REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 ·...

21
113 REFERENCES [1] Anderson, R., and Goldenstein, S., 2006, Progressive Randomization for steganalysis, Proceedings of 8 th IEEE Workshop on Multimedia Signal Processing, Victoria, BC, pp. 314-319. [2] Anderson, R.J., and Petitcolas, F.A.P., 1998, On the limits of steganalysis, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 474-484. [3] Andrew, D., Ker., 2005, steganalysis of LSB Matching in Grayscale images, IEEE Signal Processing Letters, Vol. 12, No. 6, pp. 441-444. [4] Aruna Ambalavanan, 2006, Contributions in Mathematical Approaches to steganalysis, Proceedings of 8 th IEEE International Symposium on Multimedia (ISM'06), pp. 371-375. [5] Avcibas, I., Memon, N., and Sankur, B., 2002, Image steganalysis with binary similarity measures, Proceedings of ICIP, pp. 310-323. [6] Avcibas, I., Memon, N., and Sankur, B., 2001, steganalysis using th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [7] Avcibas, I., Memon, N., and Sankur, B., 2003, steganalysis using image quality metrics, IEEE Transaction on Image Processing, Vol. 12, No. 2, pp. 221-229. [8] Cachin C., 1998, An information theoretic model for steganalysis, Lecture Notes in Computer Science, 2 nd International Workshop on Information Hiding, Vol. 1525, pp.306 318. [9] Celik, M.U., Sharma, G., and Tekalp, A., 2004, Universal image steganalysis using rate- th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [10] Chandramouli, R., and Memon N., 2001, Analysis of LSB based image steganalysis techniques, Proceedings of ICIP, pp. 1019 1022.

Transcript of REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 ·...

Page 1: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

113

REFERENCES

[1] Anderson, R., and Goldenstein, S., 2006, Progressive

Randomization for steganalysis, Proceedings of 8th IEEE Workshop on

Multimedia Signal Processing, Victoria, BC, pp. 314-319.

[2] Anderson, R.J., and Petitcolas, F.A.P., 1998, On the limits of

steganalysis, IEEE Journal on Selected Areas in Communications, Vol.

16, No. 4, pp. 474-484.

[3] Andrew, D., Ker., 2005, steganalysis of LSB Matching in Grayscale

images, IEEE Signal Processing Letters, Vol. 12, No. 6, pp. 441-444.

[4] Aruna Ambalavanan, 2006, Contributions in Mathematical

Approaches to steganalysis, Proceedings of 8th IEEE International

Symposium on Multimedia (ISM'06), pp. 371-375.

[5] Avcibas, I., Memon, N., and Sankur, B., 2002, Image steganalysis

with binary similarity measures, Proceedings of ICIP, pp. 310-323.

[6] Avcibas, I., Memon, N., and Sankur, B., 2001, steganalysis using th Annual Symposium

on Electronic Imaging Science and Technology, San Jose, CA.

[7] Avcibas, I., Memon, N., and Sankur, B., 2003, steganalysis using

image quality metrics, IEEE Transaction on Image Processing, Vol. 12,

No. 2, pp. 221-229.

[8] Cachin C., 1998, An information theoretic model for steganalysis,

Lecture Notes in Computer Science, 2nd International Workshop on

Information Hiding, Vol. 1525, pp.306 318.

[9] Celik, M.U., Sharma, G., and Tekalp, A., 2004, Universal image

steganalysis using rate- th

Annual Symposium on Electronic Imaging Science and Technology, San

Jose, CA.

[10] Chandramouli, R., and Memon N., 2001, Analysis of LSB based

image steganalysis techniques, Proceedings of ICIP, pp. 1019 1022.

Page 2: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

114

[11] Chandramouli, R., and Subbalakshmi, K.P., 2003, Active

steganalysis of Spread Spectrum image steganalysis, Proceedings of

International Symposium on Circuits and Systems, ISCAS, Vol. 3, pp.

830-833.

[12] Chandramouli, R., 2003, A mathematical framework for active

steganalysis, ACM Multimedia Systems, Vol. 9, No. 3, pp. 303-311.

[13] Chao-en Zhou, Jiu-chao Feng, and Yi-xian Yang, 2009, Blind

steganalysis based on features in fractional Fourier transform domain

Communications, International Conference on Circuits and Systems, pp.

301-303.

[14] Chen, C., Shi, Y. Q., Chen, W., and Xuan, G., 2006, Statistical

Moments Based Universal steganalysis using JPEG 2-D Array and 2-D

Characteristic Function, IEEE International Conference on Image

Processing, pp. 105 108.

[15] Chen Qunjie, and Zhong Shangping, 2010, Universal

steganographic Detection Algorithmin in JPEG image Using the Data-

Dependent Kernal, Third International Symposium on Electronic

Commerce and Security (ISECS), pp. 232 -236.

[16] Chen, C., Shi, Y.Q., Chen, W., and Xuan, G., 2006, steganalysis

using JPEG 2-D array, and 2-D characteristics function, International

Conference on Image Processing (ICIP06), Atlanta, Georgia.

[17] Declan Mc Cullah., 2001, Secret Messages Come in Wavs, Wired

News.

