REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 ·...
Transcript of REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/8912/20/18... · 2015-12-04 ·...
113
REFERENCES
[1] Anderson, R., and Goldenstein, S., 2006, Progressive
Randomization for steganalysis, Proceedings of 8th IEEE Workshop on
Multimedia Signal Processing, Victoria, BC, pp. 314-319.
[2] Anderson, R.J., and Petitcolas, F.A.P., 1998, On the limits of
steganalysis, IEEE Journal on Selected Areas in Communications, Vol.
16, No. 4, pp. 474-484.
[3] Andrew, D., Ker., 2005, steganalysis of LSB Matching in Grayscale
images, IEEE Signal Processing Letters, Vol. 12, No. 6, pp. 441-444.
[4] Aruna Ambalavanan, 2006, Contributions in Mathematical
Approaches to steganalysis, Proceedings of 8th IEEE International
Symposium on Multimedia (ISM'06), pp. 371-375.
[5] Avcibas, I., Memon, N., and Sankur, B., 2002, Image steganalysis
with binary similarity measures, Proceedings of ICIP, pp. 310-323.
[6] Avcibas, I., Memon, N., and Sankur, B., 2001, steganalysis using th Annual Symposium
on Electronic Imaging Science and Technology, San Jose, CA.
[7] Avcibas, I., Memon, N., and Sankur, B., 2003, steganalysis using
image quality metrics, IEEE Transaction on Image Processing, Vol. 12,
No. 2, pp. 221-229.
[8] Cachin C., 1998, An information theoretic model for steganalysis,
Lecture Notes in Computer Science, 2nd International Workshop on
Information Hiding, Vol. 1525, pp.306 318.
[9] Celik, M.U., Sharma, G., and Tekalp, A., 2004, Universal image
steganalysis using rate- th
Annual Symposium on Electronic Imaging Science and Technology, San
Jose, CA.
[10] Chandramouli, R., and Memon N., 2001, Analysis of LSB based
image steganalysis techniques, Proceedings of ICIP, pp. 1019 1022.
114
[11] Chandramouli, R., and Subbalakshmi, K.P., 2003, Active
steganalysis of Spread Spectrum image steganalysis, Proceedings of
International Symposium on Circuits and Systems, ISCAS, Vol. 3, pp.
830-833.
[12] Chandramouli, R., 2003, A mathematical framework for active
steganalysis, ACM Multimedia Systems, Vol. 9, No. 3, pp. 303-311.
[13] Chao-en Zhou, Jiu-chao Feng, and Yi-xian Yang, 2009, Blind
steganalysis based on features in fractional Fourier transform domain
Communications, International Conference on Circuits and Systems, pp.
301-303.
[14] Chen, C., Shi, Y. Q., Chen, W., and Xuan, G., 2006, Statistical
Moments Based Universal steganalysis using JPEG 2-D Array and 2-D
Characteristic Function, IEEE International Conference on Image
Processing, pp. 105 108.
[15] Chen Qunjie, and Zhong Shangping, 2010, Universal
steganographic Detection Algorithmin in JPEG image Using the Data-
Dependent Kernal, Third International Symposium on Electronic
Commerce and Security (ISECS), pp. 232 -236.
[16] Chen, C., Shi, Y.Q., Chen, W., and Xuan, G., 2006, steganalysis
using JPEG 2-D array, and 2-D characteristics function, International
Conference on Image Processing (ICIP06), Atlanta, Georgia.
[17] Declan Mc Cullah., 2001, Secret Messages Come in Wavs, Wired
News.
[18] Dongdong Fu, Yun Shi, Q., Dekun Zou, and Guorong Xuan, 2006,
JPEG steganalysis Using Empirical Transition Matrix in Block DCT
Domain, Proceedings of 8th IEEE International workshop on Multimedia
Signal Processing, pp.310-313.
115
[19] Dumitrescu, S., Wu, X., and Wang, Z., 2003, Detection of LSB
steganalysis via sample pair analysis, proceedings of IEEE Transaction on
Signal Processing, Vol. 51, No. 7, pp. 1995 2007.
[20] Eggers, J.J., Bauml, R., and Girod, B., 2002, A communications
approach to image steganalysis th Annual
Symposium on Electronic Imaging Science and Technology, San Jose,
CA.
[21] Farid H., 2001, Detecting steganographic Messages in Digital
images, TR2001-412, Department of Computer Science, Dartmouth
College.
[22] Farid, H., 2002, Detecting hidden messages using higher-order
statistical models, Proceedings of International Conference on Image
Processing, New York, pp. 905-908.
[23] Feng Fan, Wang Jiazhen, Wen Jiafu, and Bai Xiaojia, 2009,
Effective Features Extraction Approach to Blind steganalysis,
International Workshop on Intelligent Systems and Applications, pp. 1-4.
[24] Ferreira, R., Ribeiro, B., Silva, C., and Qingzhong Liu Sung, A.H.,
2008, Building resilient classifiers for LSB matching steganalysis, IEEE
International Joint Conference on Neural Networks (IJCNN), pp. 1562-
1567.
[25] Fridrich, J., and Miroslav Goljan., 2002, Practical steganalysis-state
of the art, Proceedings of SPIE Photonics West, Vol. 4675, pp. 1 13.
[26] Fridrich, J., 2004, Feature-based steganalysis for jpeg images and
its implications for future design of steganographic schemes, Information
Hiding- Lecture Notes in Computer Science, Vol. 3200, pp. 67 81.
