메뉴 건너뛰기




Volumn , Issue , 2013, Pages 45-58

Moving steganography and steganalysis from the laboratory into the real world

Author keywords

game theory; minimal distortion; optimal detection; security models; steganalysis; steganography

Indexed keywords

ACADEMIC LITERATURE; DETECTION PROBLEMS; LABORATORY CONDITIONS; MINIMAL DISTORTION; OPTIMAL DETECTION; POSITION PAPERS; SECURITY MODEL; STEGANALYSIS;

EID: 84880060316     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2482513.2482965     Document Type: Conference Paper
Times cited : (263)

References (107)
  • 1
    • 84880080712 scopus 로고    scopus 로고
    • Documents reveal Al Qaeda's plans for seizing cruise ships, carnage in europe
    • April accessed February 2012.
    • Documents reveal Al Qaeda's plans for seizing cruise ships, carnage in europe. CNN, April 2012. http://edition.cnn.com/2012/04/30/world/al-qaeda- documents-future/index.html, accessed February 2012.
    • (2012) CNN
  • 2
    • 84880055218 scopus 로고    scopus 로고
    • accessed February 2012
    • Feature extractors for steganalysis. http://dde.binghamton.edu/download/ feature-extractors/, accessed February 2012.
    • Feature Extractors for Steganalysis
  • 3
    • 84880081197 scopus 로고    scopus 로고
    • Steganography
    • accessed February 2012
    • MIT Technology Review: Steganography. http://www.technologyreview.com/ search/site/steganography/, accessed February 2012.
    • MIT Technology Review
  • 4
    • 84880049713 scopus 로고    scopus 로고
    • Russian spies' use of steganography is just the beginning
    • July accessed February 2012
    • Russian spies' use of steganography is just the beginning. MIT Technology Review, July 2010. http://www.technologyreview.com/view/419833/russian-spies- use-of-steganography-is-just-the-beginning/, accessed February 2012.
    • (2010) MIT Technology Review
  • 5
    • 80955155205 scopus 로고    scopus 로고
    • Revealed: Operation Shady RAT
    • accessed February 2012
    • D. Alperovitch. Revealed: Operation Shady RAT. McAfee White Paper, 2011. http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf, accessed February 2012.
    • (2011) McAfee White Paper
    • Alperovitch, D.1
  • 7
    • 84955563192 scopus 로고    scopus 로고
    • Stretching the limits of steganography
    • Information Hiding, 1st International Workshop, Springer-Verlag
    • R. Anderson. Stretching the limits of steganography. In Information Hiding, 1st International Workshop, volume 1174 of LNCS, pages 39-48. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1174 , pp. 39-48
    • Anderson, R.1
  • 11
    • 77952635989 scopus 로고    scopus 로고
    • A method for automatic identification of signatures of steganography software
    • G. Bell and Y.-K. Lee. A method for automatic identification of signatures of steganography software. IEEE Trans. Inf. Forensics Security, 5(2):354-358, 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 354-358
    • Bell, G.1    Lee, Y.-K.2
  • 13
    • 56749107134 scopus 로고    scopus 로고
    • Weighted stego-image steganalysis for JPEG covers
    • Information Hiding, 10th International Workshop, Springer-Verlag
    • R. Böhme. Weighted stego-image steganalysis for JPEG covers. In Information Hiding, 10th International Workshop, volume 5284 of LNCS, pages 178-194. Springer-Verlag, 2007.
    • (2007) LNCS , vol.5284 , pp. 178-194
    • Böhme, R.1
  • 15
    • 33845623763 scopus 로고    scopus 로고
    • Digital video steganalysis exploiting statistical visibility in the temporal domain
    • DOI 10.1109/TIFS.2006.885020
    • U. Budhia, D. Kundur, and T. Zourntos. Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Trans. Inf. Forensics Security, 1(4):502-516, 2006. (Pubitemid 44947734)
    • (2006) IEEE Transactions on Information Forensics and Security , vol.1 , Issue.4 , pp. 502-516
    • Budhia, U.1    Kundur, D.2    Zourntos, T.3
  • 17
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Information Hiding, 2nd International Workshop, Springer-Verlag
    • C. Cachin. An information-theoretic model for steganography. In Information Hiding, 2nd International Workshop, volume 1525 of LNCS, pages 306-318. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 18
    • 84873683899 scopus 로고    scopus 로고
    • An asymptotically uniformly most powerful test for LSB matching detection
    • R. Cogranne and F. Retraint. An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans. Inf. Forensics Security, 8(3):464-476, 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 464-476
    • Cogranne, R.1    Retraint, F.2
  • 21
    • 14844285173 scopus 로고    scopus 로고
    • Some notes on steganography
    • available from
    • R. Crandall. Some notes on steganography. Steganography Mailing List, 1998. available from http://os.inf.tu-dresden.de/∼westfeld/crandall.pdf.
