메뉴 건너뛰기




Volumn 9409, Issue , 2015, Pages

Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL IMAGE STORAGE; GAUSSIAN DISTRIBUTION; LINEAR ALGEBRA; LINEAR EQUATIONS; MOBILE SECURITY;

EID: 84932126015     PISSN: 0277786X     EISSN: 1996756X     Source Type: Conference Proceeding    
DOI: 10.1117/12.2080272     Document Type: Conference Paper
Times cited : (110)

References (23)
  • 1
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system - The ins and outs of organizing BOSS
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Prague, Czech Republic, May 18-20
    • P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Information Hiding, 13th International Conference, Volume 6958 of Lecture Notes in Computer Science , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 4
    • 84887312389 scopus 로고    scopus 로고
    • Statistical detection of defects in radiographic images using an adaptive parametric model
    • R. Cogranne and F. Retraint. Statistical detection of defects in radiographic images using an adaptive parametric model. Signal Processing, 96-B(3):173-189, 2014.
    • (2014) Signal Processing , vol.96 B , Issue.3 , pp. 173-189
    • Cogranne, R.1    Retraint, F.2
  • 6
    • 80052987721 scopus 로고    scopus 로고
    • A cover image model for reliable steganalysis
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
    • R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, and P. Cornu. A cover image model for reliable steganalysis. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, Lecture Notes in Computer Science, pages 178-192, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Information Hiding, 13th International Conference , pp. 178-192
    • Cogranne, R.1    Zitzmann, C.2    Fillatre, L.3    Retraint, F.4    Nikiforov, I.5    Cornu, P.6
  • 8
    • 78149253209 scopus 로고    scopus 로고
    • Steganography using gibbs random fields
    • J. Dittmann, S. Craver, and P. Campisi, editors, Rome, Italy, September 9-10. ACM
    • T. Filler and J. Fridrich. Steganography using Gibbs random fields. In J. Dittmann, S. Craver, and P. Campisi, editors, Proceedings of the 12th ACM Multimedia & Security Workshop, pages 199-212, Rome, Italy, September 9-10, 2010. ACM.
    • (2010) Proceedings of the 12th ACM Multimedia & Security Workshop , pp. 199-212
    • Filler, T.1    Fridrich, J.2
  • 10
    • 70350562893 scopus 로고    scopus 로고
    • The square root law of steganographic capacity for markov covers
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Jose, CA, January 18-21
    • T. Filler, A. D. Ker, and J. Fridrich. The Square Root Law of steganographic capacity for Markov covers. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Media Forensics and Security, volume 7254, pages 08 1-11, San Jose, CA, January 18-21, 2009.
    • (2009) Proceedings SPIE, Electronic Imaging, Media Forensics and Security , vol.7254 , pp. 1-11
    • Filler, T.1    Ker, A.D.2    Fridrich, J.3
  • 12
    • 84889632364 scopus 로고    scopus 로고
    • Multivariate gaussian model for designing additive distortion for steganography
    • Vancouver, BC, May 26-31
    • J. Fridrich and J. Kodovský. Multivariate Gaussian model for designing additive distortion for steganography. In Proc. IEEE ICASSP, Vancouver, BC, May 26-31, 2013.
    • (2013) Proc. IEEE ICASSP
    • Fridrich, J.1    Kodovský, J.2
  • 22
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • R. Böhme and R. Safavi-Naini, editors, Calgary, Canada, June 28-30. Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Conference, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
    • (2010) Information Hiding, 12th International Conference, Volume 6387 of Lecture Notes in Computer Science , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 23
    • 84927741168 scopus 로고    scopus 로고
    • Adaptive steganalysis against WOW embedding algorithm
    • A. Uhl, S. Katzenbeisser, R. Kwitt, and A. Piva, editors, Salzburg, Austria, June 11-13
    • W. Tang, H. Li, W. Luo, and J. Huang. Adaptive steganalysis against WOW embedding algorithm. In A. Uhl, S. Katzenbeisser, R. Kwitt, and A. Piva, editors, 2nd ACM IH&MMSec. Workshop, Salzburg, Austria, June 11-13, 2014.
    • (2014) 2nd ACM IH&MMSec. Workshop
    • Tang, W.1    Li, H.2    Luo, W.3    Huang, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.