References
- S. Dumitrescu, X. Wu and Z. Wang, "Detection of LSB steganography via sample pair analysis," in Proc. of 5th Int. Workshop on Information Hiding, pp. 355-372, Oct. 2002.
- J. Fridrich, M. Goljan and R. Du, "Detecting LSB steganography in color and gray-scale images," IEEE Multimedia, vol. 8, no. 4, pp. 22-28, Oct. 2001. https://doi.org/10.1109/93.959097
- T. Zhang and X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Int. Journal Signal Processing, vol. 83, no. 10, pp. 2085-2093, Oct. 2003. https://doi.org/10.1016/S0165-1684(03)00169-5
-
G. Cancelli, G. Doerr, I. J. Cox and M.Barni, "A comparative study of
${\pm}$ 1 steganalyzers," in Proc. of IEEE Workshop on Multimedia Signal Processing, pp. 791-796, Oct. 2008. - A. D. Ker and I. Lubenko, "Feature redunction and payload location with WAM steganalysis," in Proc. of SPIE Electronic Imaging, Media Forensics and Security, pp. 72540A-01-72540A-13, Jan. 2009.
- J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 131-142, Jan. 2003.
- A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, Jun. 2005. https://doi.org/10.1109/LSP.2005.847889
- X. Li, T. Zeng and B. Yang, "Detecting LSB matching by applying calibration technique for difference image," in Proc. of 10th ACM Multimedia & Security Workshop, pp. 133-138, Sep. 2008.
- J. Zhang, I. J. Cox and G. Doёrr, "Steganalysis for LSB matching in images with high-frequency noise," in Proc. of IEEE Workshop on Multimedia Signal Processing, pp. 385-388, Oct. 2007.
-
G. Cancelli, G. Doerr, I. J. Cox and M. Barni, "Detection of
${\pm}$ 1 LSB steganography based on the amplitude of histogram local extrema," in Proc. of IEEE Conf. on Image Processing, pp. 1288-1291, Oct. 2008. - Y. Gao, X. Li, B. Yang and Y. Lu, "Detecting LSB matching by characterizing the amplitude of histogram," in Proc. of IEEE Conf. on Acoustics Speech, Signal Processing, pp. 1505-1508, Apr. 2009.
- T. Zhang, W. Li, Y. Zhang, E. Zheng and X. Ping, "Steganalysis of LSB matching based on statistical modeling of pixel difference distributions," Information Sciences, vol. 180, no. 23, pp. 4685-4694, Dec. 2010. https://doi.org/10.1016/j.ins.2010.07.037
- K. Cai, X. Li and T. Zeng, "Reliable histogram features for detecting LSB matching," in Proc. of IEEE Conf. on Image Processing, pp. 1761-1764, Sep. 2010.
- F. Huang, B. Li and J. Huang, "Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels," in Proc. of IEEE Conf. on Image Processing, pp. 401-404, Sep. 2007.
- Q. Liu, A. H. Sung, B. Ribeiro, M. Wei, Z. Chen and J. Xu, "Image complexity and feature mining for steganalysis of least significant bit matching steganography," Information Sciences, vol. 178, no. 1, pp. 21-36, Jan. 2008. https://doi.org/10.1016/j.ins.2007.08.007
- G. Wang, X. Ping, M. Xu, T. Zhang and X. Bao, "Steganalytic method based on short and repeated sequence distance statistics," Science in China Series F: Information Sciences, vol.51, no.10, pp. 1466-1474, Oct. 2008. https://doi.org/10.1007/s11432-008-0110-5
- T. Pevny, P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. on Information Forensics and Security, vol. 5, no.2, pp. 215-224, Mar. 2010. https://doi.org/10.1109/TIFS.2010.2045842
-
J. Fridrich, D. Soukal and M. Goljan, "Maximum likelihood estimation of length of secret message embedded using
${\pm}$ K steganography in spatial domain," in Proc. of SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 595-606, Mar. 2005. - P. W. Wong, H. Chen and Z. Tang, "On steganalysis of plus-minus one embedding of continuous tone image," in Proc. of SPIE Security, Steganography, and Wartermarking of Multimedia Contents, pp. 643-652, Mar. 2005.
- H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. of IEEE. Conf. on Image Processing, pp.905-908, Sep. 2002.
- T. Holotyak, J. Fridrich and S. Voloshynovskiy, "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in Proc. of 9th IFIP Conf. on Communications and Multimedia Security, pp. 273-274, Sep. 2005.
- M. Goljan, J. Fridrich and T. Holotyak, "New blind steganalysis and its implications," in Proc. of SPIE Security, Steganography, and Watermarking of Multimedia Contents, pp. 1-13, Jan. 2006.
- G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. of Int. Workshop on Information Hiding, pp. 262-277, Jun. 2005.
- Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen and C. Chen , "Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image,and neural network," in Proc. of IEEE Conf. on Multimedia and Expo, pp. 269-272, Jul. 2005.
- Y. Wang and P. Moulin, "Optimized feature extraction for learning-based image steganalysis," IEEE Trans. on Information Forensics and Security, vol. 2, no. 1, pp. 31-45, Mar. 2007. https://doi.org/10.1109/TIFS.2006.890517
- B. Li, J. Huang and Y. Q. Shi, "Textural features based universal steganalysis," in Proc. of SPIE Security, Forensics, Steganography and Watermarking of Multimedia, pp. 681912-681912-12, Jan. 2008.
- I. Ng, T. Tan and J. Kittler, "On local linear transform and gabor filter representation of texture," in Proc. of 11th Int. Conf. on Pattern Recognition, pp. 627-631, 1992.
- G. Doerr, "Image Database for Steganalysis Studies," [Online]. Available: http://www.cs.ucl.ac.uk/ staff/I.Cox/Content/Downloads.html
- P. Bas and T. Furon, BOWS-2, Jul. 2007 [Online]. Available: http:// bows2.gipsa-lab.inpg.fr
- G. Schaefer and M. Stich, "UCID - An Uncompressed Colour Image Database," in Proc. of SPIE Storage and Retrieval Methods and Applications for Multimedia, pp.472-480, Jan. 2004.
- [Online]. Available: http://photogallery.nrcs.usda.gov/
- C.-C. Chang and C.-J. Lin, LIBSVM: A Library for Support Vector Machines [Online]. Available: http://www. csie.ntu.edu.tw/-cjlin/libsvm
- N. Khanna, A. K Mikkilineni, A. F. Martone, G. N. Ali, G. T.-C. Chiu, J. P. Allebach and E. J. Delp, "A survey of forensic characterization methods for physical devices," Digital Investigation, vol. 3, no. s1, pp. 17-28, Sep. 2006. https://doi.org/10.1016/j.diin.2006.01.011
- T. V. Lanh, K. S. Chong, S. Emmanuel and M. S Kankanhalli, "A survey on digital camera image forensic methods," in Proc. of IEEE Conf. on Multimedia and Expo, pp. 16-19, Jul. 2007.
Cited by
- Detection of LSB Matching Revisited Using Pixel Difference Feature vol.7, pp.10, 2011, https://doi.org/10.3837/tiis.2013.10.011
- Quantitative steganalysis of spatial ±1 steganography in JPEG decompressed images vol.73, pp.3, 2011, https://doi.org/10.1007/s11042-013-1654-y