메뉴 건너뛰기




Volumn 7809 LNCS, Issue , 2013, Pages 19-33

A novel mapping scheme for steganalysis

Author keywords

co occurrence matrix; HUGO (Highly Undetectable Stegonagraphy); local binary patterns; mapping scheme; Markov process; Steganalysis; steganography; transition probability matrix

Indexed keywords

CO-OCCURRENCE-MATRIX; HUGO (HIGHLY UNDETECTABLE STEGONAGRAPHY); LOCAL BINARY PATTERNS; MAPPING SCHEME; STEGANALYSIS; TRANSITION PROBABILITY MATRIX;

EID: 84883172225     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40099-5_3     Document Type: Conference Paper
Times cited : (15)

References (20)
  • 2
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
    • Farid, H., Siwei, L.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340-354. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2578 , pp. 340-354
    • Farid, H.1    Siwei, L.2
  • 3
    • 24744463389 scopus 로고    scopus 로고
    • Master Thesis of Rensselaer Polytechnic Institute, Troy, New York, advised by Professor W. A. Pearlman
    • Harmsen, J.J.: Steganalysis of Additive Noise Modelable Information Hiding. Master Thesis of Rensselaer Polytechnic Institute, Troy, New York, advised by Professor W. A. Pearlman (2003)
    • (2003) Steganalysis of Additive Noise Modelable Information Hiding
    • Harmsen, J.J.1
  • 4
    • 33746647772 scopus 로고    scopus 로고
    • Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
    • Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. Springer, Heidelberg
    • Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Zhang, Z., Chai, P., Chen, C.-H., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 262-277. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3727 , pp. 262-277
    • Xuan, G.1    Shi, Y.Q.2    Gao, J.3    Zou, D.4    Yang, C.5    Zhang, Z.6    Chai, P.7    Chen, C.-H.8    Chen, W.9
  • 5
    • 35048835739 scopus 로고    scopus 로고
    • Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes
    • Fridrich, J. (ed.) IH 2004. Springer, Heidelberg
    • Fridrich, J.: Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67-81. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 6
    • 21844460833 scopus 로고    scopus 로고
    • Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory
    • Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.S.: Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory. In: SPIE 2005, vol. 5681, pp. 38-46 (2005)
    • (2005) SPIE 2005 , vol.5681 , pp. 38-46
    • Sullivan, K.1    Madhow, U.2    Chandrasekaran, S.3    Manjunath, B.S.4
  • 9
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. Springer, Heidelberg
    • Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161-177. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 10
    • 80052990656 scopus 로고    scopus 로고
    • A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO)
    • Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. Springer, Heidelberg
    • Gul, G., Kurugollu, F.: A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 71-84. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6958 , pp. 71-84
    • Gul, G.1    Kurugollu, F.2
  • 11
    • 80053047483 scopus 로고    scopus 로고
    • Steganalysis of Content-Adaptive Steganography in Spatial Domain
    • Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. Springer, Heidelberg
    • Fridrich, J., Kodovský, J., Holub, V., Goljan, M.: Steganalysis of Content-Adaptive Steganography in Spatial Domain. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 102-117. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6958 , pp. 102-117
    • Fridrich, J.1    Kodovský, J.2    Holub, V.3    Goljan, M.4
  • 12
    • 84874405772 scopus 로고    scopus 로고
    • Textural features for steganalysis
    • Kirchner, M., Ghosal, D. (eds.) IH 2012. Springer, Heidelberg
    • Shi, Y.Q., Sutthiwan, P., Chen, L.: Textural features for steganalysis. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 63-77. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7692 , pp. 63-77
    • Shi, Y.Q.1    Sutthiwan, P.2    Chen, L.3
  • 15
    • 80053005547 scopus 로고    scopus 로고
    • "Break our steganographic system": The ins and outs of organizing BOSS
    • Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. Springer, Heidelberg
    • Bas, P., Filler, T., Pevný, T.: "Break our steganographic system": The ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59-70. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6958 , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 18
    • 38049166461 scopus 로고    scopus 로고
    • A markov process based approach to effective attacking JPEG steganography
    • Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. Springer, Heidelberg
    • Shi, Y.Q., Chen, C.-H., Chen, W.: A markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249-264. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.-H.2    Chen, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.