[18] Dongdong Fu, Yun Shi, Q., Dekun Zou, and Guorong Xuan, 2006,

JPEG steganalysis Using Empirical Transition Matrix in Block DCT

Domain, Proceedings of 8th IEEE International workshop on Multimedia

Signal Processing, pp.310-313.

Page 3: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

115

[19] Dumitrescu, S., Wu, X., and Wang, Z., 2003, Detection of LSB

steganalysis via sample pair analysis, proceedings of IEEE Transaction on

Signal Processing, Vol. 51, No. 7, pp. 1995 2007.

[20] Eggers, J.J., Bauml, R., and Girod, B., 2002, A communications

approach to image steganalysis th Annual

Symposium on Electronic Imaging Science and Technology, San Jose,

CA.

[21] Farid H., 2001, Detecting steganographic Messages in Digital

images, TR2001-412, Department of Computer Science, Dartmouth

College.

[22] Farid, H., 2002, Detecting hidden messages using higher-order

statistical models, Proceedings of International Conference on Image

Processing, New York, pp. 905-908.

[23] Feng Fan, Wang Jiazhen, Wen Jiafu, and Bai Xiaojia, 2009,

Effective Features Extraction Approach to Blind steganalysis,

International Workshop on Intelligent Systems and Applications, pp. 1-4.

[24] Ferreira, R., Ribeiro, B., Silva, C., and Qingzhong Liu Sung, A.H.,

2008, Building resilient classifiers for LSB matching steganalysis, IEEE

International Joint Conference on Neural Networks (IJCNN), pp. 1562-

1567.

[25] Fridrich, J., and Miroslav Goljan., 2002, Practical steganalysis-state

of the art, Proceedings of SPIE Photonics West, Vol. 4675, pp. 1 13.

[26] Fridrich, J., 2004, Feature-based steganalysis for jpeg images and

its implications for future design of steganographic schemes, Information

Hiding- Lecture Notes in Computer Science, Vol. 3200, pp. 67 81.

[27] Fridrich, J., Miroslav Goljan, David Soukal, and Taras Holotyak,

2005, Forensic steganalysis: Determining the stego key in spatial domain

steganalysis, Proceedings of SPIE, Security, steganalysis, and

Watermarking of Multimedia Contents, Vol. 5681, pp. 631 642.

Page 4: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

116

[28] Yongjian Hu, Heung-Kyu Lee, and Jianwei Li, 2009, DE-Based

Transactions on circuits and systems for video technology, Vol. 19, No.

2, pp. 250-260.

[29] Fridrich, J., and Miroslav Goljan, 2002, Practical steganalysis of

Digital images - State of the Art, Proceedings of SPIE Photonics West

Electronic Imaging Security and Watermarking of Multimedia Contents,

San Jose, California, Vol. 4675, pp. 1-13.

[30] Fridrich, J., and Goljan, M., 2003, Digital image steganalysis using th Annual Symposium

on Electronic Imaging Science and Technology, San Jose, CA.

[31] Fridrich, J., and Goljan M., 2004, On estimation of secret message

length in LSB steganalysis

16th Annual Symposium on Electronic Imaging Science and Technology,

San Jose, CA.

[32] Fridrich, J., Goljan, M., and Hogea, D., 2002, Attacking the

OutGuess, Proceedings of the ACM Workshop on Multimedia and

Security.

[33] Fridrich, J., Goljan, M., and Hogea, D., 2002, steganalysis of JPEG

Images: Breaking the F5 Algorithm, 5th Information Hiding Workshop,

Noordwijkerhout, The Netherlands, Vol. 79, pp. 310-323.

[34] Fridrich, J., Goljan, M., and Hogea, D., 2003, New Methodology for

Breaking steganographic Techniques for JPEGs, Proceedings of th Annual Symposium on Electronic Imaging Science and

Technology, pp. 143-155.

[35] Fridrich, J., Goljan, M., and Du R., 2001, Reliable Detection of LSB

steganalysis in Color and Gray-Scale Images, Magazine of IEEE

Multimedia Special Issue on Security, pp. 22-28.

Page 5: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

117

[36] Fridrich, J., Goljan, M., and Soukal, D., 2003, Higher-order

statistical steganalysis of palette images, Security and Watermarking of

Multimedia Contents, Proceedings of SPIE, Vol. 5020, pp. 178-190.

[37] Fridrich, J., and Goljan, M., 2003, Digital image steganalysis using th Annual Symposium

on Electronic Imaging Science and Technology, San Jose, CA.

[38] Fridrich, J., Du, R., and Long, M., 2000, steganalysis of lsb

encoding in color images, IEEE ICME, Vol. 3, pp. 1279-1282.

[39] Fridrich, J., Goljan, J., Hogea, D., and Soukal, D., 2003,

Quantitative steganalysis of digital images: estimating the secret

message length, ACM Multimedia Systems Journal, Special issue on

Multimedia Security, Vol. 9, No. 3, pp. 288-302.

[40] Gireesh Kumar, T., Jithin, R., Shankar and Deepa, D., 2010,

Feature Based steganalysis Using Wavelet Decomposition and Magnitude

Statistics, International Conference on Advances in Computer

Engineering (ACE), pp. 298-300.

[41] Guillon P., Furon T., and Duhamel, P., 2002, Applied public-key

steganalysis th Annual Symposium on

Electronic Imaging Science and Technology, S 1`an Jose, CA.

