메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2949-2953

Multivariate gaussian model for designing additive distortion for steganography

Author keywords

additive distortion function; multivariate Gaussian cover; steganalysis; Steganography; syndrome trellis codes

Indexed keywords

ADDITIVE DISTORTION; EMBEDDING PROBLEMS; GAUSSIANS; MULTIVARIATE GAUSSIAN MODELS; RATE-DISTORTION BOUNDS; STATE-OF-THE-ART METHODS; STEGANALYSIS; SYNDROME-TRELLIS CODES;

EID: 84889632364     PISSN: 15206149     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICASSP.2013.6638198     Document Type: Conference Paper
Times cited : (133)

References (19)
  • 2
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington, DC, August 13-17
    • N. Provos, "Defending against statistical steganalysis," in 10th USENIX Security Symposium, Washington, DC, August 13-17, 2001, pp. 323-335.
    • (2001) 10th USENIX Security Symposium , pp. 323-335
    • Provos, N.1
  • 3
    • 33744753200 scopus 로고    scopus 로고
    • Model-based methods for steganography and steganalysis
    • P. Sallee, "Model-based methods for steganography and steganalysis," International Journal of Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
    • (2005) International Journal of Image Graphics , vol.5 , Issue.1 , pp. 167-190
    • Sallee, P.1
  • 5
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, June 28-30, of Lecture Notes in Computer Science, Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding, 12th International Conference, R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, June 28-30, 2010, vol. 6387 of Lecture Notes in Computer Science, pp. 161-177, Springer-Verlag, New York.
    • (2010) Information Hiding, 12th International Conference , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 6
    • 84867591559 scopus 로고    scopus 로고
    • An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents
    • Kyoto, Japan, March 25-30
    • C. Wang and J. Ni, "An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents," in Proc. of IEEE ICASSP, Kyoto, Japan, March 25-30, 2012.
    • (2012) Proc. of IEEE ICASSP
    • Wang, C.1    Ni, J.2
  • 7
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, September 7-8
    • V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding," in Proceedings of the 11th ACM Multimedia & Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, September 7-8, 2009, pp. 131-140.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 8
    • 0003214704 scopus 로고
    • Coding theorems for a discrete source with a fidelity criterion
    • C. E. Shannon, "Coding theorems for a discrete source with a fidelity criterion," IRE Nat. Conv. Rec., vol. 4, pp. 142-163, 1959.
    • (1959) IRE Nat. Conv. Rec. , vol.4 , pp. 142-163
    • Shannon, C.E.1
  • 9
    • 80051709471 scopus 로고    scopus 로고
    • Minimizing additive distortion in steganography using syndrome-trellis codes
    • September
    • T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, September 2011.
    • (2011) IEEE Transactions on Information Forensics and Security , vol.6 , Issue.3 , pp. 920-935
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 11
    • 79954457569 scopus 로고    scopus 로고
    • Design of adaptive steganographic schemes for digital images
    • A. Alattar, N. D. Memon, E. J. Delp, and J. Dittmann, Eds., San Francisco, CA, January 23-26
    • T. Filler and J. Fridrich, "Design of adaptive steganographic schemes for digital images," in Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII, A. Alattar, N. D. Memon, E. J. Delp, and J. Dittmann, Eds., San Francisco, CA, January 23-26, 2011, vol. 7880, pp. OF 1-14.
    • (2011) Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII , vol.7880
    • Filler, T.1    Fridrich, J.2
  • 12
    • 80054777166 scopus 로고    scopus 로고
    • On dangers of overtraining steganography to incomplete cover model
    • J. Dittmann, S. Craver, and C. Heitzenrater, Eds., Niagara Falls, NY, September 29-30
    • J. Kodovský, J. Fridrich, and V. Holub, "On dangers of overtraining steganography to incomplete cover model," in Proceedings of the 13th ACM Multimedia & Security Workshop, J. Dittmann, S. Craver, and C. Heitzenrater, Eds., Niagara Falls, NY, September 29-30, 2011, pp. 69-76.
    • (2011) Proceedings of the 13th ACM Multimedia & Security Workshop , pp. 69-76
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 15
    • 80052987721 scopus 로고    scopus 로고
    • A cover image model for reliable steganalysis
    • T. Filler, T. Pevný, A. Ker, and S. Craver, Eds., Prague, Czech Republic, May 18-20, of Lecture Notes in Computer Science
    • R. Cogranne, C. Zitzmann, L. Fillantre, F. Retraint, I. Nikiforov, and P. Cornu, "A cover image model for reliable steganalysis," in Information Hiding, 13th International Conference, T. Filler, T. Pevný, A. Ker, and S. Craver, Eds., Prague, Czech Republic, May 18-20, 2011, vol. 6958 of Lecture Notes in Computer Science, pp. 178-192.
    • (2011) Information Hiding, 13th International Conference , vol.6958 , pp. 178-192
    • Cogranne, R.1    Zitzmann, C.2    Fillantre, L.3    Retraint, F.4    Nikiforov, I.5    Cornu, P.6
  • 16
    • 70350445582 scopus 로고    scopus 로고
    • Fisher information determines capacity of-secure steganography
    • S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, June 7-10 of Lecture Notes in Computer Science, Springer-Verlag, New York
    • T. Filler and J. Fridrich, "Fisher information determines capacity of-secure steganography," in Information Hiding, 11th InternationalConference, S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, June 7-10, 2009, vol. 5806 of Lecture Notes in Computer Science, pp. 31-47, Springer-Verlag, New York.
    • (2009) Information Hiding, 11th International Conference , vol.5806 , pp. 31-47
    • Filler, T.1    Fridrich, J.2
  • 17
    • 70350440358 scopus 로고    scopus 로고
    • Estimating steganographic fisher information in real images
    • S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, June 7-10, of Lecture Notes in Computer Science, Springer-Verlag, New York
    • A. D. Ker, "Estimating steganographic fisher information in real images," in Information Hiding, 11th International Conference, S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, June 7-10, 2009, vol. 5806 of Lecture Notes in Computer Science, pp. 73-88, Springer-Verlag, New York.
    • (2009) Information Hiding, 11th International Conference , vol.5806 , pp. 73-88
    • Ker, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.