메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2857-2861

Steganalysis in resized images

Author keywords

interpolation algorithm; resized images; Steganalysis; steganographic security

Indexed keywords

CONTROLLED EXPERIMENT; FISHER INFORMATION; INTERPOLATION ALGORITHMS; RESIZED IMAGES; STATISTICAL PROPERTIES; STEGANALYSIS; STEGANOGRAPHIC ALGORITHMS; STEGANOGRAPHIC SECURITY;

EID: 84890489734     PISSN: 15206149     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICASSP.2013.6638179     Document Type: Conference Paper
Times cited : (19)

References (11)
  • 1
    • 70350562893 scopus 로고    scopus 로고
    • The Square Root Law of steganographic capacity for Markov covers
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, January 18-21
    • T. Filler, A. D. Ker, and J. Fridrich, "The Square Root Law of steganographic capacity for Markov covers," in Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, January 18-21, 2009, vol. 7254, pp. 08 1-08 11.
    • (2009) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI , vol.7254 , pp. 081-0811
    • Filler, T.1    Ker, A.D.2    Fridrich, J.3
  • 2
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system-the ins and outs of organizing BOSS
    • T. Filler, T. Pevný, A. Ker, and S. Craver, Eds., Prague, Czech Republic, May 18-20 of Lecture Notes in Computer Science
    • P. Bas, T. Filler, and T. Pevný, "Break our steganographic system-the ins and outs of organizing BOSS," in Information Hiding, 13th International Workshop, T. Filler, T. Pevný, A. Ker, and S. Craver, Eds., Prague, Czech Republic, May 18-20, 2011, vol. 6958 of Lecture Notes in Computer Science, pp. 59-70.
    • (2011) Information Hiding, 13th International Workshop , vol.6958 , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 3
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, June 28-30 of Lecture Notes in Computer Science, Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding, 12th International Workshop, R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, June 28-30, 2010, vol. 6387 of Lecture Notes in Computer Science, pp. 161-177, Springer-Verlag, New York.
    • (2010) Information Hiding, 12th International Workshop , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 7
    • 0019654284 scopus 로고
    • Cubic convolution interpolation for digital image processing
    • December
    • R. G. Keys, "Cubic convolution interpolation for digital image processing," IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. ASSP-29, no. 6, pp. 1153-1160, December 1981.
    • (1981) IEEE Transactions on Acoustics, Speech, and Signal Processing , vol.ASSP-29 , Issue.6 , pp. 1153-1160
    • Keys, R.G.1
  • 9
    • 85053452541 scopus 로고    scopus 로고
    • Steganalysis of LSB replacement using parity-aware features
    • Berkeley, CA, May 15-18, Lecture Notes in Computer Science, To appear
    • J. Fridrich and J. Kodovský, "Steganalysis of LSB replacement using parity-aware features," in Information Hiding, 14th International Workshop, Berkeley, CA, May 15-18, 2012, Lecture Notes in Computer Science, To appear.
    • (2012) Information Hiding, 14th International Workshop
    • Fridrich, J.1    Kodovský, J.2
  • 10
    • 70350445582 scopus 로고    scopus 로고
    • Fisher information determines capacity of-secure steganography
    • S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, June 7-10 of Lecture Notes in Computer Science, Springer-Verlag, New York
    • T. Filler and J. Fridrich, "Fisher information determines capacity of-secure steganography," in Information Hiding, 11th International Workshop, S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, June 7-10, 2009, vol. 5806 of Lecture Notes in Computer Science, pp. 31-47, Springer-Verlag, New York.
    • (2009) Information Hiding, 11th International Workshop , vol.5806 , pp. 31-47
    • Filler, T.1    Fridrich, J.2
  • 11
    • 0029250999 scopus 로고
    • On the modeling of DCT and subband image data for compression
    • February
    • S. Meignen and H. Meignen, "On the modeling of DCT and subband image data for compression," IEEE Transactions on Image Processing, vol. 4, no. 2, pp. 186-193, February 1995.
    • (1995) IEEE Transactions on Image Processing , vol.4 , Issue.2 , pp. 186-193
    • Meignen, S.1    Meignen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.