    • (1998) Steganography Mailing List
    • Crandall, R.1
  • 22
    • 84957887122 scopus 로고    scopus 로고
    • On public-key steganography in the presence of an active warden
    • S. Craver. On public-key steganography in the presence of an active warden. In Information Hiding, 2nd International Workshop, volume 1525, pages 355-368, 1998.
    • (1998) Information Hiding, 2nd International Workshop , vol.1525 , pp. 355-368
    • Craver, S.1
  • 23
    • 56749164813 scopus 로고    scopus 로고
    • A supraliminal channel in a videoconferencing application
    • Information Hiding, 10th International Workshop, Springer-Verlag
    • S. Craver, E. Li, J. Yu, and I. Atalki. A supraliminal channel in a videoconferencing application. In Information Hiding, 10th International Workshop, volume 5284 of LNCS, pages 283-293. Springer-Verlag, 2008.
    • (2008) LNCS , vol.5284 , pp. 283-293
    • Craver, S.1    Li, E.2    Yu, J.3    Atalki, I.4
  • 24
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • D. E. Denning. An intrusion-detection model. IEEE Trans. Softw. Eng., SE-13(2):222-232, 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 25
    • 84957886834 scopus 로고    scopus 로고
    • Steganalysis and game equilibria
    • Information Hiding, 2nd International Workshop, Springer-Verlag
    • M. Ettinger. Steganalysis and game equilibria. In Information Hiding, 2nd International Workshop, volume 1525 of LNCS, pages 319-328. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1525 , pp. 319-328
    • Ettinger, M.1
  • 26
    • 70350445582 scopus 로고    scopus 로고
    • Fisher information determines capacity of ε-secure steganography
    • Information Hiding, 11th International Conference, Springer-Verlag
    • T. Filler and J. Fridrich. Fisher information determines capacity of ε-secure steganography. In Information Hiding, 11th International Conference, volume 5806 of LNCS, pages 31-47. Springer-Verlag, 2009.
    • (2009) LNCS , vol.5806 , pp. 31-47
    • Filler, T.1    Fridrich, J.2
  • 28
    • 79954457569 scopus 로고    scopus 로고
    • Design of adaptive steganographic schemes for digital images
    • Media Watermarking, Security and Forensics XIII
    • T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. InMedia Watermarking, Security and Forensics XIII, volume 7880 of Proc. SPIE, pages OF 1-14, 2011.
    • (2011) Proc. SPIE , vol.7880
    • Filler, T.1    Fridrich, J.2
  • 29
    • 80051709471 scopus 로고    scopus 로고
    • Minimizing additive distortion in steganography using syndrome-trellis codes
    • T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Security, 6(3):920-935, 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 920-935
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 30
    • 70350562893 scopus 로고    scopus 로고
    • The Square Root Law of steganographic capacity for Markov covers
    • Security and Forensics of Multimedia XI
    • T. Filler, A. D. Ker, and J. Fridrich. The Square Root Law of steganographic capacity for Markov covers. In Security and Forensics of Multimedia XI, volume 7254 of Proc. SPIE, pages 08 1-11, 2009.
    • (2009) Proc. SPIE , vol.7254 , pp. 081-111
    • Filler, T.1    Ker, A.D.2    Fridrich, J.3
  • 31
    • 84955601215 scopus 로고    scopus 로고
    • Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best
    • Information Hiding, 1st International Workshop, Springer-Verlag
    • E. Franz, A. Jerichow, S. Möller, A. Pfitzmann, and I. Stierand. Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best. In Information Hiding, 1st International Workshop, volume 1174 of LNCS, pages 7-21. Springer-Verlag, 1996.
