참고문헌
- J. Fridrich, M. Goljan and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," in Proc. of 5th International Workshop on Information Hiding, pp. 310-323, Oct. 2002.
-
G. Cancelli, G. Doerr, I. Cox and M. Barni, "A comparative study of
${\pm}1$ steganalyzers," in Proc. of IEEE International Workshop on Multimedia Signal Processing, pp. 791-796, Oct. 2008. - T. Pevny, P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Transaction on Information Forensics and Security, vol. 5, no. 2, pp. 215-224, Mar. 2010. https://doi.org/10.1109/TIFS.2010.2045842
- T. Pevny and J. Fridrich, "Determining the stego algorithm for JPEG images," Special Issue of IEE Processing Information Security, vol. 153, no. 3, pp. 77-86, Sep. 2006. https://doi.org/10.1049/ip-ifs:20055147
- T. Pevny and J. Fridrich, "Multiclass detector of current steganographic methods for JPEG format," IEEE Transaction on Information Forensics and Security, vol. 3, no. 4, pp. 635-650, Dec. 2008. https://doi.org/10.1109/TIFS.2008.2002936
- M. Barni, G. Cancelli and A. Esposito, "Forensics aided steganalysis of heterogeneous images," in Proc. of IEEE Conf. on Acoustic Speech, Signal Processing, pp. 1690-1693, Mar. 2010.
- H. Amirkhani and M. Rahmati, "New framework for using image contents in blind steganalysis systems," Journal of Electronic Imaging, vol. 20, no. 1, pp. 1-14, Mar. 2011.
- W. Luo, F. Huang and J. Huang, "JPEG error analysis and its applications to digital image forensics," IEEE Trans. on Information Forensics and Security, vol. 5, no. 3, pp. 480-491, Sep. 2010. https://doi.org/10.1109/TIFS.2010.2051426
- T. Sharp, "An Implementation of key-based digital signal steganography," in Proc. of 4th International Workshop on Information Hiding, pp. 13-26, Apr. 2001.
- G. Doerr, Image Database for Steganalysis Studies [Online]. Available: http://www.cs.ucl.ac.uk/ staff/I.Cox/Content/Downloads.html.
- E. Zheng, X. Ping and T. Zhang, "Local linear transform and new features of histogram characteristic functions for steganalysis of least significant bit matching steganography," KSII Transaction on Internet and Information System, vol. 5, no. 4, pp. 840-855, Apr. 2011.
- K. Cai, X. Li and T. Zeng, "Reliable histogram features for detecting LSB matching," in Proc. of IEEE Conf. on Image Processing, pp. 1761-1764, Sep. 2010.
- J. Zhang and D. Zhang, "Detection of LSB matching steganography in decompressed images," IEEE Signal Processing Letters, vol. 17, no. 2, pp. 141-144, Feb. 2010. https://doi.org/10.1109/LSP.2009.2035379
- X. Li, T. Zhang, Y. Zhang, W. Li and K. Li, "A novel blind detector for additive noise steganography in JPEG decompressed images," Multimedia Tools and Applications, published online, May. 2012.
- M. Goljan, J. Fridrich and T. Holotyak, "New blind steganalysis and its implications," in Proc. of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, pp. 1-13, Jan. 2006.
- B. Li, J. Huang and Y. Q. Shi, "Textural features based universal steganalysis," in Proc. of SPIE Security, Forensics, Steganography and Watermarking of Multimedia, pp. 1201-1212, Jan. 2008.
-
W. Luo, Y. Wang and J. Huang, "Security analysis on spatial
${\pm}1$ steganography for JPEG decompressed images," IEEE Signal Processing Letters, vol. 18, no. 1, pp. 39-42, Jan. 2011. https://doi.org/10.1109/LSP.2010.2091127
피인용 문헌
- Detection for Operation Chain: Histogram Equalization and Dither-like Operation vol.9, pp.9, 2012, https://doi.org/10.3837/tiis.2015.09.026
- Steganalysis aided by fragile detection of image manipulations vol.78, pp.16, 2012, https://doi.org/10.1007/s11042-019-7654-9