메뉴 건너뛰기




Volumn 9, Issue 8, 2014, Pages 1264-1277

Investigation on cost assignment in spatial image steganography

Author keywords

[No Author keywords available]

Indexed keywords

STEGANOGRAPHY;

EID: 84904685564     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2326954     Document Type: Article
Times cited : (163)

References (44)
  • 4
    • 84880060316 scopus 로고    scopus 로고
    • Moving steganography and steganalysis from the laboratory into the real world
    • A. D. Ker et al., "Moving steganography and steganalysis from the laboratory into the real world," in Proc. 1st ACM Workshop Inform. Hiding Multimedia Security, 2013, pp. 45-58.
    • (2013) Proc. 1st ACM Workshop Inform. Hiding Multimedia Security , pp. 45-58
    • Ker, A.D.1
  • 5
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Berlin, Germany: Springer-Verlag
    • C. Cachin, "An information-theoretic model for steganography," in Information Hiding (Lecture Notes in Computer Science) vol. 1525. Berlin, Germany: Springer-Verlag, 1998, pp. 306-318.
    • (1998) Information Hiding (Lecture Notes in Computer Science) , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 6
    • 56749152307 scopus 로고    scopus 로고
    • Benchmarking for steganography
    • Information Hiding Berlin, Germany: Springer-Verlag
    • T. Pevný and J. Fridrich, "Benchmarking for steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 5284. Berlin, Germany: Springer-Verlag, 2008, pp. 251-267.
    • (2008) Lecture Notes in Computer Science , vol.5284 , pp. 251-267
    • Pevný, T.1    Fridrich, J.2
  • 8
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Feb.
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Feb. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 9
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun.
    • J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 10
    • 84878455879 scopus 로고    scopus 로고
    • Random projections of residuals as an alternative to co-occurrences in steganalysis
    • Mar.
    • V. Holub, J. Fridrich, and T. Denemark, "Random projections of residuals as an alternative to co-occurrences in steganalysis," Proc. SPIE, vol. 8665, p. 86650L, Mar. 2013.
    • (2013) Proc. SPIE , vol.8665
    • Holub, V.1    Fridrich, J.2    Denemark, T.3
  • 11
    • 84883172225 scopus 로고    scopus 로고
    • A novel mapping scheme for steganalysis
    • Digital Forensics and Watermaking Berlin, Germany: Springer-Verlag
    • L. Chen, Y. Q. Shi, P. Sutthiwan, and X. Niu, "A novel mapping scheme for steganalysis," in Digital Forensics and Watermaking (Lecture Notes in Computer Science), vol. 7809. Berlin, Germany: Springer-Verlag, 2013, pp. 19-33.
    • (2013) Lecture Notes in Computer Science , vol.7809 , pp. 19-33
    • Chen, L.1    Shi, Y.Q.2    Sutthiwan, P.3    Niu, X.4
  • 12
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX, 2001, pp. 323-335.
    • (2001) Proc. 10th USENIX , pp. 323-335
    • Provos, N.1
  • 13
    • 84937814312 scopus 로고    scopus 로고
    • F5-A steganographic algorithm
    • Information Hiding Berlin, Germany: Springer-Verlag
    • A. Westfeld, "F5-A steganographic algorithm," in Information Hiding (Lecture Notes in Computer Science), vol. 2137. Berlin, Germany: Springer-Verlag, 2001, pp. 289-302.
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 14
    • 35048819204 scopus 로고    scopus 로고
    • Model-Based Steganography
    • P. Sallee, "Model-based steganography," in Digital Watermarking (Lecture Notes in Computer Science), vol. 2939. Berlin, Germany: Springer-Verlag, 2003, pp. 154-167. (Pubitemid 38334550)
    • (2003) Lecture Notes In Computer Science , Issue.2939 , pp. 154-167
    • Sallee, P.1
  • 15
    • 21144432330 scopus 로고    scopus 로고
    • Steganography with least histogram abnormality
    • Computer Network Security Berlin, Germany: Springer-Verlag
    • X. Zhang, S. Wang, and K. Zhang, "Steganography with least histogram abnormality," in Computer Network Security (Lecture Notes in Computer Science), vol. 2776. Berlin, Germany: Springer-Verlag, 2003, pp. 395-406.
