메뉴 건너뛰기




Volumn 10, Issue 12, 2015, Pages 2627-2642

Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory

Author keywords

ensemble classifier; Hypothesis testing theory; information hiding; multi class classification; optimal detection

Indexed keywords

ARTIFICIAL INTELLIGENCE; CLASSIFIERS; IMAGE PROCESSING; LEARNING SYSTEMS; STATISTICAL TESTS; STEGANOGRAPHY;

EID: 84943746941     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2470220     Document Type: Article
Times cited : (65)

References (48)
  • 1
    • 84894039003 scopus 로고    scopus 로고
    • Universal distortion function for steganography in an arbitrary domain
    • V. Holub, J. Fridrich, and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP J. Inf. Secur., vol. 2014, no. 1, pp. 1-13, 2014.
    • (2014) EURASIP J. Inf. Secur. , vol.2014 , Issue.1 , pp. 1-13
    • Holub, V.1    Fridrich, J.2    Denemark, T.3
  • 2
    • 84880060316 scopus 로고    scopus 로고
    • Moving steganography and steganalysis from the laboratory into the real world
    • A. D. Ker et al., "Moving steganography and steganalysis from the laboratory into the real world," in Proc. 1st ACM Workshop Inf. Hiding Multimedia Secur. (IH&MMSec), 2013, pp. 45-58.
    • (2013) Proc. 1st ACM Workshop Inf. Hiding Multimedia Secur. (IH&MMSec) , pp. 45-58
    • Ker, A.D.1
  • 4
    • 80052987721 scopus 로고    scopus 로고
    • A cover image model for reliable steganalysis
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • R. Cogranne, C. Zitzmann, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu, "A cover image model for reliable steganalysis," in Information Hiding (Lecture Notes in Computer Science), vol. 6958. Berlin, Germany: Springer-Verlag, 2011, pp. 178-192.
    • (2011) Information Hiding , vol.6958 , pp. 178-192
    • Cogranne, R.1    Zitzmann, C.2    Fillatre, L.3    Nikiforov, I.4    Retraint, F.5    Cornu, P.6
  • 5
    • 80053026542 scopus 로고    scopus 로고
    • Statistical decision methods in hidden information detection
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, "Statistical decision methods in hidden information detection," in Information Hiding (Lecture Notes in Computer Science), vol. 6958. Berlin, Germany: Springer-Verlag, 2011, pp. 163-177.
    • (2011) Information Hiding , vol.6958 , pp. 163-177
    • Zitzmann, C.1    Cogranne, R.2    Retraint, F.3    Nikiforov, I.4    Fillatre, L.5    Cornu, P.6
  • 6
    • 84894239822 scopus 로고    scopus 로고
    • A local adaptive model of natural images for almost optimal detection of hidden data
    • Jul.
    • R. Cogranne, C. Zitzmann, F. Retraint, I. V. Nikiforov, P. Cornu, and L. Fillatre, "A local adaptive model of natural images for almost optimal detection of hidden data," Signal Process., vol. 100, pp. 169-185, Jul. 2014.
    • (2014) Signal Process. , vol.100 , pp. 169-185
    • Cogranne, R.1    Zitzmann, C.2    Retraint, F.3    Nikiforov, I.V.4    Cornu, P.5    Fillatre, L.6
  • 7
    • 84891310555 scopus 로고    scopus 로고
    • Statistical detection of data hidden in least significant bits of clipped images
    • May
    • T. H. Thai, F. Retraint, and R. Cogranne, "Statistical detection of data hidden in least significant bits of clipped images," Signal Process., vol. 98, pp. 263-274, May 2014.
    • (2014) Signal Process. , vol.98 , pp. 263-274
    • Thai, T.H.1    Retraint, F.2    Cogranne, R.3
  • 8
    • 84873683899 scopus 로고    scopus 로고
    • An asymptotically uniformly most powerful test for LSB matching detection
    • Mar.
    • R. Cogranne and F. Retraint, "An asymptotically uniformly most powerful test for LSB matching detection," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 464-476, Mar. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 464-476
    • Cogranne, R.1    Retraint, F.2
  • 10
