메뉴 건너뛰기




Volumn 11, Issue 4, 2016, Pages 734-744

Adaptive steganalysis based on embedding probabilities of pixels

Author keywords

Adaptive steganalysis; Adaptive steganography; Embedding probabilities; Re embedding

Indexed keywords

FEATURE EXTRACTION; PROBABILITY; STEGANOGRAPHY;

EID: 84959219306     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2507159     Document Type: Article
Times cited : (97)

References (29)
  • 1
    • 84892764719 scopus 로고    scopus 로고
    • Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-tools- and some lessons learned
    • Dresden, Germany, Sep.
    • A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-tools- and some lessons learned, " in Proc. 3rd Int. Workshop Inf. Hiding, vol. 1768. Dresden, Germany, Sep. 1999, pp. 61-76.
    • (1999) Proc. 3rd Int. Workshop Inf. Hiding , vol.1768 , pp. 61-76
    • Westfeld, A.1    Pfitzmann, A.2
  • 2
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system': The ins and outs of organizing BOSS
    • Prague, Czech Republic, May
    • P. Bas, T. Filler, and T. Pevný, "'Break our steganographic system': The ins and outs of organizing BOSS, " in Proc. 13th Int. Workshop Inf. Hiding, vol. 6958. Prague, Czech Republic, May 2011, pp. 59-70.
    • (2011) Proc. 13th Int. Workshop Inf. Hiding , vol.6958 , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 3
    • 0037410595 scopus 로고    scopus 로고
    • A steganographic method for images by pixel-value differencing
    • Jun.
    • D.-C. Wu and W.-H. Tsai, "A steganographic method for images by pixel-value differencing, " Pattern Recognit. Lett., vol. 24, pp. 1613-1626, Jun. 2003.
    • (2003) Pattern Recognit. Lett. , vol.24 , pp. 1613-1626
    • Wu, D.-C.1    Tsai, W.-H.2
  • 4
    • 34247562352 scopus 로고    scopus 로고
    • Steganalysis based on Markov model of thresholded prediction-error image
    • Toronto, ON, Canada, Jul.
    • D. Zou, Y. Q. Shi, W. Su, and G. Xuan, "Steganalysis based on Markov model of thresholded prediction-error image, " in Proc. IEEE Int. Conf. Multimedia Expo, Toronto, ON, Canada, Jul. 2006, pp. 1365-1368.
    • (2006) Proc. IEEE Int. Conf. Multimedia Expo , pp. 1365-1368
    • Zou, D.1    Shi, Y.Q.2    Su, W.3    Xuan, G.4
  • 5
    • 34548216307 scopus 로고    scopus 로고
    • Practical methods for minimizing embedding impact in steganography
    • Jan.
    • J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography, " Proc. SPIE, vol. 6505, pp. 650502-1-650502-15, Jan. 2007.
    • (2007) Proc. SPIE , vol.6505 , pp. 6505021-65050215
    • Fridrich, J.1    Filler, T.2
  • 6
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun.
    • J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 7
    • 80052990656 scopus 로고    scopus 로고
    • A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO)
    • Prague, Czech Republic, May
    • G. Gul and F. Kurugollu, "A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO), " in Proc. 13th Int. Workshop Inf. Hiding, vol. 6958. Prague, Czech Republic, May 2011, pp. 71-84.
    • (2011) Proc. 13th Int. Workshop Inf. Hiding , vol.6958 , pp. 71-84
    • Gul, G.1    Kurugollu, F.2
  • 9
    • 84894039003 scopus 로고    scopus 로고
    • Universal distortion function for steganography in an arbitrary domain
    • V. Holub, J. Fridrich, and T. Denemark, "Universal distortion function for steganography in an arbitrary domain, " EURASIP J. Inf. Secur., vol. 2014, no. 1, pp. 1-13, 2014.
    • (2014) EURASIP J. Inf. Secur. , vol.2014 , Issue.1 , pp. 1-13
    • Holub, V.1    Fridrich, J.2    Denemark, T.3
  • 10
    • 0034787093 scopus 로고    scopus 로고
    • Reliable detection of LSB steganography in color and grayscale images
    • Oct.
    • J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in color and grayscale images, " in Proc. ACM Workshop Multimedia Secur., Oct. 2001, pp. 27-30.
    • (2001) Proc. ACM Workshop Multimedia Secur. , pp. 27-30
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 11
    • 84858246718 scopus 로고    scopus 로고
    • Steganalysis of JPEG images using rich models
    • Feb.
    • J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models, " Proc. SPIE, vol. 8303, pp. 83030A-1-83030A-13, Feb. 2012.
    • (2012) Proc. SPIE , vol.8303 , pp. 83030A1-83030A13
    • Kodovský, J.1    Fridrich, J.2
  • 12
    • 84900455270 scopus 로고    scopus 로고
    • Study of cover source mismatch in steganalysis and ways to mitigate its impact
    • Feb.
    • J. Kodovský, V. Sedighi, and J. Fridrich, "Study of cover source mismatch in steganalysis and ways to mitigate its impact, " Proc. SPIE, vol. 9028, pp. 90280J-1-90280J-12, Feb. 2014.
    • (2014) Proc. SPIE , vol.9028 , pp. 90280J1-90280J12
    • Kodovský, J.1    Sedighi, V.2    Fridrich, J.3
  • 13
    • 33645814428 scopus 로고    scopus 로고
    • LSB matching revisited
    • May
    • J. Mielikainen, "LSB matching revisited, " IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285-287, May 2006.
    • (2006) IEEE Signal Process. Lett. , vol.13 , Issue.5 , pp. 285-287
    • Mielikainen, J.1
  • 14
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • Apr.
