메뉴 건너뛰기




Volumn 11, Issue 2, 2016, Pages 221-234

Content-adaptive steganography by minimizing statistical detectability

Author keywords

Adaptive steganography and steganalysis; Hypothesis testing theory; Information hiding; Multivariate Gaussian; Optimal detection

Indexed keywords

COMPUTER NETWORKS; SAFETY ENGINEERING;

EID: 85015091451     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2486744     Document Type: Article
Times cited : (513)

References (36)
  • 1
    • 80051709471 scopus 로고    scopus 로고
    • Minimizing additive distortion in steganography using syndrome-trellis codes
    • Sep
    • T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920-935, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 920-935
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 2
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Jun
    • T. Pevný, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” in Proc. 12th Int. Conf. Inf. Hiding, Jun. 2010, pp. 161-177.
    • (2010) Proc. 12th Int. Conf. Inf. Hiding , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 3
    • 84874034720 scopus 로고    scopus 로고
    • Designing steganographic distortion using directional filters
    • Tenerife, Spain, Dec
    • V. Holub and J. Fridrich, “Designing steganographic distortion using directional filters,” in Proc. IEEE WIFS, Tenerife, Spain, Dec. 2012, pp. 234-239.
    • (2012) Proc. IEEE WIFS , pp. 234-239
    • Holub, V.1    Fridrich, J.2
  • 4
    • 84894039003 scopus 로고    scopus 로고
    • Universal distortion function for steganography in an arbitrary domain
    • Dec
    • V. Holub, J. Fridrich, and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,” EURASIP J. Inf. Secur., vol. 2014, p. 1, Dec. 2014.
    • (2014) EURASIP J. Inf. Secur. , vol.2014 , pp. 1
    • Holub, V.1    Fridrich, J.2    Denemark, T.3
  • 5
    • 84983146156 scopus 로고    scopus 로고
    • A new cost function for spatial image steganography
    • Paris, France, Oct
    • B. Li, M. Wang, J. Huang, and X. Li, “A new cost function for spatial image steganography,” in Proc. IEEE ICIP, Paris, France, Oct. 2014, pp. 4206-4210.
    • (2014) Proc. IEEE ICIP , pp. 4206-4210
    • Li, B.1    Wang, M.2    Huang, J.3    Li, X.4
  • 6
    • 84904685564 scopus 로고    scopus 로고
    • Investigation on cost assignment in spatial image steganography
    • Aug
    • B. Li, S. Tan, M. Wang, and J. Huang, “Investigation on cost assignment in spatial image steganography,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1264-1277, Aug. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.8 , pp. 1264-1277
    • Li, B.1    Tan, S.2    Wang, M.3    Huang, J.4
  • 8
    • 84880060316 scopus 로고    scopus 로고
    • Moving steganography and steganalysis from the laboratory into the real world
    • Montpellier, France, Jun
    • A. D. Ker et al., “Moving steganography and steganalysis from the laboratory into the real world,” in Proc. 1st ACM Workshop IH&MMSec, Montpellier, France, Jun. 2013, pp. 45-58.
    • (2013) Proc. 1st ACM Workshop IH&MMSec , pp. 45-58
    • Ker, A.D.1
  • 9
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun
    • T. Pevný, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 10
    • 79954457569 scopus 로고    scopus 로고
    • Design of adaptive steganographic schemes for digital images
    • Feb
    • T. Filler and J. Fridrich, “Design of adaptive steganographic schemes for digital images,” Proc. SPIE, vol. 7880, p. 78800F, Feb. 2011.
    • (2011) Proc. SPIE , vol.7880 , pp. 78800F
    • Filler, T.1    Fridrich, J.2
  • 11
    • 80054777166 scopus 로고    scopus 로고
    • On dangers of overtrain-ing steganography to incomplete cover model
    • Niagara Falls, NY, USA, Sep
