메뉴 건너뛰기




Volumn 8665, Issue , 2013, Pages

Random projections of residuals as an alternative to co-occurrences in steganalysis

Author keywords

Classification; Co occurrence; Projection; PSRM; Residual; Steganalysis

Indexed keywords

CO-OCCURRENCE; PROJECTION; PSRM; RESIDUAL; STEGANALYSIS;

EID: 84878455879     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.1000330     Document Type: Conference Paper
Times cited : (37)

References (12)
  • 1
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system- The ins and outs of organizing BOSS
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, volume 6958 of Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
    • P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Information Hiding, 13th International Conference , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 3
    • 80052990656 scopus 로고    scopus 로고
    • A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
    • G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, Lecture Notes in Computer Science, pages 71-84, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Information Hiding, 13th International Conference , pp. 71-84
    • Gül, G.1    Kurugollu, F.2
  • 6
    • 80054777166 scopus 로고    scopus 로고
    • On dangers of overtraining steganography to incomplete cover model
    • J. Dittmann, S. Craver, and C. Heitzenrater, editors, Niagara Falls, NY, September 29-30
    • J. Kodovský, J. Fridrich, and V. Holub. On dangers of overtraining steganography to incomplete cover model. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 69-76, Niagara Falls, NY, September 29-30, 2011.
    • (2011) Proceedings of the 13th ACM Multimedia & Security Workshop , pp. 69-76
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 11
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • R. Böhme and R. Safavi-Naini, editors, volume 6387 of Lecture Notes in Computer Science, Calgary, Canada, June 28-30, Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Conference, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
    • (2010) Information Hiding, 12th International Conference , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.