    • J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 432-444
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 15
    • 84899516063 scopus 로고    scopus 로고
    • Uniform embedding for efficient JPEG steganography
    • May
    • L. Guo, J. Ni, and Y. Q. Shi, "Uniform embedding for efficient JPEG steganography, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 814-825, May 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.5 , pp. 814-825
    • Guo, L.1    Ni, J.2    Shi, Y.Q.3
  • 16
    • 84932163348 scopus 로고    scopus 로고
    • Predictable rain? Steganalysis of public-key steganography using wet paper codes
    • Salzburg, Austria, Jun.
    • M. Carnein, P. Schöttle, and R. Böhme, "Predictable rain? Steganalysis of public-key steganography using wet paper codes, " in Proc. 2nd ACM Workshop Inf. Hiding Multimedia Secur., Salzburg, Austria, Jun. 2014, pp. 97-108.
    • (2014) Proc. 2nd ACM Workshop Inf. Hiding Multimedia Secur. , pp. 97-108
    • Carnein, M.1    Schöttle, P.2    Böhme, R.3
  • 17
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Calgary, AB, Canada, Jun.
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography, " in Proc. 12th Int. Workshop Inf. Hiding, vol. 6387. Calgary, AB, Canada, Jun. 2010, pp. 161-177.
    • (2010) Proc. 12th Int. Workshop Inf. Hiding , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 18
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun.
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix, " IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 19
    • 84874399529 scopus 로고    scopus 로고
    • A game-theoretic approach to contentadaptive steganography
    • Berkeley, CA, USA, May
    • P. Schöttle and R. Böhme, "A game-theoretic approach to contentadaptive steganography, " in Proc. 14th Int. Workshop Inf. Hiding, vol. 7692. Berkeley, CA, USA, May 2012, pp. 125-141.
    • (2012) Proc. 14th Int. Workshop Inf. Hiding , vol.7692 , pp. 125-141
    • Schöttle, P.1    Böhme, R.2
  • 20
    • 84874090897 scopus 로고    scopus 로고
    • Weighted stego-image steganalysis for naive content-adaptive embedding
    • Tenerife, Spain, Dec.
    • P. Schöttle, S. Korff, and R. Böhme, "Weighted stego-image steganalysis for naive content-adaptive embedding, " in Proc. IEEE Int. Workshop Inf. Forensics Secur., Tenerife, Spain, Dec. 2012, pp. 193-198.
    • (2012) Proc. IEEE Int. Workshop Inf. Forensics Secur. , pp. 193-198
    • Schöttle, P.1    Korff, S.2    Böhme, R.3
  • 21
    • 0037524382 scopus 로고    scopus 로고
    • Detection of LSB steganography via sample pair analysis
    • Jul.
    • S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis, " IEEE Trans. Signal Process., vol. 51, no. 7, pp. 1995-2007, Jul. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.7 , pp. 1995-2007
    • Dumitrescu, S.1    Wu, X.2    Wang, Z.3
  • 24
    • 78149255931 scopus 로고    scopus 로고
    • Gibbs construction in steganography
    • Dec.
    • T. Filler and J. Fridrich, "Gibbs construction in steganography, " IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 705-720
    • Filler, T.1    Fridrich, J.2
  • 25
    • 79954485517 scopus 로고    scopus 로고
    • Detecting messages of unknown length
    • Feb.
    • T. Pevny, "Detecting messages of unknown length, " Proc. SPIE, vol. 7880, pp. 78800T-1-78800T-12, Feb. 2011.
    • (2011) Proc. SPIE , vol.7880 , pp. 78800T1-78800T12
    • Pevny, T.1
  • 26
    • 84878455879 scopus 로고    scopus 로고
    • Random projections of residuals as an alternative to co-occurrences in steganalysis
    • Mar.
    • V. Holub, J. Fridrich, and T. Denemark, "Random projections of residuals as an alternative to co-occurrences in steganalysis, " Proc. SPIE, vol. 8665, pp. 86650L-1-86650L-11, Mar. 2013.
    • (2013) Proc. SPIE , vol.8665 , pp. 86650L1-86650L11
    • Holub, V.1    Fridrich, J.2    Denemark, T.3
  • 27
    • 77952620028 scopus 로고    scopus 로고
    • Edge adaptive image steganography based on LSB matching revisited
    • Jun.
    • W. Luo, F. Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited, " IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 201-214, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 201-214
    • Luo, W.1    Huang, F.2    Huang, J.3
  • 28
    • 84927741168 scopus 로고    scopus 로고
    • Adaptive steganalysis against WOW embedding algorithm
    • Salzburg, Austria, Jun.
    • W. Tang, H. Li, W. Luo, and J. Huang, "Adaptive steganalysis against WOW embedding algorithm, " in Proc. 2nd ACM Workshop IH&MMSec, Salzburg, Austria, Jun. 2014, pp. 91-96.
    • (2014) Proc. 2nd ACM Workshop IH&MMSec , pp. 91-96
    • Tang, W.1    Li, H.2    Luo, W.3    Huang, J.4
  • 29
    • 84874405772 scopus 로고    scopus 로고
    • Textural features for steganalysis
    • Berkeley, CA, USA, May
    • Y. Q. Shi, P. Sutthiwan, and L. Chen, "Textural features for steganalysis, " in Proc. 14th Int. Workshop Inf. Hiding, vol. 7692. Berkeley, CA, USA, May 2012, pp. 63-77.
    • (2012) Proc. 14th Int. Workshop Inf. Hiding , vol.7692 , pp. 63-77
    • Shi, Y.Q.1    Sutthiwan, P.2    Chen, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.