메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

Universal distortion function for steganography in an arbitrary domain

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL STORAGE; STEGANOGRAPHY;

EID: 84894039003     PISSN: 16874161     EISSN: 2510523X     Source Type: Journal    
DOI: 10.1186/1687-417X-2014-1     Document Type: Article
Times cited : (1073)

References (33)
  • 2
    • 0003214704 scopus 로고
    • Coding theorems for a discrete source with a fidelity criterion
    • Shannon CE: Coding theorems for a discrete source with a fidelity criterion. IRE Nat. Conv. Rec 1959, 4:142-163.
    • (1959) IRE Nat. Conv. Rec , vol.4 , pp. 142-163
    • Shannon, C.E.1
  • 3
    • 80051709471 scopus 로고    scopus 로고
    • Minimizing additive distortion in steganography using syndrome-trellis codes
    • 10.1109/TIFS.2011.2134094
    • Filler T, Judas J, Fridrich J: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur 2011,6(3):920-935.
    • (2011) IEEE Trans. Inf. Forensics Secur , vol.6 , Issue.3 , pp. 920-935
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 4
    • 78149255931 scopus 로고    scopus 로고
    • Gibbs construction in steganography
    • 10.1109/TIFS.2010.2077629
    • Filler T, Fridrich J: Gibbs construction in steganography. IEEE Trans. Inf. Forensics Secur 2010,5(4):705-720.
    • (2010) IEEE Trans. Inf. Forensics Secur , vol.5 , Issue.4 , pp. 705-720
    • Filler, T.1    Fridrich, J.2
  • 7
    • 80054777166 scopus 로고    scopus 로고
    • On dangers of overtraining steganography to incomplete cover model
    • J. Dittmann S. Craver C. Heitzenrater (eds) Niagara Falls
    • Kodovský J, Fridrich J, Holub V: On dangers of overtraining steganography to incomplete cover model. In Proceedings of the 13th ACM Multimedia & Security Workshop. Edited by: Dittmann J, Craver S, Heitzenrater C. Niagara Falls; 2011:69-76.
    • (2011) Proceedings of the 13th ACM Multimedia & Security Workshop , pp. 69-76
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 9
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • J. Dittmann S. Craver J. Fridrich (eds) Princeton
    • Sachnev V, Kim HJ, Zhang R: Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Multimedia & Security Workshop. Edited by: Dittmann J, Craver S, Fridrich J. Princeton; 2009:131-140.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 10
    • 84867591559 scopus 로고    scopus 로고
    • An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficients
    • 25-30 March; Kyoto
    • Wang C, Ni J: An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficients. In Proceedings of IEEE ICASSP. Kyoto; 25-30 March 2012.
    • (2012) Proceedings of IEEE ICASSP
    • Wang, C.1    Ni, J.2
  • 11
    • 84863942032 scopus 로고    scopus 로고
    • New channel selection rule for JPEG steganography
    • 10.1109/TIFS.2012.2198213
    • Huang F, Huang J, Shi Y-Q: New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Secur 2012,7(4):1181-1191.
    • (2012) IEEE Trans. Inf. Forensics Secur , vol.7 , Issue.4 , pp. 1181-1191
    • Huang, F.1    Huang, J.2    Shi, Y.-Q.3
  • 14
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • J. Dittmann J. Fridrich (eds) 20-21 September; Dallas
    • Fridrich J, Pevný T, Kodovský J: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In Proceedings of the 9th ACM Multimedia & Security Workshop. Edited by: Dittmann J, Fridrich J. Dallas; 20-21 September 2007:3-14.
    • (2007) Proceedings of the 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 16
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • 10.1109/TIFS.2010.2045842
    • Pevný T, Bas P, Fridrich J: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur 2010,5(2):215-224.
    • (2010) IEEE Trans. Inf. Forensics Secur , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 18
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • 10.1109/TIFS.2012.2190402
    • Fridrich J, Kodovský J: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur 2011,7(3):868-882.
    • (2011) IEEE Trans. Inf. Forensics Secur , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 26
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • 10.1109/TIFS.2011.2175919
    • Kodovský J, Fridrich J, Holub V: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur 2012,7(2):432-444.
    • (2012) IEEE Trans. Inf. Forensics Secur , vol.7 , Issue.2 , pp. 432-444
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 28
    • 77952620028 scopus 로고    scopus 로고
    • Edge adaptive image steganography based on LSB matching revisited
    • 10.1109/TIFS.2010.2041812 2649719
    • Luo W, Huang F, Huang J: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur 2010,5(2):201-214.
    • (2010) IEEE Trans. Inf. Forensics Secur , vol.5 , Issue.2 , pp. 201-214
    • Luo, W.1    Huang, F.2    Huang, J.3
  • 30
    • 49949117942 scopus 로고    scopus 로고
    • A fusion of maximal likelihood and structural steganalysis
    • Information Hiding, ed. by T Furon, F Cayre, G Doërr, P Bas Berlin: Springer-Verlag
    • Ker AD: A fusion of maximal likelihood and structural steganalysis. In Information Hiding, ed. by T Furon, F Cayre, G Doërr, P Bas. 9th International Workshop, IH 2007, Saint Malo, 11-13 June 2007. Lecture Notes in Computer Science. Berlin: Springer-Verlag; 204-219.
    • 9th International Workshop, IH 2007, Saint Malo, 11-13 June 2007. Lecture Notes in Computer Science , pp. 204-219
    • Ker, A.D.1
  • 33


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.