    • J. Kodovský, J. Fridrich, and V. Holub, “On dangers of overtrain-ing steganography to incomplete cover model,” in Proc. 13th ACM Multimedia Secur. Workshop, Niagara Falls, NY, USA, Sep. 2011, pp. 69-76.
    • (2011) Proc. 13th ACM Multimedia Secur. Workshop , pp. 69-76
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 12
    • 84889632364 scopus 로고    scopus 로고
    • Multivariate Gaussian model for designing additive distortion for steganography
    • Vancouver, BC, Canada, May
    • J. Fridrich and J. Kodovský, “Multivariate Gaussian model for designing additive distortion for steganography,” in Proc. IEEE ICASSP, Vancouver, BC, Canada, May 2013, pp. 2949-2953.
    • (2013) Proc. IEEE ICASSP , pp. 2949-2953
    • Fridrich, J.1    Kodovský, J.2
  • 13
    • 84932126015 scopus 로고    scopus 로고
    • Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model
    • Mar
    • V. Sedighi, J. Fridrich, and R. Cogranne, “Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model,” Proc. SPIE, vol. 9409, p. 94090H, Mar. 2015.
    • (2015) Proc. SPIE , vol.9409 , pp. 94090H
    • Sedighi, V.1    Fridrich, J.2    Cogranne, R.3
  • 15
    • 52649143252 scopus 로고    scopus 로고
    • Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data
    • Oct
    • A. Foi, M. Trimeche, V. Katkovnik, and K. Egiazarian, “Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data,” IEEE Trans. Image Process., vol. 17, no. 10, pp. 1737-1754, Oct. 2008.
    • (2008) IEEE Trans. Image Process. , vol.17 , Issue.10 , pp. 1737-1754
    • Foi, A.1    Trimeche, M.2    Katkovnik, V.3    Egiazarian, K.4
  • 16
    • 0028391852 scopus 로고
    • Radiometric CCD camera calibration and noise estimation
    • Mar
    • G. E. Healey and R. Kondepudy, “Radiometric CCD camera calibration and noise estimation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 3, pp. 267-276, Mar. 1994.
    • (1994) IEEE Trans. Pattern Anal. Mach. Intell. , vol.16 , Issue.3 , pp. 267-276
    • Healey, G.E.1    Kondepudy, R.2
  • 17
    • 84891296342 scopus 로고    scopus 로고
    • Camera model identification based on the heteroscedastic noise model
    • Jan
    • T. H. Thai, R. Cogranne, and F. Retraint, “Camera model identification based on the heteroscedastic noise model,” IEEE Trans. Image Process., vol. 23, no. 1, pp. 250-263, Jan. 2014.
    • (2014) IEEE Trans. Image Process. , vol.23 , Issue.1 , pp. 250-263
    • Thai, T.H.1    Cogranne, R.2    Retraint, F.3
  • 20
    • 84873683899 scopus 로고    scopus 로고
    • An asymptotically uniformly most powerful test for LSB matching detection
    • Mar
    • R. Cogranne and F. Retraint, “An asymptotically uniformly most powerful test for LSB matching detection,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 464-476, Mar. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 464-476
    • Cogranne, R.1    Retraint, F.2
  • 21
    • 84874590883 scopus 로고    scopus 로고
    • Application of hypothesis testing theory for optimal detection of LSB matching data hiding
    • Jul
    • R. Cogranne and F. Retraint, “Application of hypothesis testing theory for optimal detection of LSB matching data hiding,” Signal Process., vol. 93, no. 7, pp. 1724-1737, Jul. 2013.
    • (2013) Signal Process , vol.93 , Issue.7 , pp. 1724-1737
    • Cogranne, R.1    Retraint, F.2
  • 22
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun
    • J. Fridrich and J. Kodovský, “Rich models for steganalysis of digital images,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 25
    • 84927741168 scopus 로고    scopus 로고
    • Adaptive steganalysis against WOW embedding algorithm
    • Salzburg, Austria, Jun
    • W. Tang, H. Li, W. Luo, and J. Huang, “Adaptive steganalysis against WOW embedding algorithm,” in Proc. 2nd ACM Workshop IH&MMSec, Salzburg, Austria, Jun. 2014, pp. 91-96.