[42] Gul, G., and Kurugollu, F., 2009, SVD Based Universal Spatial

Domain Image steganalysis, IEEE Transactions on Information Forensics

and Security, Vol. 5, No. 1, pp. 349 - 353.

[43] Guo-Shiang Lin, Chia, H., Yeh, and Jay Kuo, C.C., 2004, Data

Hiding Domain Classification for Blind Image steganalysis, IEEE

International Conference on Multimedia and Expo (ICME), Vol. 2, pp.

907-910.

[44] Han Zong, Fenlin Liu, and Xiangyang Luo, 2009, A wavelet-based

blind JPEG image steganalysis using co-occurrence matrix, 11th

Page 6: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

118

International Conference on Advanced Communication Technology

(ICACT), Vol. 3, pp. 1933-1936.

[45] Harmsen, J., and Pearlman, W., 2003, steganalysis of additive

noise modelable information hiding, Proceedings of SPIE Electronic

Imaging.

[46] Hernandez-Chamorro, A., Espejel-Trujillo, A., Lopez- Hernandez,

J., Nakano-Miyatake, M., and Perez-Meana, H., 2009, A Methodology of

steganalysis for Images, International Conference on Electrical and

Computers Communications, CONIELECOMP, pp. 102-106.

[47] Hogan, M. T., Hurley, N. J., Silvestre, G.C.M., Balado, F. and

Whelan, K. M., 2005, ML detection of steganalysis, Proceedings on th Annual Symposium on Electronic Imaging Science and

Technology, San Jose.

[48] Holoska Stegdetect, J., Oplatkova, Z., Zelinka, I., and Senkerik,

R., 2010, Comparison between Neural Network steganalysis and Linear

Classification Method Computational Intelligence, Second International

Conference on Modelling and Simulation, pp. 15-20.

[49] Hong Cai, Sos, Agaian, S., and Yufeng Wang, 2005, An Effective

Algorithm for Breaking F5, 7th IEEE International Workshop on

Multimedia Signal Processing, Shanghai, pp. 1-4.

[50] Hongchen Dou, Hongbin Zha, N.G., and Shuanghuan Zhan, 2004,

Independent Component Analysis Applied to Steganlysis, Proceedings of

7th International Conference on Signal Processing (ICSP), Vol. 3, No. 31,

pp. 2498-2501.

[51] http://www.jjtc.com/steganalysis/tools.html. (Access-date: 05-2-

2010).

[52] http://www.Stegoarchive.com (Access date: 05-02.2010).

[53] Jack Kelley., 2001, Terror Groups Hide Behind Web Encryption,

USA Today.

Page 7: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

119

[54] Jacob Jackson, T., Gregg Gunsch, H., Roger Claypoole, L., Jr, and

Gary Lamont, B., 2003, Blind steganalysis Detection Using a

Computational Immune System: A Work in Progress, International

Journal of Digital Evidence, Vol. 4, No. 1, pp. 1-19.

[55] Johnson, N. F., and Jajodia, S., 1998, steganalysis: the

investigation of hidden information, Proceedings of the IEEE Information

Technology Conference, Syracuse, New York, USA, pp. 113-116.

[56] Johnson, N., and Jajodia, S., 1998, steganalysis of images created

using current steganalysis software, Journal of Information Hiding,

SpringerLink, Lecture notes in Computer Science, Vol. 1525, pp. 273-

289.

[57] Johnson, N., and Sklansky, J., 1998, Exploring steganalysis: seeing

the unseen, IEEE Computer, pp. 26-34.

[58] Ke Ke, Tao Zhao, and Ou Li, 2010, Bhattacharyya Distance for

Blind Image steganalysis, International Conference on Multimedia

Information Networking and Security (MINES), pp. 658-661.

[59] Kharrazi, M., Sencar, H.T., and Memon, N., 2005, Benchmarking

steganographic and steganalysis

17th Annual Symposium on Electronic Imaging Science and Technology,

San Jose, CA.

[60] Krenn, R., 2004, steganalysis and steganalysis, Retrieved from

http://www.krenn.nl/ univ/cry/ steg/ article.pdf.

[61] Li Hui, Sun Ziwen, and Zhou Zhiping, 2011, An image steganalysis

method based on characteristic function moments and PCA, proceedings

of Chinese Control Conference (CCC), pp. 3005-3008.

[62] Li Zhi, and Sui Ai Fen, 2004, Detection of Random LSB Image

steganalysis, 60th IEEE International Conference on Vehicular

Technology, Vol. 3, pp. 2113-2117.

Page 8: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

120

[63] Liang Sun, Chong-Zhao Han, Ning Dai, and Jian-Jing Shen, 2006,

Feature Selection Based on Bhattacharyya Distance: A Generalized

Rough Set Method, Sixth World Congress on Intelligent Control and

Automation, WCICA, Vol. 2, pp. 101-105.

[64] Lingna Hu, Lingge Jiang, and Chen He, 2008, A novel steganalysis

of LSB matching based on kernel FDA in grayscale images, International

Conference on Neural Networks and Signal Processing, pp. 556-559.

[65] Liu Shaohu, I., Yao Hongxun., and Gao Wen., 2003, Neural

Network Based steganalysis in Still Images, IEEE International

Conference on Multimedia and Expo, (ICME), Vol. 2, pp. 509 - 512.

