메뉴 건너뛰기




Volumn 8665, Issue , 2013, Pages

Quantitative steganalysis using rich models

Author keywords

[No Author keywords available]

Indexed keywords

BASE LEARNERS; GRADIENT BOOSTING; HIGH-DIMENSIONAL; LSB REPLACEMENT; QUANTITATIVE STEGANALYSIS; REGRESSION TREES; STATISTICAL IMAGES; STEGANOGRAPHIC SCHEMES;

EID: 84878430667     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.2001563     Document Type: Conference Paper
Times cited : (45)

References (26)
  • 1
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system- The ins and outs of organizing BOSS
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, volume 6958 of Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
    • P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Information Hiding, 13th International Workshop , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 2
    • 0030196364 scopus 로고    scopus 로고
    • Stacked regressions
    • L. Breiman. Stacked regressions. Machine Learning, 24:49-64, 1996.
    • (1996) Machine Learning , vol.24 , pp. 49-64
    • Breiman, L.1
  • 4
    • 0001573594 scopus 로고
    • Regression, prediction and shrinkage
    • Series B (Methodological)
    • J. B. Copas. Regression, prediction and shrinkage. Journal of the Royal Statistical Society. Series B (Methodological), 45(3):311-354, 1983.
    • (1983) Journal of the Royal Statistical Society , vol.45 , Issue.3 , pp. 311-354
    • Copas, J.B.1
  • 5
    • 35248901820 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pairs analysis
    • F.A.P. Petitcolas, editor, volume 2578 of Lecture Notes in Computer Science, Noordwijkerhout, The Netherlands, October 7-9, Springer-Verlag, New York
    • S. Dumitrescu, X. Wu, and Z. Wang. Detection of LSB steganography via Sample Pairs Analysis. In F.A.P. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 355-372, Noordwijkerhout, The Netherlands, October 7-9, 2002. Springer-Verlag, New York.
    • (2002) Information Hiding, 5th International Workshop , pp. 355-372
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 7
    • 0035472155 scopus 로고    scopus 로고
    • Detecting LSB steganography in color and gray-scale images
    • October-December
    • J. Fridrich, M. Goljan, and R. Du. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, Special Issue on Security, 8(4):22-28, October-December 2001.
    • (2001) IEEE Multimedia, Special Issue on Security , vol.8 , Issue.4 , pp. 22-28
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 9
    • 85053452541 scopus 로고    scopus 로고
    • Steganalysis of LSB replacement using parity-aware features
    • Lecture Notes in Computer Science, Berkeley, CA, May 15-18, To appear
    • J. Fridrich and J. Kodovský. Steganalysis of LSB replacement using parity-aware features. In Information Hiding, 14th International Workshop, Lecture Notes in Computer Science, Berkeley, CA, May 15-18, 2012. To appear.
    • (2012) Information Hiding, 14th International Workshop
    • Fridrich, J.1    Kodovský, J.2
  • 10
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • J. Dittmann and J. Fridrich, editors, Dallas, TX, September 20-21
    • J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
    • (2007) Proceedings of the 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 11
    • 0035470889 scopus 로고    scopus 로고
    • Greedy function approximation: A gradient boosting machine
    • J. H. Friedman. Greedy function approximation: A gradient boosting machine. Annals of Statistics, 29:1189-1232, 2000.
    • (2000) Annals of Statistics , vol.29 , pp. 1189-1232
    • Friedman, J.H.1
  • 12
    • 80052990656 scopus 로고    scopus 로고
    • A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, volume 6958 of Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
    • G. Gül and F. Kurugollu. A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, volume 6958 of Lecture Notes in Computer Science, pages 71-84, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Information Hiding, 13th International Workshop , pp. 71-84
    • Gül, G.1    Kurugollu, F.2
  • 14
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • J.L. Camenisch, C.S. Collberg, N.F. Johnson, and P. Sallee, editors, volume 4437 of Lecture Notes in Computer Science, Alexandria, VA, July 10-12, Springer-Verlag, New York
    • Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In J.L. Camenisch, C.S. Collberg, N.F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 314-327, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
    • (2006) Information Hiding, 8th International Workshop , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 15
    • 70449646940 scopus 로고    scopus 로고
    • Calibration revisited
    • J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
    • J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63-74, Princeton, NJ, September 7-8, 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 63-74
    • Kodovský, J.1    Fridrich, J.2
  • 16
    • 79954474492 scopus 로고    scopus 로고
    • Steganalysis in high dimensions: Fusing classifiers built on random subspaces
    • N.D. Memon, E.J. Delp, P.W. Wong, and J. Dittmann, editors, volume, San Francisco, CA, January 23-26
    • J. Kodovský and J. Fridrich. Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In N.D. Memon, E.J. Delp, P.W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages OL 1-13, San Francisco, CA, January 23-26, 2011.
    • (2011) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII , vol.7880 , pp. 1-13
    • Kodovský, J.1    Fridrich, J.2
  • 18
    • 80054777166 scopus 로고    scopus 로고
    • On dangers of overtraining steganography to incomplete cover model
    • J. Dittmann, S. Craver, and C. Heitzenrater, editors, Niagara Falls, NY, September 29-30
    • J. Kodovský, J. Fridrich, and V. Holub. On dangers of overtraining steganography to incomplete cover model. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 69-76, Niagara Falls, NY, September 29-30, 2011.
    • (2011) Proceedings of the 13th ACM Multimedia & Security Workshop , pp. 69-76
    • Kodovsḱ, J.1    Fridrich, J.2    Holub, V.3
  • 21
    • 70449644855 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
    • T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 75-84, Princeton, NJ, September 7-8, 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 75-84
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 22
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • R. Böhme and R. Safavi-Naini, editors, volume 6387 of Lecture Notes in Computer Science, Calgary, Canada, June 28-30, Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
    • (2010) Information Hiding, 12th International Workshop , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 23
    • 71449120465 scopus 로고    scopus 로고
    • From blind to quantitative steganalysis
    • N.D. Memon, E.J. Delp, P.W. Wong, and J. Dittmann, editors, volume, San Jose, CA, January 18-21
    • T. Pevný, J. Fridrich, and A.D. Ker. From blind to quantitative steganalysis. In N.D. Memon, E.J. Delp, P.W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 0C 1-14, San Jose, CA, January 18-21, 2009.
    • (2009) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI , vol.7254
    • Pevný, T.1    Fridrich, J.2    Ker, A.D.3
  • 24
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
    • V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131-140, Princeton, NJ, September 7-8, 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 26
    • 0026692226 scopus 로고
    • Stacked generalization
    • D. H. Wolpert. Stacked generalization. Neural Networks, 5:241-259, 1992.
    • (1992) Neural Networks , vol.5 , pp. 241-259
    • Wolpert, D.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.