    • 84898049332 scopus 로고    scopus 로고
    • Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm
    • May
    • T. H. Thai, R. Cogranne, and F. Retraint, "Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm," IEEE Trans. Image Process., vol. 23, no. 5, pp. 1980-1993, May 2014.
    • (2014) IEEE Trans. Image Process. , vol.23 , Issue.5 , pp. 1980-1993
    • Thai, T.H.1    Cogranne, R.2    Retraint, F.3
  • 11
    • 0036452586 scopus 로고    scopus 로고
    • Detecting hidden messages using higher-order statistical models
    • Sep.
    • H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. IEEE Int. Conf. Image Process., vol. 2. Sep. 2002, pp. II-905-II-908.
    • (2002) Proc. IEEE Int. Conf. Image Process. , vol.2 , pp. 905-908
    • Farid, H.1
  • 12
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun.
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 14
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • Apr.
    • J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 432-444
    • Kodovsky, J.1    Fridrich, J.2    Holub, V.3
  • 15
    • 56749170425 scopus 로고    scopus 로고
    • Multiclass detector of current steganographic methods for JPEG format
    • Dec.
    • T. Pevný and J. Fridrich, "Multiclass detector of current steganographic methods for JPEG format," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 635-650, Dec. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.4 , pp. 635-650
    • Pevný, T.1    Fridrich, J.2
  • 17
    • 84932126015 scopus 로고    scopus 로고
    • Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model
    • Mar.
    • V. Sedighi, J. Fridrich, and R. Cogranne, "Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model," Proc. SPIE, vol. 9409, p. 94090H, Mar. 2015.
    • (2015) Proc. SPIE , vol.9409 , pp. 94090H
    • Sedighi, V.1    Fridrich, J.2    Cogranne, R.3
  • 19
    • 32944455697 scopus 로고    scopus 로고
    • Similarity-based online feature selection in content-based image retrieval
    • Mar.
    • W. Jiang, G. Er, Q. Dai, and J. Gu, "Similarity-based online feature selection in content-based image retrieval," IEEE Trans. Image Process., vol. 15, no. 3, pp. 702-712, Mar. 2006.
    • (2006) IEEE Trans. Image Process , vol.15 , Issue.3 , pp. 702-712
    • Jiang, W.1    Er, G.2    Dai, Q.3    Gu, J.4
  • 20
    • 68149125478 scopus 로고    scopus 로고
    • Hierarchical ensemble of global and local classifiers for face recognition
    • Aug.
    • Y. Su, S. Shan, X. Chen, and W. Gao, "Hierarchical ensemble of global and local classifiers for face recognition," IEEE Trans. Image Process., vol. 18, no. 8, pp. 1885-1896, Aug. 2009.
    • (2009) IEEE Trans. Image Process , vol.18 , Issue.8 , pp. 1885-1896
    • Su, Y.1    Shan, S.2    Chen, X.3    Gao, W.4
  • 21
    • 40849134401 scopus 로고    scopus 로고
    • Integrating concept ontology and multitask learning to achieve more effective classifier training for multilevel image annotation
    • Mar.
    • J. Fan, Y. Gao, and H. Luo, "Integrating concept ontology and multitask learning to achieve more effective classifier training for multilevel image annotation," IEEE Trans. Image Process., vol. 17, no. 3, pp. 407-426, Mar. 2008.
    • (2008) IEEE Trans. Image Process , vol.17 , Issue.3 , pp. 407-426
    • Fan, J.1    Gao, Y.2    Luo, H.3
  • 22
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system: The ins and outs of organizing BOSS
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • P. Bas, T. Filler, and T. Pevný, "'Break our steganographic system': The ins and outs of organizing BOSS," in Information Hiding (Lecture Notes in Computer Science), vol. 6958. Berlin, Germany: Springer-Verlag, 2011, pp. 59-70.
    • (2011) Information Hiding , vol.6958 , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 28