[66] Liu Shaohu, I., Yao Hongxun, and Gao Wen, 2004, steganalysis

Based on Wavelet Texture Analysis and Neural Network, Proceedings of

the 5th World Congress on Intelligent Control and Automation, China, pp.

4066-4069.

[67] Lyu, S., and Farid, H., 2004, steganalysis using color wavelet

statistics and one-class support vector machines, Proceeding of th Annual Symposium on Electronic Imaging Science and

Technology, San Jose, CA.

[68] Lyu, S., and Farid, H., 2002, Detecting Hidden Messages using

Higher order Statistics and Support Vector Machines, Lecture Notes in

Computer Science, Vol. 2578, pp. 340-354.

[69] Lyu, S., and Farid, H., 2004, steganalysis Using Color Wavelet

Statistics and One-Class Support Vector Machines, PIE Symposium on

Electronic Imaging, San Jose, CA.

[70] Malekmohamadi, H., and Ghaemmaghami, S., 2009, Reduced

complexity enhancement of steganalysis of LSB-matching image

steganalysis, IEEE/ACS International Conference on Computer Systems

and Applications, pp. 1013-1017.

Page 9: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

121

[71] Martin, A., Sapiro G., and Seroussi G., 2004, Is image steganalysis

natural?, Information Theory Research Group, HP Laboratories Palo Alto,

HPL-39(R.1).

[72] Martin, A., Sapiro, G., and Seroussi, G., 2005, Is image

steganalysis natural? , IEEE Transactions on Image Processing, Vol. 14,

No. 12, pp. 2040-2050.

[73] Marvel, L., Boncelet Jr, C.G., and Retter, C.T., 1999, Spread

spectrum image steganalysis, IEEE Transaction on Image Processing,

Vol. 8, No. 8, pp. 1075-1083.

[74] Mehrabi, M.A., Faez, K., and Bayesteh, A.R., 2007, Image

steganalysis Based on Statistical Moments of Wavelet Sub band

Histograms in Different Frequencies and Support Vector Machine, 3rd

International Conference on Natural Computation, Vol. 1, pp. 587-590.

[75] Mei-Ching Chen, Agaian, S.S., Chen, C.L.P., and Rodriguez, B.M.,

2008, steganalysis detection using RBFNN, International Conference on

Machine Learning and Cybernetics, Vol. 7, pp. 3720-3725.

[76] Mei-Ching Chen, Agaian, S.S., Chen, C.L.P., and Rodriguez, B.M.,

2009, Alpha-trimmed image estimation for JPEG steganalysis detection

Systems, International Conference on Man and Cybernetics, pp. 4581-

4585.

[77] Meng Joo Er, Shiqian Wu, Juwei Lu, and Hock Lye Toh, 2002, Face

Recognition with Radial Basis Function(RBF) Neural Networks, IEEE

Transaction on Neural Networks, Vol. 13, No. 3, pp. 697-910.

[78] Ming Jiang, Edward Wong, Nasir Memon, and Xiaolin Wu, 2004, A

simple Technique for Estimating Message Lengths for Additive Noise

steganalysis, 8th International Conference on Control, Automation,

Robotics and Vision (ICARCV), Kunming, China, pp. 983-986.

[79] Muhanna, M., Turabieh, H., Aljarrah, O., and Elsayad., 2005, A

steganalysis of LSB Encoding in Digital Images Using GLCM and Neural

Page 10: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

122

Networks, Proceedings of the 3rd International Conference on Informatics

and Systems (INFOS2005), Cairo, Egypt, Vol. 14, pp. 31-37.

[80] Neil Johnson, F., and Sushil Jajodia., 1998, steganalysis: the

investigation of hidden information, IEEE Information Technology

Conference, Syracuse, New York, USA, pp. 113-116.

[81] Neil Provos, and Peter Honeyman, 2003, Hide and Seek: An

Introduction to steganalysis, IEEE Security & Privacy, Vol. 1, No. 3, pp.

32-44.

[82] Onkar Dabeer, Kenneth Sullivan, Upamanyu Madhow, Shivakumar

Chandrasekaran, and Manjunath, B.S., 2004, Detection of Hiding in the

Least Significant Bit, IEEE Transactions on Signal Processing, Vol. 52,

No. 10, pp. 3046-3058.

[83] Petitcolas, F., Anderson, R., Kuhn, M., 1999, Information Hiding A

Survey, Proceeding of IEEE, Special Issue on protection on multimedia

content, Vol. 87, No. 7, pp. 1062-1078.

[84] Ping Wang, Fenlin Liu, Guodong Wang, Yifeng Sun, and Daofu

Gong, 2008, Multi-class steganalysis for Jpeg stego algorithms, 15th IEEE

International Conference on Image Processing, ICIP , pp. 2076-2079.

[85] Provos, N., and Honeyman, P., 2002, Detecting steganographic

CA.

[86] Provos N., 2001, Defending against statistical steganalysis, 10th

USENIX Security Symposium, Washington DC.

[87] Provos, N., and Honeyman, P., 2001, Detecting steganographic

content on the Internet, CITI Technical Report, pp. 01-11.

[88] Qian-lan, and Lin Jia-jun, 2009, A Universal steganalysis Using

Features Derived from the Differential Image Histogram in Frequency

Domain Deng, 2nd International Congress on Image and Signal

Processing, CISP'09, pp. 1-4.

