메뉴 건너뛰기




Volumn 8, Issue 3, 2013, Pages 464-476

An asymptotically uniformly most powerful test for lsb matching detection

Author keywords

Hypothesis testing theory; Information forensics; Information hiding; Nuisance parameters; Optimal detection

Indexed keywords

HYPOTHESIS TESTING; INFORMATION FORENSICS; INFORMATION HIDING; NUISANCE PARAMETER; OPTIMAL DETECTION;

EID: 84873683899     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2238232     Document Type: Article
Times cited : (54)

References (42)
  • 1
    • 0001217738 scopus 로고
    • The prisoners problem and the subliminal channel
    • G. Simmons, "The prisoners problem and the subliminal channel," in Proc. CRYPTO, 1983, pp. 51-67.
    • (1983) Proc. CRYPTO , pp. 51-67
    • Simmons, G.1
  • 2
    • 85053452541 scopus 로고    scopus 로고
    • Steganalysis of LSB replacement using parity-aware features
    • NewYork,NY,USA: Springer, LNCS.
    • J. Fridrich and J. Kodovský, "Steganalysis of LSB replacement using parity-aware features," in Information Hiding. NewYork,NY,USA: Springer, 2012, LNCS.
    • (2012) Information Hiding
    • Fridrich, J.1    Kodovský, J.2
  • 8
    • 33645015900 scopus 로고    scopus 로고
    • Wet paper codes with improved embedding efficiency
    • Mar
    • J. Fridrich, M. Goljan, and D. Soukal, "Wet paper codes with improved embedding efficiency," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 102-110, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 102-110
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 9
    • 33847156891 scopus 로고    scopus 로고
    • Steganography and error-correcting codes
    • DOI 10.1016/j.sigpro.2006.12.008, PII S0165168406004257
    • C. Munuera, "Steganography and error-correcting codes," Signal Process., vol. 87, no. 6, pp. 1528-1533, 2007. (Pubitemid 46282998)
    • (2007) Signal Processing , vol.87 , Issue.6 , pp. 1528-1533
    • Munuera, C.1
  • 10
    • 49549092237 scopus 로고    scopus 로고
    • Adaptive data hiding in edge areas of images with spatial LSB domain systems
    • Sep
    • C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun, "Adaptive data hiding in edge areas of images with spatial LSB domain systems," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488-497, Sep. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.3 , pp. 488-497
    • Yang, C.-H.1    Weng, C.-Y.2    Wang, S.-J.3    Sun, H.-M.4
  • 11
    • 77952620028 scopus 로고    scopus 로고
    • Edge adaptive image steganography based on LSB matching revisited
    • Jun
    • W. Luo, F. Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited," IEEE Trans. Inf. Forensics and Security, vol. 5, no. 2, pp. 201-214, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics and Security , vol.5 , Issue.2 , pp. 201-214
    • Luo, W.1    Huang, F.2    Huang, J.3
  • 12
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • New York, NY, USA: Springer, LNCS
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding. New York, NY, USA: Springer, 2010, vol. 6387, LNCS, pp. 161-177.
    • (2010) Information Hiding , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 13
    • 69949122982 scopus 로고    scopus 로고
    • Detection of LSB steganography based on the amplitude of histogram local extrema
    • G. Cancelli, G. Doerr, I. Cox, and M. Barni, "Detection of LSB steganography based on the amplitude of histogram local extrema," in Proc. IEEE Int. Conf. Image Process., 2008, pp. 1288-1291.
    • (2008) Proc. IEEE Int. Conf. Image Process. , pp. 1288-1291
    • Cancelli, G.1    Doerr, G.2    Cox, I.3    Barni, M.4
  • 16
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • Mar
    • S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 17
    • 34547917144 scopus 로고    scopus 로고
    • Performance measures for Neyman-Pearson classification
    • DOI 10.1109/TIT.2007.901152
    • C. Scott, "Performance measures for Neyman-Pearson classification," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2852-2863, Aug. 2007. (Pubitemid 47249851)
    • (2007) IEEE Transactions on Information Theory , vol.53 , Issue.8 , pp. 2852-2863
    • Scott, C.1
  • 19
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • DOI 10.1109/LSP.2005.847889
    • A. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, Jun. 2005. (Pubitemid 40794877)
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1
