메뉴 건너뛰기




Volumn 10, Issue 2, 2015, Pages 219-228

Low-complexity features for JPEG steganalysis using undecimated DCT

Author keywords

[No Author keywords available]

Indexed keywords

IMAGE CODING; STEGANOGRAPHY;

EID: 84920768177     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2364918     Document Type: Article
Times cited : (425)

References (34)
  • 1
    • 0034775171 scopus 로고    scopus 로고
    • Steganalysis of watermarking techniques using image quality metrics
    • Jan
    • I. Avcibas, N. D. Memon, and B. Sankur, "Steganalysis of watermarking techniques using image quality metrics," Proc. SPIE, vol. 4314, pp. 523-531, Jan. 2001.
    • (2001) Proc. SPIE , vol.4314 , pp. 523-531
    • Avcibas, I.1    Memon, N.D.2    Sankur, B.3
  • 4
    • 56749107134 scopus 로고    scopus 로고
    • Weighted stego-image steganalysis for JPEG covers
    • Jun
    • R. Böhme, "Weighted stego-image steganalysis for JPEG covers," in Proc. 10th Int. Workshop Inf. Hiding, vol. 5284, pp. 178-194, Jun. 2007.
    • (2007) Proc. 10th Int. Workshop Inf. Hiding , vol.5284 , pp. 178-194
    • Böhme, R.1
  • 5
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • Aug
    • L. Breiman, "Bagging predictors," Mach. Learn., vol. 24, no. 2, pp. 123-140, Aug. 1996.
    • (1996) Mach. Learn. , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 6
  • 7
    • 84874590883 scopus 로고    scopus 로고
    • Application of hypothesis testing theory for optimal detection of LSB matching data hiding
    • Jul
    • R. Cogranne and F. Retraint, "Application of hypothesis testing theory for optimal detection of LSB matching data hiding," Signal Process., vol. 93, no. 7, pp. 1724-1737, Jul. 2013.
    • (2013) Signal Process. , vol.93 , Issue.7 , pp. 1724-1737
    • Cogranne, R.1    Retraint, F.2
  • 8
    • 35248846436 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistics and support vector machines
    • Oct
    • H. Farid and L. Siwei, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop Inf. Hiding, Oct. 2002, pp. 340-354.
    • (2002) Proc. 5th Int. Workshop Inf. Hiding , pp. 340-354
    • Farid, H.1    Siwei, L.2
  • 10
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun
    • J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 11
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
    • Sep
    • J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th ACM Multimedia Security Workshop, Sep. 2007, pp. 3-14.
    • (2007) Proc. 9th ACM Multimedia Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 13
    • 84888323613 scopus 로고    scopus 로고
    • Random projections of residuals for digital image steganalysis
    • Dec
    • V. Holub and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1996-2006, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 1996-2006
    • Holub, V.1    Fridrich, J.2
  • 14
    • 84894039003 scopus 로고    scopus 로고
    • Universal distortion design for steganography in an arbitrary domain
    • V. Holub and J. Fridrich, "Universal distortion design for steganography in an arbitrary domain," EURASIP J. Inf. Security, vol. 2014, no. 1, pp. 1-13, 2014.
    • (2014) EURASIP J. Inf. Security , vol.2014 , Issue.1 , pp. 1-13
    • Holub, V.1    Fridrich, J.2
  • 15
    • 84863942032 scopus 로고    scopus 로고
    • New channel selection rule for JPEG steganography
    • Aug
    • F. Huang, J. Huang, and Y.-Q. Shi, "New channel selection rule for JPEG steganography," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1181-1191, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1181-1191
    • Huang, F.1    Huang, J.2    Shi, Y.-Q.3
  • 16
    • 84900434217 scopus 로고    scopus 로고
    • Implementing the projected spatial rich features on a GPU
    • Feb
    • A. D. Ker, "Implementing the projected spatial rich features on a GPU," Proc. SPIE, vol. 9028, pp. 1801-1810, Feb. 2014.
    • (2014) Proc. SPIE , vol.9028 , pp. 1801-1810
    • Ker, A.D.1
  • 17
    • 84858188731 scopus 로고    scopus 로고
    • Identifying a steganographer in realistic and heterogeneous data sets
    • Jan
    • A. D. Ker and T. Pevný, "Identifying a steganographer in realistic and heterogeneous data sets," Proc. SPIE, vol. 8303, pp. 83030N-1-83030N-13, Jan. 2012.
    • (2012) Proc. SPIE , vol.8303 , pp. 83030N1-83030N13
    • Ker, A.D.1    Pevný, T.2
  • 19
    • 78649425529 scopus 로고    scopus 로고
    • Quantitative structural steganalysis of Jsteg
    • Dec