Page 11: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

123

[89] Qingzhong Liu, Andrew Sung, H., Jianyun Xu, and Bernardete

Ribeiro, M., 2006, Image Complexity and Feature Extraction for

steganalysis of LSB Matching steganalysis, 18th International Conference

on Pattern Recognition, Vol. 2, pp. 267-270.

[90] Rajarathnam Chandramouli, Mehdi Kharrazi, and Nasir Memon,

2004, Image steganalysis and steganalysis: Concepts and Practice,

Lecture Notes in Computer Science, International Workshop on Digital

Watermarking, Korea, Vol. 2939, pp. 35-49.

[91] Ramezani, M., and Ghaemmaghami, S., 2010, Towards Genetic

Feature Selection in Image steganalysis, 7th IEEE Consumer

Communications and Networking Conference (CCNC), pp.1-4.

[92] Roue, B., Bas, P., and Chassery, MJ., 2004, Improving LSB

steganalysis using marginal and joint probabilistic distributions,

Proceedings of ACM Multimedia and Security Workshop, pp. 75 80.

[93] Ryan Benton, and Henry Chu, 2005, Soft Computing Approach to

steganalysis of LSB Embedding in Digital Images, Third International

Conference on Information Technology: Research and Education, ITRE,

pp. 105-109.

[94] Sallee, P., 2005, Model-based methods for steganalysis and

steganalysis, International Journal of Image and Graphics (IJIG), Vol. 5,

No. 1, pp. 167 190.

[95] Seongho Cho, Byung-Ho Cha, Jingwei Wang, and Jay Kuo, C.-C.,

2010, Block-based image steganalysis, Algorithm and performance

evaluation, Proceedings of IEEE International Symposium Circuits and

Systems (ISCAS), pp. 1679-1682.

[96] Seongho Cho, Jingwei Wang, Jay Kuo, C.-C., and Byung-Ho Cha,

2010, Block-based image steganalysis for a multi-classifier, IEEE

International Conference on Multimedia and Expo (ICME), pp. 1457-

1462.

Page 12: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

124

[97] Trivedi, S., and and Chandramouli, R., 2003, Active steganalysis of

Sequential steganalysis, SPIE conference California 5020, Vol. 13, pp.

123-130.

[98] Trivedi, S., and and Chandramouli, R., February 2005, Secret Key

Estimation in Sequential steganalysis, IEEE Transaction on Signal

Processing, Vol. 53, No. 2, pp. 746-757.

[99] Shaohui Liu, Lin Ma, Hongxun Yao, and Debin Zhao, 2009, Universal

steganalysis Based on Statistical Models Using Reorganization of Block-

based DCT Coefficients, 5th International Conference on Information

Assurance and Security, Vol. 1, pp. 778-781.

[100] Sheikhan, M., Moin, M.S., and Pezhmanpour, M., 2010, Blind

image steganalysis via joint co-occurrence matrix and statistical

moments of Contourlet transform, 10th International Conference on

Intelligent Systems Design and Applications (ISDA), pp. 368-372.

[101] Guorong Xuan, Jianjiong Gao, Shi, Y.Q., and Zou, D., 2005, Image

steganalysis Based on Statistical Image Moments of Wavelet Sub band

Histograms in DFT Domain, IEEE 7th International Workshop on

Multimedia Signal Processing, Shanghai, China, pp.1-4.

[102] Shi, Y.Q., Guorong Xuan, Zou, D., Jianjiong Gao, Chengyun Yang,

Zhenping Zhang, Peiqi Chai, Chen, W., and Chen, C., 2005, Image

steganalysis based on moments of characteristic functions using wavelet

decomposition, prediction-error image, and neural network, IEEE

International Conference on Multimedia and Expo, ICME, pp.1-4.

[103] Shreelekshmi, 2005, Statistical Techniques for Digital Image

steganalysis, ME Thesis, under supervision of C E Veni Madhavan.

[104] Sidorov, M., 2004, Hidden Markov models and steganalysis,

Proceeding of ACM Multimedia and Security Workshop, pp. 63 67.

[105]

Channel, CRYPTO83, Advances in Cryptology, pp. 51-67.

Page 13: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

125

[106] Dumitrescu, S., and Xiaolin Wu, 2005, A New Framework of LSB

steganalysis of Digital Media, IEEE Transactions on Signal Processing,

Vol. 53, No. 10, pp. 3936 3947.

[107] Dumitrescu, S., Xiaolin Wu, and Zhe Wang, 2003, Detection of LSB

steganalysis via Sample Pair Analysis, IEEE Transactions on Signal

Processing, Vol. 51, No. 7, pp. 1995-2007.

[108] Sullivan, K., Bi, Z., Madhow, U., Chandrasekaran, S., and

Manjunath, B.S., 2004, steganalysis of quantization index modulation

data hiding, Proceedings of IEEE International Conference on Image

Processing (ICIP), pp. 1165-1168. [109] Tao Zhang, Yan Zhang, Xijian

Ping, and Mingwu Song, 2006, Detection of LSB steganalysis Based on

Image Smoothness, IEEE International Conference on Multimedia and

Expo, pp. 1377-1380.