    • (1996) LNCS , vol.1174 , pp. 7-21
    • Franz, E.1    Jerichow, A.2    Möller, S.3    Pfitzmann, A.4    Stierand, I.5
  • 32
    • 84872311781 scopus 로고    scopus 로고
    • Effect of cover quantization on steganographic fisher information
    • J. Fridrich. Effect of cover quantization on steganographic fisher information. IEEE Trans. Inf. Forensics Security, 8(2):361-372, 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.2 , pp. 361-372
    • Fridrich, J.1
  • 33
    • 8844243986 scopus 로고    scopus 로고
    • On estimation of secret message length in LSB steganography in spatial domain
    • Security, Steganography, and Watermarking of Multimedia Contents VI
    • J. Fridrich and M. Goljan. On estimation of secret message length in LSB steganography in spatial domain. In Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306 of Proc. SPIE, pages 23-34, 2004.
    • (2004) Proc. SPIE , vol.5306 , pp. 23-34
    • Fridrich, J.1    Goljan, M.2
  • 37
    • 84957806554 scopus 로고    scopus 로고
    • Covert Messaging through TCP Timestamps
    • Privacy Enhancing Technologies
    • J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts. Covert messaging through TCP timestamps. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 194-208. Springer-Verlag, 2002. (Pubitemid 36309889)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2482 , pp. 194-208
    • Giffin, J.1    Greenstadt, R.2    Litwack, P.3    Tibbetts, R.4
  • 38
    • 84874072264 scopus 로고    scopus 로고
    • Forensic analysis of ordered data structures on the example of JPEG files
    • IEEE
    • T. Gloe. Forensic analysis of ordered data structures on the example of JPEG files. In Information Forensics and Security, 4th International Workshop, pages 139-144. IEEE, 2012.
    • (2012) Information Forensics and Security, 4th International Workshop , pp. 139-144
    • Gloe, T.1
  • 41
    • 84937438364 scopus 로고    scopus 로고
    • Provably secure steganography
    • Advances in Cryptology, CRYPTO '02, Springer-Verlag
    • N. J. Hopper, J. Langford, and L. von Ahn. Provably secure steganography. In Advances in Cryptology, CRYPTO '02, volume 2442 of LNCS, pages 77-92. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 77-92
    • Hopper, N.J.1    Langford, J.2    Von Ahn, L.3
  • 44
    • 77249127498 scopus 로고    scopus 로고
    • Provably secure steganography and the complexity of sampling
    • Algorithms and Computation, Springer-Verlag
    • C. Hundt, M. Liskiewicz, and U. Wölfel. Provably secure steganography and the complexity of sampling. In Algorithms and Computation, volume 4317 of LNCS, pages 754-763. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4317 , pp. 754-763
    • Hundt, C.1    Liskiewicz, M.2    Wölfel, U.3
  • 45
    • 84869417796 scopus 로고    scopus 로고
    • Where to hide the bits?
    • J. Grossklags and J. Walrand, editors, Decision and Game Theory for Security, Springer-Verlag
    • B. Johnson, P. Schöttle, and R. Böhme. Where to hide the bits? In J. Grossklags and J. Walrand, editors, Decision and Game Theory for Security, volume 7638 of LNCS, pages 1-17. Springer-Verlag, 2012.
    • (2012) LNCS , vol.7638 , pp. 1-17
    • Johnson, B.1    Schöttle, P.2    Böhme, R.3
  • 48
    • 38049111044 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • Information Hiding, 8th International Workshop, Springer-Verlag
    • A. D. Ker. Batch steganography and pooled steganalysis. In Information Hiding, 8th International Workshop, volume 4437 of LNCS, pages 265-281. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4437 , pp. 265-281
    • Ker, A.D.1
  • 49
    • 34548293733 scopus 로고    scopus 로고
    • Batch steganography and the threshold game
    • Security, Steganography, and Watermarking of of Multimedia Contents IX
    • A. D. Ker. Batch steganography and the threshold game. In Security, Steganography, and Watermarking of of Multimedia Contents IX, volume 6505 of Proc. SPIE, pages 04 1-13, 2007.