    • J. Kodovský and J. Fridrich, "Quantitative structural steganalysis of Jsteg," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 681-693, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 681-693
    • Kodovský, J.1    Fridrich, J.2
  • 20
    • 84858246718 scopus 로고    scopus 로고
    • Steganalysis of JPEG images using rich models
    • Jan
    • J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, pp. 83030A-1-83030A-13, Jan. 2012.
    • Proc. SPIE , vol.8303 , Issue.2012 , pp. 83030A1-83030A13
    • Kodovský, J.1    Fridrich, J.2
  • 21
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • Apr
    • J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 432-444
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 22
    • 84878432433 scopus 로고    scopus 로고
    • A cost-effective decision tree based approach to steganalysis
    • Feb
    • L. Li, H. T. Sencar, and N. Memon, "A cost-effective decision tree based approach to steganalysis," Proc. SPIE, vol. 8665, pp. 86650P-1-86650P-7, Feb. 2013.
    • (2013) Proc. SPIE , vol.8665 , pp. 86650P1-86650P7
    • Li, L.1    Sencar, H.T.2    Memon, N.3
  • 23
    • 80054778699 scopus 로고    scopus 로고
    • Steganalysis of DCT-embedding based adaptive steganography and YASS
    • Sep
    • Q. Liu, "Steganalysis of DCT-embedding based adaptive steganography and YASS," in Proc. 13th ACM Multimedia Security Workshop, Sep. 2011, pp. 77-86.
    • (2011) Proc. 13th ACM Multimedia Security Workshop , pp. 77-86
    • Liu, Q.1
  • 24
    • 84925137351 scopus 로고    scopus 로고
    • Improved approaches to steganalysis and seamcarved forgery detection in JPEG images
    • Q. Liu and Z. Chen, "Improved approaches to steganalysis and seamcarved forgery detection in JPEG images," ACM Trans. Intell. Syst. Tech. Syst., vol. 5, no. 4, pp. 39:1-39:30, 2014.
    • (2014) ACM Trans. Intell. Syst. Tech. Syst. , vol.5 , Issue.4 , pp. 391-3930
    • Liu, Q.1    Chen, Z.2
  • 25
    • 84858252960 scopus 로고    scopus 로고
    • Going from small to large data in steganalysis
    • Jan
    • I. Lubenko and A. D. Ker, "Going from small to large data in steganalysis," Proc. SPIE, vol. 8303, pp. 83030M-1-83030M-10, Jan. 2012.
    • (2012) Proc. SPIE , vol.8303 , pp. 83030M1-83030M10
    • Lubenko, I.1    Ker, A.D.2
  • 26
    • 33644999904 scopus 로고    scopus 로고
    • Steganalysis using higher-order image statistics
    • Mar
    • S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
    • (2006) IEEE Trans. Inf. Forensics Security , vol.1 , Issue.1 , pp. 111-119
    • Lyu, S.1    Farid, H.2
  • 27
    • 34548232251 scopus 로고    scopus 로고
    • Merging Markov and DCT features for multi-class JPEG steganalysis
    • Feb
    • T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," Proc. SPIE, vol. 6505, pp. 650503-1-650503-14, Feb. 2007.
    • (2007) Proc. SPIE , vol.6505 , pp. 6505031-65050314
    • Pevný, T.1    Fridrich, J.2
  • 29
    • 38049166461 scopus 로고    scopus 로고
    • A markov process based approach to effective attacking JPEG steganography
    • Jul
    • Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int. Workshop Inf. Hiding, Jul. 2006, pp. 249-264.
    • (2006) Proc. 8th Int. Workshop Inf. Hiding , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 30
    • 84898049332 scopus 로고    scopus 로고
    • Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm
    • May
    • T. H. Thai, R. Cogranne, and F. Retraint, "Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm," IEEE Trans. Image Process., vol. 23, no. 5, pp. 1980-1993, May 2014.
    • (2014) IEEE Trans. Image Process. , vol.23 , Issue.5 , pp. 1980-1993
    • Thai, T.H.1    Cogranne, R.2    Retraint, F.3
  • 31
    • 85099425940 scopus 로고    scopus 로고
    • Generic adoption of spatial steganalysis to transformed domain
    • Jun
    • A. Westfeld, "Generic adoption of spatial steganalysis to transformed domain," in Proc. 10th Int. Workshop Inf. Hiding, Jun. 2007, pp. 161-177.
    • (2007) Proc. 10th Int. Workshop Inf. Hiding , pp. 161-177
    • Westfeld, A.1
  • 33
    • 0038675417 scopus 로고    scopus 로고
    • A fast and effective steganalytic technique against JSteg-like algorithms
    • Mar
    • T. Zhang and X. Ping, "A fast and effective steganalytic technique against JSteg-like algorithms," in Proc. ACM Symp. Appl. Comput., Melbourne, FL, USA, Mar. 2003, pp. 307-311.
    • (2003) Proc ACM Symp. Appl. Comput., Melbourne, FL, USA , pp. 307-311
    • Zhang, T.1    Ping, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.