    • (2003) Lecture Notes in Computer Science , vol.2776 , pp. 395-406
    • Zhang, X.1    Wang, S.2    Zhang, K.3
  • 16
    • 34547514532 scopus 로고    scopus 로고
    • Secure steganography: Statistical restoration of the second order dependencies for improved security
    • Apr.
    • A. Sarkar, K. Solanki, U. Madhow, S. Chandrasekaran, and B. Manjunath, "Secure steganography: Statistical restoration of the second order dependencies for improved security," in Proc. IEEE ICASSP, vol. 2. Apr. 2007, pp. 277-280.
    • (2007) Proc. IEEE ICASSP , vol.2 , pp. 277-280
    • Sarkar, A.1    Solanki, K.2    Madhow, U.3    Chandrasekaran, S.4    Manjunath, B.5
  • 18
    • 79954489095 scopus 로고    scopus 로고
    • Feature restoration and distortion metrics
    • Jul.
    • V. K. Chonev and A. D. Ker, "Feature restoration and distortion metrics," Proc. SPIE, vol. 7880, pp. 0G01-0G14, Jul. 2011.
    • (2011) Proc. SPIE , vol.7880
    • Chonev, V.K.1    Ker, A.D.2
  • 19
    • 34548216307 scopus 로고    scopus 로고
    • Practical methods for minimizing embedding impact in steganography
    • Jun.
    • J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography," Proc. SPIE, vol. 6505, pp. 0201-0215, Jun. 2007.
    • (2007) Proc. SPIE , vol.6505 , pp. 0201-0215
    • Fridrich, J.1    Filler, T.2
  • 20
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Berlin, Germany: Springer-Verlag
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 6387. Berlin, Germany: Springer-Verlag, 2010, pp. 161-177.
    • (2010) Information Hiding (Lecture Notes in Computer Science) , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 21
    • 78149255931 scopus 로고    scopus 로고
    • Gibbs construction in steganography
    • Dec.
    • T. Filler and J. Fridrich, "Gibbs construction in steganography," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 705-720
    • Filler, T.1    Fridrich, J.2
  • 22
    • 84863942032 scopus 로고    scopus 로고
    • New channel selection rule for JPEG steganography
    • Aug.
    • F. Huang, J. Huang, and Y.-Q. Shi, "New channel selection rule for JPEG steganography," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1181-1191, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1181-1191
    • Huang, F.1    Huang, J.2    Shi, Y.-Q.3
  • 24
    • 84874034720 scopus 로고    scopus 로고
    • Designing steganographic distortion using directional filters
    • Aug.
    • V. Holub and J. J. Fridrich, "Designing steganographic distortion using directional filters," in Proc. IEEE Workshop Inf. Forensic Security, Aug. 2012, pp. 234-239.
    • (2012) Proc. IEEE Workshop Inf. Forensic Security , pp. 234-239
    • Holub, V.1    Fridrich, J.J.2
  • 26
    • 84889632364 scopus 로고    scopus 로고
    • Multivariate Gaussian model for designing additive distortion for steganography
    • May
    • J. Fridrich and J. Kodovský, "Multivariate Gaussian model for designing additive distortion for steganography," in Proc. IEEE ICASSP, May 2013, pp. 2949-2953.
    • (2013) Proc. IEEE ICASSP , pp. 2949-2953
    • Fridrich, J.1    Kodovský, J.2
  • 27
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • Berlin, Germany: Springer-Verlag
    • Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 4437. Berlin, Germany: Springer-Verlag, 2007, pp. 314-327.
    • (2007) Information Hiding (Lecture Notes in Computer Science) , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 29
    • 77949520885 scopus 로고    scopus 로고
    • Near-optimal codes for information embedding in gray-scale signals
    • Mar.
    • W. Zhang, X. Zhang, and S. Wang, "Near-optimal codes for information embedding in gray-scale signals," IEEE Trans. Inf. Theory, vol. 56, no. 3, pp. 1262-1270, Mar. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.3 , pp. 1262-1270
    • Zhang, W.1    Zhang, X.2    Wang, S.3
  • 30
    • 80051709471 scopus 로고    scopus 로고
    • Minimizing additive distortion in steganography using syndrome-trellis codes
    • Mar.
