메뉴 건너뛰기




Volumn 18, Issue 2, 2017, Pages 435-442

Coverless image steganography based on SIFT and BOF

Author keywords

Bag of feature; Coverless image steganography; Hash sequence; Protocol of feature; Scale invarient feature transform

Indexed keywords

INTERNET; SOFTWARE ENGINEERING;

EID: 85018838783     PISSN: 16079264     EISSN: 20794029     Source Type: Journal    
DOI: 10.6138/JIT.2017.18.2.20160624c     Document Type: Conference Paper
Times cited : (148)

References (20)
  • 1
    • 67650157209 scopus 로고    scopus 로고
    • Reversible watermarking based on invariability and adjustment on pixel pairs
    • November
    • S. Weng, Y. Zhao, J. S. Pan and R. Ni, Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs, IEEE Signal Processing Letters, Vol. 15, No. 20, pp. 721-724, November, 2008.
    • (2008) IEEE Signal Processing Letters , vol.15 , Issue.20 , pp. 721-724
    • Weng, S.1    Zhao, Y.2    Pan, J.S.3    Ni, R.4
  • 2
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • February
    • Z. Xia, X. Wang, X. Sun and Q. Wang, A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 2, pp. 340-352, February, 2015.
    • (2015) IEEE Transactions on Parallel and Distributed Systems , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 3
    • 82655172377 scopus 로고    scopus 로고
    • An extended matrix encoding algorithm for steganography of high embedding efficiency
    • November
    • L. Fan, T. Gao, Q. Yang and Y. Cao, An Extended Matrix Encoding Algorithm for Steganography of High Embedding Efficiency, Computers & Electrical Engineering, Vol. 37, No. 6, pp. 973-981, November, 2011.
    • (2011) Computers & Electrical Engineering , vol.37 , Issue.6 , pp. 973-981
    • Fan, L.1    Gao, T.2    Yang, Q.3    Cao, Y.4
  • 4
    • 84986631527 scopus 로고    scopus 로고
    • A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
    • January
    • Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun and K. Ren, A Privacy-Preserving and Copy-deterrence Content-Based Image Retrieval Scheme in Cloud Computing, IEEE Transactions on Information Forensics and Security, Vol. 11, No. 11, pp. 2594- 2608, January, 2016.
    • (2016) IEEE Transactions on Information Forensics and Security , vol.11 , Issue.11 , pp. 2594-2608
    • Xia, Z.1    Wang, X.2    Zhang, L.3    Qin, Z.4    Sun, X.5    Ren, K.6
  • 5
    • 84892373027 scopus 로고    scopus 로고
    • A fast algorithm for matrix embedding steganography
    • February
    • Q. Mao, A Fast Algorithm for Matrix Embedding Steganography, Digital Signal Processing, Vol. 25, No. 2, pp. 248-254, February, 2014.
    • (2014) Digital Signal Processing , vol.25 , Issue.2 , pp. 248-254
    • Mao, Q.1
  • 8
    • 84977125904 scopus 로고    scopus 로고
    • Fingerprint liveness detection using multiscale difference co-occurrence matrix
    • December
    • C. Yuan, Z. Xia, X. Sun, D. Sun and R. Lv, Fingerprint Liveness Detection Using Multiscale Difference Co-occurrence Matrix, Optical Engineering, Vol. 55, No. 6, pp. 0631111-06300010, December, 2016.
    • (2016) Optical Engineering , vol.55 , Issue.6 , pp. 0631111-06300010
    • Yuan, C.1    Xia, Z.2    Sun, X.3    Sun, D.4    Lv, R.5
  • 9
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • March
    • A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, Digital Image Steganography: Survey and Analysis of Current Methods, Signal Processing, Vol. 90, No. 3, pp. 727-752, March, 2010.
    • (2010) Signal Processing , vol.90 , Issue.3 , pp. 727-752
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Kevitt, P.M.4
  • 10
    • 84959136299 scopus 로고    scopus 로고
    • Steganalysis of LSB matching using differences between nonadjacent pixels