    • (2007) Proc. SPIE , vol.6505 , pp. 041-113
    • Ker, A.D.1
  • 50
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • A. D. Ker. A capacity result for batch steganography. IEEE Signal Process. Lett., 14(8):525-528, 2007.
    • (2007) IEEE Signal Process. Lett. , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.D.1
  • 52
    • 42949178523 scopus 로고    scopus 로고
    • Steganographic strategies for a square distortion function
    • Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
    • A. D. Ker. Steganographic strategies for a square distortion function. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 04 1-13, 2008.
    • (2008) Proc. SPIE , vol.6819 , pp. 041-113
    • Ker, A.D.1
  • 53
    • 70350539243 scopus 로고    scopus 로고
    • Estimating the information theoretic optimal stego noise
    • Digital Watermarking, 8th International Workshop, Springer-Verlag
    • A. D. Ker. Estimating the information theoretic optimal stego noise. In Digital Watermarking, 8th International Workshop, volume 5703 of LNCS, pages 184-198. Springer-Verlag, 2009.
    • (2009) LNCS , vol.5703 , pp. 184-198
    • Ker, A.D.1
  • 54
    • 42949088538 scopus 로고    scopus 로고
    • Revisiting weighted stego-image steganalysis
    • Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
    • A. D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 05 1-17, 2008.
    • (2008) Proc. SPIE , vol.6819 , pp. 051-117
    • Ker, A.D.1    Böhme, R.2
  • 56
    • 84858188731 scopus 로고    scopus 로고
    • Identifying a steganographer in realistic and heterogeneous data sets
    • Media Watermarking, Security, and Forensics XIV
    • A. D. Ker and T. Pevný. Identifying a steganographer in realistic and heterogeneous data sets. In Media Watermarking, Security, and Forensics XIV, volume 8303 of Proc. SPIE, pages 0N 1-13, 2012.
    • (2012) Proc. SPIE , vol.8303
    • Ker, A.D.1    Pevný, T.2
  • 58
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • Information Hiding, 8th International Workshop, Springer-Verlag
    • Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In Information Hiding, 8th International Workshop, volume 4437 of LNCS, pages 314-327. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 59
    • 84878430667 scopus 로고    scopus 로고
    • Quantitative steganalysis using rich models
    • Media Watermarking, Security, and Forensics 2013, to appear
    • Kodovský and J. Fridrich. Quantitative steganalysis using rich models. In Media Watermarking, Security, and Forensics 2013, Proc. SPIE, 2013. (to appear).
    • Proc. SPIE, 2013
    • Kodovský1    Fridrich, J.2
  • 62
    • 79954474492 scopus 로고    scopus 로고
    • Steganalysis in high dimensions: Fusing classifiers built on random subspaces
    • J. Kodovský and J. Fridrich. Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In Media Watermarking, Security and Forensics XIII, volume 7880, pages OL 1-13, 2011.
    • (2011) Media Watermarking, Security and Forensics XIII , vol.7880
    • Kodovský, J.1    Fridrich, J.2
  • 63
    • 84858246718 scopus 로고    scopus 로고
    • Steganalysis of JPEG images using rich models
    • Media Watermarking, Security, and Forensics 2012
    • J. Kodovský and J. Fridrich. Steganalysis of JPEG images using rich models. In Media Watermarking, Security, and Forensics 2012, volume 8303 of Proc. SPIE, pages 0A 1-13, 2012.
    • (2012) Proc. SPIE , vol.8303
    • Kodovský, J.1    Fridrich, J.2
  • 67
    • 20444495394 scopus 로고    scopus 로고
    • How to achieve blocking resistance for existing systems enabling anonymous web surfing
    • ACM
    • S. Köpsell and U. Hillig. How to achieve blocking resistance for existing systems enabling anonymous web surfing. In Privacy in the Electronic Society, ACM Workshop, pages 47-58. ACM, 2004.
    • (2004) Privacy in the Electronic Society, ACM Workshop , pp. 47-58
    • Köpsell, S.1    Hillig, U.2
  • 68
    • 0032658498 scopus 로고    scopus 로고
    • The CFAR adaptive subspace detector is a scale-invariant GLRT
    • S. Kraut and L. L. Scharf. The CFAR adaptive subspace detector is a scale-invariant GLRT. IEEE Trans. Sig. Proc., 47(9):2538-2541, 1999.
