메뉴 건너뛰기




Volumn , Issue , 2013, Pages 4427-4431

Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients

Author keywords

Digital Image Model; Discrete Cosine Transform; Hypothesis Testing; JPEG Compression; Steganalysis

Indexed keywords

IMAGE COMPRESSION; STEGANOGRAPHY;

EID: 84897792025     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIP.2013.6738912     Document Type: Conference Paper
Times cited : (12)

References (20)
  • 2
    • 20444479084 scopus 로고    scopus 로고
    • Model-based steganalysis
    • oct. Vol. 4
    • X. Yu et al., "Model-based steganalysis," in ICIP '04, oct. 2004, vol. 4, pp. 2625-2628 Vol. 4.
    • (2004) ICIP '04 , vol.4 , pp. 2625-2628
    • Yu, X.1
  • 3
    • 84867593807 scopus 로고    scopus 로고
    • Hidden information detection based on quantized laplacian distribution
    • C. Zitzmann et al., "Hidden information detection based on quantized laplacian distribution," in ICASSP, 2012.
    • (2012) ICASSP
    • Zitzmann, C.1
  • 4
    • 78649425529 scopus 로고    scopus 로고
    • Quantitative structural steganalysis of Jsteg
    • dec
    • J. Kodovsky and J. Fridrich, "Quantitative structural steganalysis of Jsteg," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 681-693, dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 681-693
    • Kodovsky, J.1    Fridrich, J.2
  • 5
    • 0038675417 scopus 로고    scopus 로고
    • A fast and effective steganalytic technique against jsteg-like algorithms
    • T. Zhang and X. Ping, "A fast and effective steganalytic technique against jsteg-like algorithms," in ACM SAC '03, 2003, pp. 307-311.
    • (2003) ACM SAC '03 , pp. 307-311
    • Zhang, T.1    Ping, X.2
  • 6
    • 56749107134 scopus 로고    scopus 로고
    • Weighted stego-image steganalysis for JPEG covers
    • Springer
    • R. Bohme, "Weighted stego-image steganalysis for JPEG covers," in Proc. 10th Int. Workshop Information Hiding. 2007, vol. 5284, pp. 178-194, Springer.
    • (2007) Proc. 10th Int. Workshop Information Hiding. , vol.5284 , pp. 178-194
    • Bohme, R.1
  • 7
    • 84858191862 scopus 로고    scopus 로고
    • From blind to quantitative steganalysis
    • april
    • T. Pevny et al., "From blind to quantitative steganalysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 445-454, april 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 445-454
    • Pevny, T.1
  • 9
    • 0034298708 scopus 로고    scopus 로고
    • A mathematical analysis of the DCT coefficient distributions for images
    • oct
    • E. Y. Lam and J. W. Goodman, "A mathematical analysis of the DCT coefficient distributions for images," IEEE Trans. Image Process., vol. 9, no. 10, pp. 1661-1666, oct 2000.
    • (2000) IEEE Trans. Image Process , vol.9 , Issue.10 , pp. 1661-1666
    • Lam, E.Y.1    Goodman, J.W.2
  • 10
    • 0027681636 scopus 로고
    • Distribution shape of two-dimensional DCT coefficients of natural images
    • oct
    • F. Muller, "Distribution shape of two-dimensional DCT coefficients of natural images," Electronics Letters, vol. 29, no. 22, pp. 1935-1936, oct. 1993.
    • (1993) Electronics Letters , vol.29 , Issue.22 , pp. 1935-1936
    • Muller, F.1
  • 11
    • 17644426680 scopus 로고    scopus 로고
    • Image probability distribution based on generalized gamma function
    • april
    • J. H. Chang et al., "Image probability distribution based on generalized gamma function," IEEE Signal Process. Lett., vol. 12, no. 4, pp. 325-328, april 2005.
    • (2005) IEEE Signal Process. Lett , vol.12 , Issue.4 , pp. 325-328
    • Chang, J.H.1
  • 12
    • 84939061399 scopus 로고
    • On the central limit theorem for correlated random variables
    • march
    • M. Blum, "On the central limit theorem for correlated random variables," Proceedings of the IEEE, vol. 52, no. 3, pp. 308-309, march 1964.
    • (1964) Proceedings of the IEEE , vol.52 , Issue.3 , pp. 308-309
    • Blum, M.1
  • 14
    • 84874684999 scopus 로고    scopus 로고
    • Break our steganographic system-The ins and outs of organizing boss
    • T. Filler, Ed
    • P. Bas et al., "Break our steganographic system-The ins and outs of organizing boss," in Information Hiding, 13th International Workshop, T. Filler, Ed., 2011.
    • (2011) Information Hiding, 13th International Workshop
    • Bas, P.1
  • 15
    • 0000238336 scopus 로고
    • A simplex method for function minimization
    • J.A. Nelder and R. Mead, "A simplex method for function minimization," The Computer Journal, vol. 7, pp. 308-313, 1965.
    • (1965) The Computer Journal , vol.7 , pp. 308-313
    • Nelder, J.A.1    Mead, R.2
  • 16
    • 4744365298 scopus 로고    scopus 로고
    • Detection of hiding in the least significant bit
    • oct
    • O. Dabeer et al., "Detection of hiding in the least significant bit," IEEE Trans. Signal Process., vol. 52, no. 10, pp. 3046-3058, oct. 2004.
    • (2004) IEEE Trans. Signal Process , vol.52 , Issue.10 , pp. 3046-3058
    • Dabeer, O.1
  • 20
    • 0039947753 scopus 로고
    • Some generalizations of the theory of cumulative sums of random variable
    • A. Wald, "Some generalizations of the theory of cumulative sums of random variable," The Annals of Mathematical Statistics, pp. 287-293, 1945.
    • (1945) The Annals of Mathematical Statistics , pp. 287-293
    • Wald, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.