메뉴 건너뛰기




Volumn 8, Issue 12, 2013, Pages 1996-2006

Random projections of residuals for digital image steganalysis

Author keywords

Image; Random projection; Residual; Steganalysis

Indexed keywords

FIRST-ORDER STATISTICS; IMAGE; JOINT PROBABILITY DISTRIBUTIONS; RANDOM PROJECTIONS; RESIDUAL; STATISTICAL REPRESENTATIONS; STEGANALYSIS; STEGANOGRAPHIC ALGORITHMS;

EID: 84888323613     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2286682     Document Type: Article
Times cited : (250)

References (39)
  • 1
    • 0034775171 scopus 로고    scopus 로고
    • Steganalysis using image quality metrics
    • Jan.
    • I. Avcibas, N. D. Memon, and B. Sankur, "Steganalysis using image quality metrics," Proc. SPIE, vol. 4314, pp. 523-531, Jan. 2001.
    • (2001) Proc. SPIE , vol.4314 , pp. 523-531
    • Avcibas, I.1    Memon, N.D.2    Sankur, B.3
  • 2
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system-The ins and outs of organizing BOSS
    • May
    • P. Bas, T. Filler, and T. Pevný, "Break our steganographic system-The ins and outs of organizing BOSS," in Proc. 13th Int. Conf., May 2011, pp. 59-70.
    • (2011) Proc. 13th Int. Conf. , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 4
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • L. Breiman, "Bagging predictors," Mach. Learn., vol. 24, pp. 123-140, Aug. 1996. (Pubitemid 126724382)
    • (1996) Machine Learning , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 5
    • 84873683899 scopus 로고    scopus 로고
    • An asymptotically uniformly most powerful test for LSB matching detection
    • Mar.
    • R. Cogranne and F. Retraint, "An asymptotically uniformly most powerful test for LSB matching detection," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 464-476, Mar. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 464-476
    • Cogranne, R.1    Retraint, F.2
  • 7
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Oct.
    • H. Farid and L. Siwei, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop, Oct. 2002,pp. 340-354.
    • (2002) Proc. 5th Int. Workshop , pp. 340-354
    • Farid, H.1    Siwei, L.2
  • 8
    • 84855933278 scopus 로고    scopus 로고
    • Adaptive steganalysis of least significant bit replacement in grayscale images
    • Feb.
    • L. Fillatre, "Adaptive steganalysis of least significant bit replacement in grayscale images," IEEE Trans. Signal Process., vol. 60, no. 2, pp. 556-569, Feb. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.60 , Issue.2 , pp. 556-569
    • Fillatre, L.1
  • 9
    • 80051709471 scopus 로고    scopus 로고
    • Minimizing additive distortion in steganography using syndrome-trellis codes
    • Sep.
    • T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920-935, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 920-935
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 11
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun.
    • J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 13
    • 80053047483 scopus 로고    scopus 로고
    • Steganalysis of content-adaptive steganography in spatial domain
    • May
    • J. Fridrich, J. Kodovský, M. Goljan, and V. Holub, "Steganalysis of content-adaptive steganography in spatial domain," in Proc. 13th Int. Conf., May 2011, pp. 102-117.
    • (2011) Proc. 13th Int. Conf. , pp. 102-117
    • Fridrich, J.1    Kodovský, J.2    Goljan, M.3    Holub, V.4
  • 14
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
    • DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    • J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. 9th ACM Multimedia Security Workshop, Sep. 2007, pp. 3-14. (Pubitemid 351203799)
    • (2007) MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 , pp. 3-14
    • Fridrich, J.1    Pevny, T.2    Kodovsky, J.3
  • 15
    • 33645676686 scopus 로고    scopus 로고
    • New blind steganalysis and its implications
    • Jan.
    • M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," Proc. SPIE, vol. 6072, pp. 1-13, Jan. 2006.
    • (2006) Proc. SPIE , vol.6072 , pp. 1-13
    • Goljan, M.1    Fridrich, J.2    Holotyak, T.3
  • 16
    • 80052990656 scopus 로고    scopus 로고
    • A new methodology in steganalysis: Breaking highly undetectable steganography (HUGO)
    • May
    • G. Gül and F. Kurugollu, "A new methodology in steganalysis: Breaking highly undetectable steganography (HUGO)," in Proc. 13th Int. Conf., May 2011, pp. 71-84.