  • 20
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system-The ins and outs of organizing BOSS
    • New York, NY, USA: Springer, LNCS
    • P. Bas, T. Filler, and T. Pevný, "Break our steganographic system - The ins and outs of organizing BOSS," in Information Hiding. New York, NY, USA: Springer, 2011, vol. 6958, LNCS, pp. 59-70.
    • (2011) Information Hiding , vol.6958 , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 21
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun
    • J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovsky, J.2
  • 24
    • 84855933278 scopus 로고    scopus 로고
    • Adaptive steganalysis of least significant bit replacement in grayscale natural images
    • Feb
    • L. Fillatre, "Adaptive steganalysis of least significant bit replacement in grayscale natural images," IEEE Trans. Image Process., vol. 60, no. 2, pp. 556-569, Feb. 2012.
    • (2012) IEEE Trans. Image Process. , vol.60 , Issue.2 , pp. 556-569
    • Fillatre, L.1
  • 26
    • 52649143252 scopus 로고    scopus 로고
    • Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data
    • Oct
    • A. Foi, M. Trimeche, V. Katkovnik, and K. Egiazarian, "Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data," IEEE Trans. Image Process., vol. 17, no. 10, pp. 1737-1754, Oct. 2008.
    • (2008) IEEE Trans. Image Process. , vol.17 , Issue.10 , pp. 1737-1754
    • Foi, A.1    Trimeche, M.2    Katkovnik, V.3    Egiazarian, K.4
  • 27
    • 0028391852 scopus 로고
    • Radiometric CCD camera calibration and noise estimation
    • Mar
    • G. Healey and R. Kondepudy, "Radiometric CCD camera calibration and noise estimation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 3, pp. 267-276, Mar. 1994.
    • (1994) IEEE Trans. Pattern Anal. Mach. Intell. , vol.16 , Issue.3 , pp. 267-276
    • Healey, G.1    Kondepudy, R.2
  • 29
    • 80053026542 scopus 로고    scopus 로고
    • Statistical decision methods in hidden information detection
    • New York, NY, USA: Springer, LNCS
    • C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, "Statistical decision methods in hidden information detection," in Information Hiding. New York, NY, USA: Springer, 2011, vol. 6958, LNCS, pp. 163-177.
    • (2011) Information Hiding , vol.6958 , pp. 163-177
    • Zitzmann, C.1    Cogranne, R.2    Retraint, F.3    Nikiforov, I.4    Fillatre, L.5    Cornu, P.6
  • 34
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • DOI 10.1109/LSP.2006.891319
    • A. D. Ker, "A capacity result for batch steganography," Signal Process. Lett., vol. 14, no. 8, pp. 525-528, 2007. (Pubitemid 47250022)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.D.1
  • 36
    • 20444440880 scopus 로고
    • Random field models in image analysis
    • R. Dubes and A. Jain, "Random field models in image analysis," J. Appl. Statist., vol. 16, no. 2, pp. 131-164, 1989.
    • (1989) J. Appl. Statist. , vol.16 , Issue.2 , pp. 131-164
    • Dubes, R.1    Jain, A.2
  • 39
    • 33144483155 scopus 로고    scopus 로고
    • Stable recovery of sparse overcomplete representations in the presence of noise
    • DOI 10.1109/TIT.2005.860430
    • D. Donoho, M. Elad, and V. Temlyakov, "Stable recovery of sparse overcomplete representations in the presence of noise," IEEE Trans. Inf. Theory, vol. 52, no. 1, pp. 6-18, Jan. 2006. (Pubitemid 43263116)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.1 , pp. 6-18
    • Donoho, D.L.1    Elad, M.2    Temlyakov, V.N.3
  • 40
    • 33751379736 scopus 로고    scopus 로고
    • Image denoising via sparse and redundant representations over learned dictionaries
    • DOI 10.1109/TIP.2006.881969
    • M. Elad and M. Aharon, "Image denoising via sparse and redundant representations over learned dictionaries," IEEE Trans. Image Process., vol. 15, no. 12, pp. 3736-3745, Dec. 2006. (Pubitemid 44811686)
    • (2006) IEEE Transactions on Image Processing , vol.15 , Issue.12 , pp. 3736-3745
    • Elad, M.1    Aharon, M.2
  • 41
    • 84902748454 scopus 로고
    • Discrete cosine transform
    • Jan
    • N. Ahmed, T. Natarajan, and K. Rao, "Discrete cosine transform," IEEE Trans. Comput., vol. C-23, no. 1, pp. 90-93, Jan. 1974.
    • (1974) IEEE Trans. Comput. , vol.23 , Issue.1 , pp. 90-93
    • Ahmed, N.1    Natarajan, T.2    Rao, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.