[110] Tariq Al Hawi, Mahmoud Al Qutayri, and Barada Hassan, 2004,

steganalysis attacks on stego images using stego-signatures and

statistical image properties, IEEE International Conference on Analog and

Digital Techniques in Electrical Engineering, Thailand, Vol. 2, pp. 104-

107.

[111] Tzschoppe, R., Bauml, R., Huber, J.B., and Kaup, A., 2003,

steganographic system based on higher-order statistics, Proceedings of th Annual Symposium on Electronic Imaging Science and

Technology, San Jose, CA.

[112] Vu Dao, N.P., and Rao Vemuri, 2002, A Performance Comparison

of Different Back Propagation Neural Networks Methods in Computer

Network Intrusion Detection, Differential Equations and Dynamical

Systems, Vol. 10, No. 1, pp. 201-214.

[113] Wang, Y., and Moulin, P., 2004, steganalysis of block-structured

Stego th Annual Symposium on

Electronic Imaging Science and Technology, San Jose, CA.

Page 14: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

126

[114] Yong Wang, JiuFen Liu, and WeiMing Zhang, 2009, Blind JPEG

steganalysis Based on Correlations of DCT Coefficients in Multi-directions

and Calibrations, International Conference on Multimedia Information

Networking and Security, MINES'09, Vol. 1, pp. 495-499.

[115] Wayner, P., 2002, Disappearing cryptography, Morgan Kaufmann

Publications.

[116] Wenqiong Yu, Zhuo Li, and Lingdi Ping, 2010, Blind detection for

JPEG steganalysis, International Conference on Networking and

Information Technology (ICNIT), pp. 128-132.

[117] Wenqiong Yu, Zhuo Li, and Lingdi Ping, 2010, A Hidden

Information Blind Detection Method Based on Rough Set Theory, Chinese

Conference on Pattern Recognition (CCPR), pp. 1-5.

[118] Wenqiong Yu, Zhuo Li, and Lingdi Ping, 2010, steganalysis

Algorithm Based on the D Reduction of Improved Differential Matrix in

Images, Chinese Conference on Pattern Recognition (CCPR), pp. 1-7.

[119] Westfeld, A., and Pfitzmann, A., 1999, Attacks on steganographic

systems, Lecture notes in computer science, proceedings of the 3rd

International Workshop on Information Hiding, Vol. 1768, pp. 61-76.

[120] Westfeld, A., 2001, High capacity despite better steganalysis (F5 -

a steganographic algorithm), Lecture notes in computer science,

4th International Workshop on Information Hiding, Vol. 2137, pp. 289-

302.

[121] Westfeld, A., and Pfitzmann, A., 2000, Attacks on steganographic

Systems, Lecture Notes in Computer Science, Springer-Verlag, Berlin,

Vol. 1768, pp. 61-75.

[122] Wu, X., Dumitrescu, S., and Wang, Z., 2002, Detection of lsb

steganalysis via sample pair analysis, Proceedings of 5th International

Workshop on Information Hiding, Noordwijkerhout, The Netherlands,

pp.355-372.

Page 15: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

127

[123] Xiangyang Luo, Bin Liu, and Fenlin Liu, 2005, Detecting LSB

steganalysis Based on Dynamic Masks, Proceedings of 5th International

pp. 251-255.

[124] Xiangyang Luo, Qingxian Wang, Chunfang Yang, and Fenlin Liu,

2006, Detection of LTSB steganalysis Based on Quartic Equation,

Proceedings of 8th International Conference on Advanced Communication

Technology (ICACT), Vol. 2, pp. 1199-1204.

[125] Xiao Yi Yu, and Aiming Wang, 2009, An Investigation of Genetic

Algorithm on steganalysis Techniques, Fifth International Conference on

Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP

'09. pp. 1118-1121.

[126] Xiao Yi Yu, and Aiming Wang, 2009, steganalysis Based on

Regression Model and Bayesion Network, International Conference on

Multimedia Information Networking and Security, MINES'09, Vol. 1, pp.

41-44.

[127] Xiao Yi Yu, and Aiming Wang, 2009, steganalysis Based on

Bayesion Network and Genetic Algorithm, 2nd International Congress on

Image and Signal Processing, CISP'09, pp. 1-4.

[128] Xiao Yi Yu, and Aiming Wang, 2009, An Investigation of Genetic

Algorithm on steganalysis Techniques, 5th International Conference on

Intelligent Information Hiding and Multimedia Signal Processing,

pp. 1118-1121.

[129] Xiaoyuan Yang, Shifeng Wang, and Jia Liu, 2009, Universal

steganalysis to Images with WBMC Model, Fifth International Conference

on Information Assurance and Security, IAS'09, Vol. 2, pp. 627-630.

[130] Xiaoyuan Yang, Yu Lei, Xiaozhong Pan, and Jia Liu, 2009,

Universal Image steganalysis Based on Wavelet Packet Decomposition

and Empirical Transition Matrix in Wavelet Domain, International Forum

Page 16: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

128

on Computer Science Technology and Applications, IFCSTA'09, Vol. 2 ,

pp. 179-182.

[131] Xiongfei He, Fenlin Liu, Xiangyang Luo, and Chunfang Yang, 2009,

Classification between PS and stego images Based on Noise Model, 3rd

International Conference on Multimedia and Ubiquitous Engineering, pp.

31-36.

