메뉴 건너뛰기




Volumn 9409, Issue , 2015, Pages

Phase-aware projection model for steganalysis of JPEG images

Author keywords

JPEG; PHARM; phase; projection; Steganalysis; steganography

Indexed keywords

ALGORITHMS; STEGANOGRAPHY;

EID: 84932150127     PISSN: 0277786X     EISSN: 1996756X     Source Type: Conference Proceeding    
DOI: 10.1117/12.2075239     Document Type: Conference Paper
Times cited : (126)

References (22)
  • 1
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system - The ins and outs of organizing BOSS
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Prague, Czech Republic, May 18-20
    • P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Information Hiding, 13th International Conference, Volume 6958 of Lecture Notes in Computer Science , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 2
    • 51749089283 scopus 로고    scopus 로고
    • JPEG image steganalysis utilizing both intrablock and interblock correlations
    • Seattle, WA, May, 18-21
    • C. Chen and Y. Q. Shi. JPEG image steganalysis utilizing both intrablock and interblock correlations. In Circuits and Systems, ISCAS 2008. IEEE International Symposium on, pages 3029-3032, Seattle, WA, May, 18-21, 2008.
    • (2008) Circuits and Systems, ISCAS 2008. IEEE International Symposium on , pp. 3029-3032
    • Chen, C.1    Shi, Y.Q.2
  • 4
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • J. Dittmann and J. Fridrich, editors, Dallas, TX, September 20-21
    • J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
    • (2007) Proceedings of the 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 7
    • 84880061681 scopus 로고    scopus 로고
    • Digital image steganography using universal distortion
    • W. Puech, M. Chaumont, J. Dittmann, and P. Campisi, editors, Montpellier, France, June 17-19
    • V. Holub and J. Fridrich. Digital image steganography using universal distortion. In W. Puech, M. Chaumont, J. Dittmann, and P. Campisi, editors, 1st ACM IH&MMSec. Workshop, Montpellier, France, June 17-19, 2013.
    • (2013) 1st ACM IH&MMSec. Workshop
    • Holub, V.1    Fridrich, J.2
  • 8
  • 9
    • 84900391883 scopus 로고    scopus 로고
    • Challenging the doctrines of JPEG steganography
    • A. Alattar, N. D. Memon, and C. Heitzenrater, editors, San Francisco, CA, February 2-6
    • V. Holub and J. Fridrich. Challenging the doctrines of JPEG steganography. In A. Alattar, N. D. Memon, and C. Heitzenrater, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, volume 9028, pages 02 1-8, San Francisco, CA, February 2-6, 2014.
    • (2014) Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014 , vol.9028 , pp. 1-8
    • Holub, V.1    Fridrich, J.2
  • 10
    • 84920768177 scopus 로고    scopus 로고
    • Low complexity features for JPEG steganalysis using undecimated DCT
    • February
    • V. Holub and J. Fridrich. Low complexity features for JPEG steganalysis using undecimated DCT. IEEE Transactions on Information Forensics and Security, 10(2):219-228, February 2015.
    • (2015) IEEE Transactions on Information Forensics and Security , vol.10 , Issue.2 , pp. 219-228
    • Holub, V.1    Fridrich, J.2
  • 14
    • 84858246718 scopus 로고    scopus 로고
    • Steganalysis of JPEG images using rich models
    • A. Alattar, N. D. Memon, and E. J. Delp, editors, San Francisco, CA, January 23-26
    • J. Kodovský and J. Fridrich. Steganalysis of JPEG images using rich models. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012, volume 8303, pages 0A 1-13, San Francisco, CA, January 23-26, 2012.
    • (2012) Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012 , vol.8303 , pp. 0A1-13
    • Kodovský, J.1    Fridrich, J.2
  • 16
    • 80054778699 scopus 로고    scopus 로고
    • Steganalysis of DCT-embedding based adaptive steganography and YASS
    • J. Dittmann, S. Craver, and C. Heitzenrater, editors, Niagara Falls, NY, September 29-30
    • Q. Liu. Steganalysis of DCT-embedding based adaptive steganography and YASS. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 77-86, Niagara Falls, NY, September 29-30, 2011.
    • (2011) Proceedings of the 13th ACM Multimedia & Security Workshop , pp. 77-86
    • Liu, Q.1
  • 17
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Alexandria, VA, July 10-12. Springer-Verlag, New York
    • Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249-264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
    • (2006) Information Hiding, 8th International Workshop, Volume 4437 of Lecture Notes in Computer Science , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3
  • 18
    • 84898049332 scopus 로고    scopus 로고
    • Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm
    • May
    • T. Thai, R. Cogranne, and F. Retraint. Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm. Image Processing, IEEE Transactions on, 23(5):1-14, May 2014.
    • (2014) Image Processing, IEEE Transactions on , vol.23 , Issue.5 , pp. 1-14
    • Thai, T.1    Cogranne, R.2    Retraint, F.3
  • 20
    • 84867591559 scopus 로고    scopus 로고
    • An efficient JPEG steganographic scheme based on the blockentropy of DCT coefficents
    • Kyoto, Japan, March 25-30
    • C. Wang and J. Ni. An efficient JPEG steganographic scheme based on the blockentropy of DCT coefficents. In Proc. of IEEE ICASSP, Kyoto, Japan, March 25-30, 2012.
    • (2012) Proc. of IEEE ICASSP
    • Wang, C.1    Ni, J.2
  • 21
    • 0005105932 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5 - A steganographic algorithm)
    • I. S. Moskowitz, editor, Pittsburgh, PA, April 25-27. Springer-Verlag, New York
    • A. Westfeld. High capacity despite better steganalysis (F5 - a steganographic algorithm). In I. S. Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 289-302, Pittsburgh, PA, April 25-27, 2001. Springer-Verlag, New York.
    • (2001) Information Hiding, 4th International Workshop, Volume 2137 of Lecture Notes in Computer Science , pp. 289-302
    • Westfeld, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.