    • (1999) IEEE Trans. Sig. Proc. , vol.47 , Issue.9 , pp. 2538-2541
    • Kraut, S.1    Scharf, L.L.2
  • 72
    • 84858252960 scopus 로고    scopus 로고
    • Going from small to large data sets in steganalysis
    • Media Watermarking, Security, and Forensics 2012
    • I. Lubenko and A. D. Ker. Going from small to large data sets in steganalysis. In Media Watermarking, Security, and Forensics 2012, volume 8303 of Proc. SPIE, pages OM 1-10, 2012.
    • (2012) Proc. SPIE , vol.8303
    • Lubenko, I.1    Ker, A.D.2
  • 73
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • S. Lyu and H. Farid. Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forensics Security, 1(1):111-119, 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 74
    • 33746584368 scopus 로고    scopus 로고
    • Embedding covert channels in TCP/IP
    • Information Hiding, 7th International Workshop, Springer-Verlag
    • S. J. Murdoch and S. Lewis. Embedding covert channels in TCP/IP. In Information Hiding, 7th International Workshop, volume 3727 of LNCS, pages 247-261. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3727 , pp. 247-261
    • Murdoch, S.J.1    Lewis, S.2
  • 75
    • 42949095246 scopus 로고    scopus 로고
    • Steganalysis-aware steganography: Statistical indistinguishability despite high distortion
    • Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
    • A. Orsdemir, O. Altun, G. Sharma, and M. Bocko. Steganalysis-aware steganography: Statistical indistinguishability despite high distortion. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 15 1-19, 2008.
    • (2008) Proc. SPIE , vol.6819 , pp. 151-219
    • Orsdemir, A.1    Altun, O.2    Sharma, G.3    Bocko, M.4
  • 77
    • 79954485517 scopus 로고    scopus 로고
    • Detecting messages of unknown length
    • Media Watermarking, Security and Forensics XIII
    • T. Pevný. Detecting messages of unknown length. In Media Watermarking, Security and Forensics XIII, volume 7880 of Proc. SPIE, pages OT 1-12, 2011.
    • (2011) Proc. SPIE , vol.7880
    • Pevný, T.1
  • 79
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Information Hiding, 12th International Conference, Springer-Verlag
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, 12th International Conference, volume 6387 of LNCS, pages 161-177. Springer-Verlag, 2010.
    • (2010) LNCS , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 80
    • 44049087452 scopus 로고    scopus 로고
    • Detection of double-compression in JPEG images for applications in steganography
    • DOI 10.1109/TIFS.2008.922456, 4512175
    • T. Pevny and J. Fridrich. Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Security, 3(2):247-258, 2008. (Pubitemid 351709458)
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.2 , pp. 247-258
    • Pevny, T.1    Fridrich, J.2
  • 81
    • 56749170425 scopus 로고    scopus 로고
    • Multiclass detector of current steganographic methods for JPEG format
    • T. Pevný and J. Fridrich. Multiclass detector of current steganographic methods for JPEG format. IEEE Trans. Inf. Forensics Security, 3(4):635-650, 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.4 , pp. 635-650
    • Pevný, T.1    Fridrich, J.2
  • 85
    • 33745868393 scopus 로고    scopus 로고
    • Simple stateless steganography
    • L. Reyzin and S. Russell. Simple stateless steganography. IACR Eprint archive, 2003. http://eprint.iacr.org/2003/093.
    • (2003) IACR Eprint Archive
    • Reyzin, L.1    Russell, S.2
  • 86
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131-140, 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 89
    • 84874399529 scopus 로고    scopus 로고
    • A game-theoretic approach to content-adaptive steganography
    • Information Hiding, 14th International Conference, S pringer-Verlag
    • P. Schöttle and R. Böhme. A game-theoretic approach to content-adaptive steganography. In Information Hiding, 14th International Conference, volume 7692 of LNCS, pages 125-141. Springer-Verlag, 2012.