[132] Xue Zhang, and Shang-Ping Zhong, 2009, Blind steganalysis

method for BMP images based on statistical MWCF and F-score method,

International Conference on Wavelet Analysis and Pattern Recognition,

pp. 442-447.

[133] Yamini, B, and Sabitha, R., 2010, Steganalytic attack for an

adaptive steganalysis using support vector machine, International

Conference on Emerging Trends in Robotics and Communication

Technologies (INTERACT), pp. 56-58.

[134] Ying Wang, and Pierre Moulin, 2007, Optimized Feature Extraction

for Learning-Based Image steganalysis, IEEE Transactions on

Information Forensics and Security, Vol. 2, No. 1, pp. 31-45.

[135] Yuan Liu, Li Huang, Ping Wang, and Guodong Wang, 2008, A blind

image steganalysis based on features from three domains, Proceedings

of Control and Decision Conference (CCDC), pp. 2933-2936.

[136] Yun Shi, Q., Guorong Xuan, Chengyun Yang, Jianjiong Gao,

Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, and Wen Chen,

2005, Effective steganalysis Based on Statistical Moments of Wavelet

Characteristic Function, IEEE International Conference on Information

Technology: Coding and Computing, Vol. 1, pp. 768-773.

[137] Zhang, T., and Ping, X., 2003, A new approach to reliable

detection of LSB steganalysis in natural images, Signal Processing,

Science Direct, Vol. 83, No. 10, pp. 2085-2093.

Page 17: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

129

[138] Zhi-Min He, Ng, W.W.Y., Chan, P.P.K., and Yeung, D.S., 2011,

Blind steganalysis with high generalization capability for different image

databases using L-GEM, International Conference on Machine Learning

and Cybernetics (ICMLC), Vol. 4, pp. 1690-1695.

[139] Zhiping Zhou, and Maomao Hui, 2009, steganalysis for Markov

Feature of Difference Array in DCT Domain, Sixth International

Conference on Fuzzy Systems and Knowledge Discovery, FSKD'09, Vol.

7, pp. 581-584.

[140] Zhuo Li, Kuijun Lu, Xianting Zeng, and Xuezeng Pan, 2009,

Feature-Based steganalysis for JPEG Images, International Conference

on Digital Image Processing, pp. 76-80.

[141] Ziwen Sun, Hui Li, Zhijian Wu, and Zhiping Zhou, 2009, An Image

steganalysis Method Based on Characteristic Function Moments of

Wavelet Sub bands, International Conference on Artificial Intelligence

and Computational Intelligence, Vol. 1, pp. 291-295.

[142] Ziwen Sun, Maomao Hui, and ChaoGuan, 2008, steganalysis Based

on Co-occurrence Matrix of Differential Image, International Conference

on Intelligent Information Hiding and Multimedia Signal Processing,

IIHMSP'08, pp. 1097-1100. [143] Ziwen Sun, Maomao Hui, and

ChaoGuan, 2008, steganalysis Based on Co-occurrence Matrix of

Differential Image, International Conference on Intelligent Information

Hiding and Multimedia Signal Processing, IIHMSP'08, pp. 1097-1100.

[144] Zolner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke,

R., Westfeld, A., Wicke, G., and Wolf, G., 1998, Modeling the security of

steganographic systems, Lecture notes in computer science,

2nd International Workshop on Information Hiding, Vol. 1525, pp. 345

355.

[145] Zugen Liu, Xuezeng Pan, Lie Shi, Jimin Wang, and Lingdi

Ping, 2006, Effective steganalysis based on statistical moments of

Page 18: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

130

differential characteristic function, International Conference on

Computational Intelligence and Security, Vol. 2, pp. 1195-1198.

[146] Weng, S., Zhao, Y., Pan, J.S., and Ni, R., 2008, Reversible data

hiding using the companding technique and improved DE method,

Circuits Systems and Signal Processing, Vol. 27, No. 2, pp. 229 245.

[147] Wei-Liang Tai, Chia-Ming Yeh, and Chin-Chen Chang, 2009,

Reversible data hiding based on histogram modification of pixel

differences, IEEE Transactions on Circuits and Systems for Video

Technology, Vol. 19, No. 6, pp. 906 910.

[148] Zhe-Ming Lu, Wang, JX., and Liu, BB., 2009, An improved lossless

data hiding scheme based on image VQ-index residual value coding,

Journal of Systems and Software, Vol. 82, No. 6, pp. 1016 1024.

[149] Wang. JX., and Lu, ZM., 2009, A path optional lossless data hiding

scheme based on VQ index table joint neighboring coding, International

journal of Information Sciences, Vol. 179, No. 19, pp. 3332-3348.

[150] Yang, B., Lu, ZM., and Sun, SH., 2005, Reversible watermarking in

the VQ-compressed domain, Proceedings of the fifth international

conference on visualization, imaging, and image processing, pp. 289

303.

[151] Chin-Chen Chang, Lin, CY., and Fan, YH., 2008, Lossless data

hiding for color images based on block truncation coding, Pattern

Recognition, Vol. 41, No. 7, pp. 2347 2357.

[152] Mobasseri, B.G., and Cinalli, D., 2006, Lossless watermarking of

compressed media using reversibly decodable packets, journal of Signal

Processing, Vol. 86, No. 5, pp. 951 961.