    • (2011) Proc. 13th Int. Conf. , pp. 71-84
    • Gül, G.1    Kurugollu, F.2
  • 19
    • 84880061681 scopus 로고    scopus 로고
    • Digital image steganography using universal distortion
    • Jun.
    • V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. 1st ACM Workshop, Jun. 2013, pp. 59-68.
    • (2013) Proc. 1st ACM Workshop , pp. 59-68
    • Holub, V.1    Fridrich, J.2
  • 20
    • 84878455879 scopus 로고    scopus 로고
    • Random projections of residuals as an alternative to co-occurrences in steganalysis
    • Feb
    • V. Holub and J. Fridrich, "Random projections of residuals as an alternative to co-occurrences in steganalysis," Proc. SPIE, vol. 8665, pp. 1-11, Feb. 2013.
    • (2013) Proc. SPIE , vol.8665 , pp. 1-11
    • Holub, V.1    Fridrich, J.2
  • 21
    • 84863942032 scopus 로고    scopus 로고
    • New channel selection rule for JPEG steganography
    • Aug.
    • F. Huang, J. Huang, and Y.-Q. Shi, "New channel selection rule for JPEG steganography," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1181-1191, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1181-1191
    • Huang, F.1    Huang, J.2    Shi, Y.-Q.3
  • 22
    • 49949117942 scopus 로고    scopus 로고
    • A fusion of maximal likelihood and structural steganalysis
    • Jun.
    • A. D. Ker, "A fusion of maximal likelihood and structural steganalysis," in Proc. 9th Int. Workshop, Jun. 2007, pp. 204-219.
    • (2007) Proc. 9th Int. Workshop , pp. 204-219
    • Ker, A.D.1
  • 24
    • 42949088538 scopus 로고    scopus 로고
    • Revisiting weighted stego-image steganalysis
    • Jan
    • A. D. Ker and R. Böhme, "Revisiting weighted stego-image steganalysis," Proc. SPIE, vol. 6819, pp. 1-17, Jan. 2008.
    • (2008) Proc. SPIE , vol.6819 , pp. 1-17
    • Ker, A.D.1    Böhme, R.2
  • 26
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • Jul.
    • Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Int. Workshop Inf. Hiding, Jul. 2006, pp. 314-327.
    • (2006) Proc. 8th Int. Workshop Inf. Hiding , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 28
    • 84858246718 scopus 로고    scopus 로고
    • Steganalysis of JPEG images using rich models
    • Jan.
    • J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, pp. 1-13, Jan. 2012.
    • (2012) Proc. SPIE , vol.8303 , pp. 1-13
    • Kodovský, J.1    Fridrich, J.2
  • 29
    • 84890489734 scopus 로고    scopus 로고
    • Steganalysis in resized images
    • May
    • J. Kodovský and J. Fridrich, "Steganalysis in resized images," in Proc. IEEE ICASSP, May 2013, pp. 1-19.
    • (2013) Proc. IEEE ICASSP , pp. 1-19
    • Kodovský, J.1    Fridrich, J.2
  • 30
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • Apr.
    • J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 432-444
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 31
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • Mar.
    • S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 32
    • 84858244890 scopus 로고    scopus 로고
    • Co-occurrence steganalysis in high dimension
    • Jan.
    • T. Pevný, "Co-occurrence steganalysis in high dimension," Proc. SPIE, vol. 8303, pp. 1-13, Jan. 2012.
    • (2012) Proc. SPIE , vol.8303 , pp. 1-13
    • Pevný, T.1
  • 33
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun.
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 34
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Jun.
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. 12th Int. Conf. Inf. Hiding, Jun. 2010, pp. 161-177.
    • (2010) Proc. 12th Int. Conf. Inf. Hiding , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 35
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • Sep.
    • V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding," in Proc. 11th ACM Multimedia Security Workshop, Sep. 2009, pp. 131-140.
    • (2009) Proc. 11th ACM Multimedia Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 37
    • 84937814312 scopus 로고    scopus 로고
    • F5-A Steganographic algorithm: High capacity despite better steganalysis
    • Information Hiding
    • A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)," in Proc. 4th Int. Workshop Inf. Hiding, Apr. 2001, pp. 289-302. (Pubitemid 33367674)
    • (2001) Lecture Notes in Computer Science , Issue.2137 , pp. 289-302
    • Westfeld, A.1
  • 39


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.