    • (2012) LNCS , vol.7692 , pp. 125-141
    • Schöttle, P.1    Böhme, R.2
  • 90
    • 27744553952 scopus 로고    scopus 로고
    • A Neyman-Pearson approach to statistical learning
    • DOI 10.1109/TIT.2005.856955
    • C. Scott and R. Nowak. A Neyman-Pearson approach to statistical learning. IEEE Trans. Inf. Theory, 51(8):3806-3819, 2005. (Pubitemid 41622582)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.11 , pp. 3806-3819
    • Scott, C.1    Nowak, R.2
  • 91
    • 0003214704 scopus 로고
    • Coding theorems for a discrete source with a fidelity criterion
    • C. E. Shannon. Coding theorems for a discrete source with a fidelity criterion. IRE Nat. Conv. Rec., 4:142-163, 1959.
    • (1959) IRE Nat. Conv. Rec. , vol.4 , pp. 142-163
    • Shannon, C.E.1
  • 92
    • 0001217738 scopus 로고
    • The prisoner's problem and the subliminal channel
    • Plenum Press
    • G. J. Simmons. The prisoner's problem and the subliminal channel. In Advances in Cryptology, CRYPTO '83, pages 51-67. Plenum Press, 1983.
    • (1983) Advances in Cryptology, CRYPTO '83 , pp. 51-67
    • Simmons, G.J.1
  • 94
    • 80052904726 scopus 로고    scopus 로고
    • Learning non-local range Markov random field for image restoration
    • IEEE
    • J. Sun and M. F. Tappen. Learning non-local range Markov random field for image restoration. In Computer Vision and Pattern Recognition, pages 2745-2752. IEEE, 2011.
    • (2011) Computer Vision and Pattern Recognition , pp. 2745-2752
    • Sun, J.1    Tappen, M.F.2
  • 97
    • 84947911018 scopus 로고    scopus 로고
    • A stochastic approach to content adaptive digital image watermarking
    • Information Hiding, 3rd International Workshop, Springer-Verlag
    • S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun. A stochastic approach to content adaptive digital image watermarking. In Information Hiding, 3rd International Workshop, volume 1768 of LNCS, pages 211-236. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1768 , pp. 211-236
    • Voloshynovskiy, S.1    Herrigel, A.2    Baumgaertner, N.3    Pun, T.4
  • 99
    • 0000090155 scopus 로고
    • Sequential tests of statistical hypotheses
    • A. Wald. Sequential tests of statistical hypotheses. Ann. Math. Stat., 16(2):117-186, 1945.
    • (1945) Ann. Math. Stat. , vol.16 , Issue.2 , pp. 117-186
    • Wald, A.1
  • 100
    • 84867591559 scopus 로고    scopus 로고
    • An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents
    • IEEE
    • C. Wang and J. Ni. An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents. In International Conference on Acoustics, Speech, and Signal Processing, pages 1785-1788. IEEE, 2012.
    • (2012) International Conference on Acoustics, Speech, and Signal Processing , pp. 1785-1788
    • Wang, C.1    Ni, J.2
  • 101
    • 45249103920 scopus 로고    scopus 로고
    • Perfectly secure steganography: Capacity, error exponents, and code constructions
    • Y. Wang and P. Moulin. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Trans. Inf. Theory, 55(6):2706-2722, 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2706-2722
    • Wang, Y.1    Moulin, P.2
  • 104
    • 71849083789 scopus 로고    scopus 로고
    • A study of on/off timing channel based on packet delay distribution
    • L. Yao, X. Zi, L. Pan, and J. Li. A study of on/off timing channel based on packet delay distribution. Computers & Security, 28(8):785-794, 2009.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 785-794
    • Yao, L.1    Zi, X.2    Pan, L.3    Li, J.4
  • 107
    • 80053026542 scopus 로고    scopus 로고
    • Statistical decision methods in hidden information detection
    • Information Hiding, 13th International Conference, Springer-Verlag
    • C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu. Statistical decision methods in hidden information detection. In Information Hiding, 13th International Conference, LNCS, pages 163-177. Springer-Verlag, 2011.
    • (2011) LNCS , pp. 163-177
    • Zitzmann, C.1    Cogranne, R.2    Retraint, F.3    Nikiforov, I.4    Fillatre, L.5    Cornu, P.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.