    • (2014) Proc. 2nd ACM Workshop IH&MMSec , pp. 91-96
    • Tang, W.1    Li, H.2    Luo, W.3    Huang, J.4
  • 26
    • 84929231486 scopus 로고    scopus 로고
    • Selection-channel-aware rich model for steganalysis of digital images
    • Atlanta, GA, USA, Dec
    • T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, “Selection-channel-aware rich model for steganalysis of digital images,” in Proc. IEEE WIFS, Atlanta, GA, USA, Dec. 2014, pp. 48-53.
    • (2014) Proc. IEEE WIFS , pp. 48-53
    • Denemark, T.1    Sedighi, V.2    Holub, V.3    Cogranne, R.4    Fridrich, J.5
  • 27
    • 84887312389 scopus 로고    scopus 로고
    • Statistical detection of defects in radi-ographic images using an adaptive parametric model
    • Mar
    • R. Cogranne and F. Retraint, “Statistical detection of defects in radi-ographic images using an adaptive parametric model,” Signal Process., vol. 96, pp. 173-189, Mar. 2014.
    • (2014) Signal Process , vol.96 , pp. 173-189
    • Cogranne, R.1    Retraint, F.2
  • 29
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system': The ins and outs of organizing BOSS
    • Prague, Czech Republic, May
    • P. Bas, T. Filler, and T. Pevný, “'Break Our Steganographic System': The ins and outs of organizing BOSS,” in Proc. 13th Int. Conf. Inf. Hiding, Prague, Czech Republic, May 2011, pp. 59-70.
    • (2011) Proc. 13th Int. Conf. Inf. Hiding , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 30
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • Apr
    • J. Kodovský, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 432-444
    • Kodovský, J.1    Fridrich, J.2    Holub, V.3
  • 31
    • 84929248903 scopus 로고    scopus 로고
    • Theoretical model of the FLD ensemble classifier based on hypothesis testing theory
    • Atlanta, GA, USA, Dec
    • R. Cogranne, T. Denemark, and J. Fridrich, “Theoretical model of the FLD ensemble classifier based on hypothesis testing theory,” in Proc. IEEE WIFS, Atlanta, GA, USA, Dec. 2014, pp. 167-172.
    • (2014) Proc. IEEE WIFS , pp. 167-172
    • Cogranne, R.1    Denemark, T.2    Fridrich, J.3
  • 32
    • 84943746941 scopus 로고    scopus 로고
    • Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory
    • Dec
    • R. Cogranne and J. Fridrich, “Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2627-2642, Dec. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.12 , pp. 2627-2642
    • Cogranne, R.1    Fridrich, J.2
  • 33
    • 78149255931 scopus 로고    scopus 로고
    • Gibbs construction in steganography
    • Dec
    • T. Filler and J. Fridrich, “Gibbs construction in steganography,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.4 , pp. 705-720
    • Filler, T.1    Fridrich, J.2
  • 34
    • 78649838656 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • Alexandria, VA, USA, Jul
    • A. D. Ker, “Batch steganography and pooled steganalysis,” in Proc. 8th Int. Workshop Inf. Hiding, Alexandria, VA, USA, Jul. 2006, pp. 265-281.
    • (2006) Proc. 8th Int. Workshop Inf. Hiding , pp. 265-281
    • Ker, A.D.1
  • 35
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • Aug
    • A. D. Ker, “A capacity result for batch steganography,” IEEE Signal Process. Lett., vol. 14, no. 8, pp. 525-528, Aug. 2007.
    • (2007) IEEE Signal Process. Lett. , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.D.1
  • 36
    • 84929251068 scopus 로고    scopus 로고
    • Rich model for steganalysis of color images
    • Atlanta, GA, USA, Dec
    • M. Goljan, R. Cogranne, and J. Fridrich, “Rich model for steganalysis of color images,” in Proc. IEEE WIFS, Atlanta, GA, USA, Dec. 2014, pp. 185-190.
    • (2014) Proc. IEEE WIFS , pp. 185-190
    • Goljan, M.1    Cogranne, R.2    Fridrich, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.