    • 84875866796 scopus 로고    scopus 로고
    • Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features
    • Sep./Oct.
    • M. Chaumont and S. Kouider, "Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features," in Proc. IEEE Int. Conf. Image Process. (ICIP), Sep./Oct. 2012, pp. 1133-1136.
    • (2012) Proc. IEEE Int. Conf. Image Process. (ICIP) , pp. 1133-1136
    • Chaumont, M.1    Kouider, S.2
  • 29
    • 38049111044 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • A. D. Ker, "Batch steganography and pooled steganalysis," in Information Hiding (Lecture Notes in Computer Science), vol. 4437. Berlin, Germany: Springer-Verlag, 2007, pp. 265-281.
    • (2007) Information Hiding , vol.4437 , pp. 265-281
    • Ker, A.D.1
  • 31
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • (Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 6387. Berlin, Germany: Springer-Verlag, 2010, pp. 161-177.
    • (2010) Information Hiding , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 32
    • 78149255931 scopus 로고    scopus 로고
    • Gibbs construction in steganography
    • Dec.
    • T. Filler and J. Fridrich, "Gibbs construction in steganography," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 705-720
    • Filler, T.1    Fridrich, J.2
  • 34
    • 79954485517 scopus 로고    scopus 로고
    • Detecting messages of unknown length
    • Feb.
    • T. Pevný, "Detecting messages of unknown length," Proc. SPIE, vol. 7880, p. 78800T, Feb. 2014.
    • (2014) Proc. SPIE , vol.7880 , pp. 78800T
    • Pevný, T.1
  • 38
    • 84900445103 scopus 로고    scopus 로고
    • A mishmash of methods for mitigating the model mismatch mess
    • Feb.
    • A. D. Ker and T. Pevný, "A mishmash of methods for mitigating the model mismatch mess," Proc. SPIE, vol. 9028, pp. 90280I-1-90280I-14, Feb. 2014.
    • (2014) Proc. SPIE , vol.9028 , pp. 1-14
    • Ker, A.D.1    Pevný, T.2
  • 39
    • 0029308861 scopus 로고
    • Optimal simultaneous detection and estimation under a false alarm constraint
    • May
    • B. Baygün and A. O. Hero, III, "Optimal simultaneous detection and estimation under a false alarm constraint," IEEE Trans. Inf. Theory, vol. 41, no. 3, pp. 688-703, May 1995.
    • (1995) IEEE Trans. Inf. Theory , vol.41 , Issue.3 , pp. 688-703
    • Baygün, B.1    Hero, A.O.2
  • 40
    • 0036926244 scopus 로고    scopus 로고
    • Computing multivariate normal probabilities: A new look
    • H. Gassmann, I. Deák, and T. Szántai, "Computing multivariate normal probabilities: A new look," J. Comput. Graph. Statist., vol. 11, no. 4, pp. 920-949, 2002.
    • (2002) J. Comput. Graph. Statist. , vol.11 , Issue.4 , pp. 920-949
    • Gassmann, H.1    Deák, I.2    Szántai, T.3
  • 42
    • 0000238336 scopus 로고
    • A simplex method for function minimization
    • J. A. Nelder and R. Mead, "A simplex method for function minimization," Comput. J., vol. 7, no. 4, pp. 308-313, 1965.
    • (1965) Comput. J. , vol.7 , Issue.4 , pp. 308-313
    • Nelder, J.A.1    Mead, R.2
  • 43
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun.
    • J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 47
    • 84867591559 scopus 로고    scopus 로고
    • An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients
    • Mar.
    • C. Wang and J. Ni, "An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Mar. 2012, pp. 1785-1788.
    • (2012) Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP) , pp. 1785-1788
    • Wang, C.1    Ni, J.2
  • 48
    • 84858246718 scopus 로고    scopus 로고
    • Steganalysis of JPEG images using rich models
    • Feb.
    • J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, pp. 83030A-1-83030A-13, Feb. 2012.
    • (2012) Proc. SPIE , vol.8303 , pp. 1-13
    • Kodovský, J.1    Fridrich, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.