[153] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su, 2003,

915.

[154] Yu-Chiang Li, Chia-Ming Yeh, and Chin-Chen Chang , 2009, Data

hiding based on the similarity between neighboring pixels with

Page 19: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

131

reversibility, International journal for Digital Signal Processing, Vol. 20,

No. 4, pp. 1116-1128.

[155] Tian, J., 2003, Reversible data embedding using a difference

expansion, IEEE Transactions on Circuits and Systems for Video

Technology, Vol. 13, No. 8, pp. 890 896.

[156] Piyu Tsai, Yu-Chen Hu, and Hsiu-Lien Yeh, 2009, Reversible image

hiding scheme using predictive coding and histogram shifting,

International journal of Signal Processing, Vol. 89, No. 6, pp. 1129-1143.

[157] Alattar, A.M., 2004, Reversible watermark using the difference

expansion of a generalized integer transform, IEEE Transactions on

Image Processing, Vol. 13, No. 8, pp. 1147-1156.

[158] Hu, Y., Lee, H.K., and Li, J., 2009, DE-based reversible data hiding

with improved overflow location map, IEEE Transactions on Circuits and

systems for Video Technology, Vol. 19, No. 2, pp. 250-260.

[159] Lin, C.C., Tai, W.L., and Chang, C.C, 2008, Multilevel reversible

data hiding based on histogram modification of difference images,

International journal of Pattern Recognition, Vol. 41, No. 12, pp. 3582-

3591.

[160] Yambem Jina Chanu, Manglem Singh, and Themrichon Tuithung,

2012, Image steganalysis and steganalysis: A Survey, International

journal of Computer Applications, Vol. 52, No. 2, pp. 1-11.

[161] Rengarajan Amirtharajan, Jiaohua Qin, and John Bosco Balaguru

Rayappan, 2012, Random Image steganalysis and steganalysis: Present

Status and Future Directions, Infromation Technology Journal, No. 11,

pp. 566-576.

[162] Natarajan, V., and Anitha, R., 2012, Blind Image steganalysis

Based on Contourlet Transform, International journal on Cryptography &

Information Security, Vol. 2, No. 3, pp. 77-87.

Page 20: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

132

[163] Xiaochuan Chen, Yunhong Wang, Tienjui Tan, and Lei Guo, 2006,

Blind Image steganalysis Based on Statistical Analysis, 18th International

Conference on Pattern Recognition, Vol. 3, pp. 1107 1110.

[164] Xiangyang Luo, Fenlin Liu, Jianming Chen, and Yining Zhang,

2008, Image universal steganalysis based on wavelet packet transform,

IEEE 10th Workshop on Multimedia Signal Processing, pp. 780 - 784.

[165] Jing-Qu Lin, and Shang-Ping Zhong, 2009, JPEG image

steganalysis method based on binary similarity measures, International

Conference on Machine Learning and Cybernetics, Vol. 4, pp. 2238 -

2243.

[166] Yuan-lu Tu, and Sheng- rong Gong, 2008, Universal steganalysis

Using Color Correlation and Feature Fusion, International Symposium on

Information Science and Engineering, ISISE'08, Vol. 1, pp. 107 - 111.

[167] Zhi-Min, He., Ng, Wing W y., Chan, Patrick, P K., Yeung, and

Daniel, S., 2010, steganalysis detection using localized generalization

error model, IEEE International Conference on Systems Man and

Cybernetics (SMC), pp. 1544 1549.

[168] Lie, W-N., and Lin, G.S., 2005, A feature based classification for

blind image steganalysis, IEEE Transactions on Multimedia, Vol. 7, No. 6,

pp. 1007- 1020.

[169] Liu Shaohui, Yao Hongxun, and Gao Wen, 2003, Neural Network

Based steganalysis in Still Images, Proceedings of International

Conference on Multimedia and EXPO, Vol. 2, pp. 509-512.

[170] Sedighe Ghanbari , Manije Keshtegary, and Najme ghanbari ,

2012, New steganalysis Method using Glcm and Neural Network,

International Journal of Computer Applications, Vol. 42, No. 7, pp. 45-

50.

[171] Anitha, P.T., Rajaram M., and Sivanandham, S.M., 2012, A hybrid

approach for detecting stego content in corporate mail using NN based

Page 21: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 · th Annual Symposium on Electronic Imaging Science and Technology, San Jose, CA. [31]

133

simplified data encryption standard algorithm, American Journal of

Applied Sciences, Vol. 9, No. 5, pp. 766-771.

[172] Patricia Lafferty, and Farid Ahmed, 2004, Texture based

steganalysis: results for color images, Proceedings of SPIE, Vol. 5561,

pp. 145-151.

[173] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su, 2006,

Reversible Data Hiding, IEEE Transactions on circuits and systems for

video technology, Vol. 16, No. 3, pp. 354 362.

[174] Mohsenzadeh, Y., Mohajeri, J., and Ghaemmaghami, S., 2009,

Histogram shift steganography: A technique to thwart histogram based

steganalysis, Proceedings of 2nd International Workshop on Computer

Science and Engineering, Vol. 2, pp. 166-170.

[175] Daniel Lerch-

Methods for the Detection of Histogram Shifting Data Hiding Schemes,

Proceedings of Reunión Española Cryptology and Information Security

(RECSI).