    • February
    • Z. Xia, X. Wang, X. Sun, Q. Liu and N. Xiong, Steganalysis of LSB Matching Using Differences between Nonadjacent Pixels, Multimedia Tools & Applications, Vol. 75, No. 4, pp. 1947-1962, February, 2016.
    • (2016) Multimedia Tools & Applications , vol.75 , Issue.4 , pp. 1947-1962
    • Xia, Z.1    Wang, X.2    Sun, X.3    Liu, Q.4    Xiong, N.5
  • 11
    • 0037411306 scopus 로고    scopus 로고
    • Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
    • July
    • C. C. Chang, J. Y. Hsiao and C. S. Chan, Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy, Pattern Recognition, Vol. 36, No. 7, pp. 1583-1595, July, 2003.
    • (2003) Pattern Recognition , vol.36 , Issue.7 , pp. 1583-1595
    • Chang, C.C.1    Hsiao, J.Y.2    Chan, C.S.3
  • 12
    • 84921899998 scopus 로고    scopus 로고
    • Image segmentation by generalized hierarchical fuzzy C-Means algorithm
    • February
    • Y. Zheng, J. Byeungwoo, D. Xu, Q. M. J. Wu and H. Zhang, Image Segmentation by Generalized Hierarchical Fuzzy C-Means Algorithm, Journal of Intelligent and Fuzzy Systems, Vol. 28, No. 2, pp. 961-973, February, 2015.
    • (2015) Journal of Intelligent and Fuzzy Systems , vol.28 , Issue.2 , pp. 961-973
    • Zheng, Y.1    Byeungwoo, J.2    Xu, D.3    Wu, Q.M.J.4    Zhang, H.5
  • 14
    • 84990858692 scopus 로고    scopus 로고
    • Fingerprint liveness detection based on multi-scale LPQ and PCA
    • June
    • C. Yuan, X. Sun and R. Lv, Fingerprint Liveness Detection Based on Multi-scale LPQ and PCA, China Communications, Vol. 13, No. 7, pp. 60-65, June, 2016.
    • (2016) China Communications , vol.13 , Issue.7 , pp. 60-65
    • Yuan, C.1    Sun, X.2    Lv, R.3
  • 16
    • 77957872283 scopus 로고    scopus 로고
    • Detecting image region duplication using SIFT features
    • March
    • X. Pan and S. Lyu, Detecting Image Region Duplication Using SIFT Features, IEEE International Conference on Acoustic, Vol. 329, No. 1, pp. 1706- 1709, March, 2010.
    • (2010) IEEE International Conference on Acoustic , vol.329 , Issue.1 , pp. 1706-1709
    • Pan, X.1    Lyu, S.2
  • 17
    • 84904903882 scopus 로고    scopus 로고
    • Steganalysis of least significant bit matching using multi-order differences
    • August
    • Z. Xia, X. Wang, X. Sun and B. Wang, Steganalysis of Least Significant Bit Matching Using Multi-order Differences, Security & Communication Networks, Vol. 7, No. 8, pp. 1283-1291, August, 2014.
    • (2014) Security & Communication Networks , vol.7 , Issue.8 , pp. 1283-1291
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, B.4
  • 18
    • 85032751954 scopus 로고    scopus 로고
    • Watermarking schemes evaluation
    • August
    • F. A. P. Petitcolas, Watermarking Schemes Evaluation, IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 58-64, August, 2000.
    • (2000) IEEE Signal Processing Magazine , vol.17 , Issue.5 , pp. 58-64
    • Petitcolas, F.A.P.1
  • 19
    • 35048891531 scopus 로고    scopus 로고
    • Improved detection of LSB steganography in grayscale images
    • Toronto, Canada
    • A.D . Ker, Improved Detection of LSB Steganography in Grayscale Images, International Conference on Information Hiding, Toronto, Canada, 2004, pp. 97-115.
    • (2004) International Conference on Information Hiding , pp. 97-115
    • Ker, A.D.1
  • 20
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • May
    • A. D. Ker, Steganalysis of LSB Matching in Grayscale Images, IEEE Signal Processing Letters, Vol. 12, No. 6, pp. 441-444, May, 2005.
    • (2005) IEEE Signal Processing Letters , vol.12 , Issue.6 , pp. 441-444
    • Ker, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.