholded prediction-error image
    • DOI 10.1109/ICME.2006.262792, 4036862, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
    • D. Zou, Y. Q. Shi, W. Su, and G. Xuan, "Steganalysis based on Markov model of thresholded prediction-error image," in Proc. IEEE Int. Conf. Multimedia and Expo, Toronto, Canada, Jul. 9-12, 2006, pp. 1365-1368. (Pubitemid 46679978)
    • (2006) 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings , vol.2006 , pp. 1365-1368
    • Zou, D.1    Shi, Y.Q.2    Su, W.3    Xuan, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.