    • T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920-935, Mar. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 920-935
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 31
    • 70350440358 scopus 로고    scopus 로고
    • Estimating steganographic Fisher information in real images
    • Information Hiding Berlin, Germany: Springer-Verlag
    • A. D. Ker, "Estimating steganographic Fisher information in real images," in Information Hiding (Lecture Notes in Computer Science), vol. 5806. Berlin, Germany: Springer-Verlag, 2009, pp. 73-88.
    • (2009) Lecture Notes in Computer Science , vol.5806 , pp. 73-88
    • Ker, A.D.1
  • 32
    • 70350445582 scopus 로고    scopus 로고
    • Fisher information determines capacity of secure steganography
    • Information Hiding Berlin, Germany: Springer-Verlag
    • T. Filler and J. Fridrich, "Fisher information determines capacity of secure steganography," in Information Hiding, (Lecture Notes in Computer Science), vol. 5806. Berlin, Germany: Springer-Verlag, 2009, pp. 31-47.
    • (2009) Lecture Notes in Computer Science , vol.5806 , pp. 31-47
    • Filler, T.1    Fridrich, J.2
  • 33
    • 0037854454 scopus 로고    scopus 로고
    • The duality between information embedding and source coding with side information and some applications
    • May
    • R. Barron, B. Chen, and G. W. Wornell, "The duality between information embedding and source coding with side information and some applications," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1159-1180, May 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.5 , pp. 1159-1180
    • Barron, R.1    Chen, B.2    Wornell, G.W.3
  • 34
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system: The ins and outs of organizing BOSS
    • Information Hiding Berlin, Germany: Springer-Verlag
    • P. Bas, T. Filler, and T. Pevný, "'Break our steganographic system': The ins and outs of organizing BOSS," in Information Hiding (Lecture Notes in Computer Science), vol. 6958. Berlin, Germany: Springer-Verlag, 2011, pp. 59-70.
    • (2011) Lecture Notes in Computer Science , vol.6958 , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 35
    • 33645814428 scopus 로고    scopus 로고
    • LSB matching revisited
    • May
    • J. Mielikainen, "LSB matching revisited," IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285-287, May 2006.
    • (2006) IEEE Signal Process. Lett. , vol.13 , Issue.5 , pp. 285-287
    • Mielikainen, J.1
  • 36
    • 47349094397 scopus 로고    scopus 로고
    • Efficient steganographic embedding by exploiting modification direction
    • Nov.
    • X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Lett., vol. 10, no. 11, pp. 781-783, Nov. 2006.
    • (2006) IEEE Commun. Lett. , vol.10 , Issue.11 , pp. 781-783
    • Zhang, X.1    Wang, S.2
  • 40
    • 84904695227 scopus 로고    scopus 로고
    • Improved steganographic embedding using feature restoration
    • Oxford, U.K., Tech. Rep.
    • V. K. Chonev, "Improved steganographic embedding using feature restoration," Oxford Univ. Comput. Lab., Oxford, U.K., Tech. Rep., 2010.
    • (2010) Oxford Univ. Comput. Lab.
    • Chonev, V.K.1
  • 42
    • 42949088538 scopus 로고    scopus 로고
    • Revisiting weighted stego-image steganalysis
    • Mar.
    • A. D. Ker and R. Bohme, "Revisiting weighted stego-image steganalysis," Proc. SPIE, vol. 6819, pp. 05-1-05-17, Mar. 2008.
    • (2008) Proc. SPIE , vol.6819 , pp. 051-0517
    • Ker, A.D.1    Bohme, R.2
  • 43
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • Jul.
    • J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Jul. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 432-444
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 44
    • 84858225018 scopus 로고    scopus 로고
    • Optimizing pixel predictors for steganalysis
    • Feb.
    • V. Holub and J. Fridrich, "Optimizing pixel predictors for steganalysis," Proc. SPIE, vol. 8303, pp. 0901-0913, Feb. 2012.
    • (2012) Proc. SPIE , vol.8303 , pp. 0901-0913
    • Holub, V.1    Fridrich, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.