[27] Fridrich, J., Miroslav Goljan, David Soukal, and Taras Holotyak,
2005, Forensic steganalysis: Determining the stego key in spatial domain
steganalysis, Proceedings of SPIE, Security, steganalysis, and
Watermarking of Multimedia Contents, Vol. 5681, pp. 631 642.
116
[28] Yongjian Hu, Heung-Kyu Lee, and Jianwei Li, 2009, DE-Based
Transactions on circuits and systems for video technology, Vol. 19, No.
2, pp. 250-260.
[29] Fridrich, J., and Miroslav Goljan, 2002, Practical steganalysis of
Digital images - State of the Art, Proceedings of SPIE Photonics West
Electronic Imaging Security and Watermarking of Multimedia Contents,
San Jose, California, Vol. 4675, pp. 1-13.
[30] Fridrich, J., and Goljan, M., 2003, Digital image steganalysis using th Annual Symposium
on Electronic Imaging Science and Technology, San Jose, CA.
[31] Fridrich, J., and Goljan M., 2004, On estimation of secret message
length in LSB steganalysis
16th Annual Symposium on Electronic Imaging Science and Technology,
San Jose, CA.
[32] Fridrich, J., Goljan, M., and Hogea, D., 2002, Attacking the
OutGuess, Proceedings of the ACM Workshop on Multimedia and
Security.
[33] Fridrich, J., Goljan, M., and Hogea, D., 2002, steganalysis of JPEG
Images: Breaking the F5 Algorithm, 5th Information Hiding Workshop,
Noordwijkerhout, The Netherlands, Vol. 79, pp. 310-323.
[34] Fridrich, J., Goljan, M., and Hogea, D., 2003, New Methodology for
Breaking steganographic Techniques for JPEGs, Proceedings of th Annual Symposium on Electronic Imaging Science and
Technology, pp. 143-155.
[35] Fridrich, J., Goljan, M., and Du R., 2001, Reliable Detection of LSB
steganalysis in Color and Gray-Scale Images, Magazine of IEEE
Multimedia Special Issue on Security, pp. 22-28.
117
[36] Fridrich, J., Goljan, M., and Soukal, D., 2003, Higher-order
statistical steganalysis of palette images, Security and Watermarking of
Multimedia Contents, Proceedings of SPIE, Vol. 5020, pp. 178-190.
[37] Fridrich, J., and Goljan, M., 2003, Digital image steganalysis using th Annual Symposium
on Electronic Imaging Science and Technology, San Jose, CA.
[38] Fridrich, J., Du, R., and Long, M., 2000, steganalysis of lsb
encoding in color images, IEEE ICME, Vol. 3, pp. 1279-1282.
[39] Fridrich, J., Goljan, J., Hogea, D., and Soukal, D., 2003,
Quantitative steganalysis of digital images: estimating the secret
message length, ACM Multimedia Systems Journal, Special issue on
Multimedia Security, Vol. 9, No. 3, pp. 288-302.
[40] Gireesh Kumar, T., Jithin, R., Shankar and Deepa, D., 2010,
Feature Based steganalysis Using Wavelet Decomposition and Magnitude
Statistics, International Conference on Advances in Computer
Engineering (ACE), pp. 298-300.
[41] Guillon P., Furon T., and Duhamel, P., 2002, Applied public-key
steganalysis th Annual Symposium on
Electronic Imaging Science and Technology, S 1`an Jose, CA.
[42] Gul, G., and Kurugollu, F., 2009, SVD Based Universal Spatial
Domain Image steganalysis, IEEE Transactions on Information Forensics
and Security, Vol. 5, No. 1, pp. 349 - 353.
[43] Guo-Shiang Lin, Chia, H., Yeh, and Jay Kuo, C.C., 2004, Data
Hiding Domain Classification for Blind Image steganalysis, IEEE
International Conference on Multimedia and Expo (ICME), Vol. 2, pp.
907-910.
[44] Han Zong, Fenlin Liu, and Xiangyang Luo, 2009, A wavelet-based
blind JPEG image steganalysis using co-occurrence matrix, 11th
118
International Conference on Advanced Communication Technology
(ICACT), Vol. 3, pp. 1933-1936.
[45] Harmsen, J., and Pearlman, W., 2003, steganalysis of additive
noise modelable information hiding, Proceedings of SPIE Electronic
Imaging.
[46] Hernandez-Chamorro, A., Espejel-Trujillo, A., Lopez- Hernandez,
J., Nakano-Miyatake, M., and Perez-Meana, H., 2009, A Methodology of
steganalysis for Images, International Conference on Electrical and
Computers Communications, CONIELECOMP, pp. 102-106.
[47] Hogan, M. T., Hurley, N. J., Silvestre, G.C.M., Balado, F. and
Whelan, K. M., 2005, ML detection of steganalysis, Proceedings on th Annual Symposium on Electronic Imaging Science and
Technology, San Jose.
[48] Holoska Stegdetect, J., Oplatkova, Z., Zelinka, I., and Senkerik,
R., 2010, Comparison between Neural Network steganalysis and Linear
Classification Method Computational Intelligence, Second International
Conference on Modelling and Simulation, pp. 15-20.
[49] Hong Cai, Sos, Agaian, S., and Yufeng Wang, 2005, An Effective
Algorithm for Breaking F5, 7th IEEE International Workshop on
Multimedia Signal Processing, Shanghai, pp. 1-4.
[50] Hongchen Dou, Hongbin Zha, N.G., and Shuanghuan Zhan, 2004,
Independent Component Analysis Applied to Steganlysis, Proceedings of
7th International Conference on Signal Processing (ICSP), Vol. 3, No. 31,
pp. 2498-2501.
[51] http://www.jjtc.com/steganalysis/tools.html. (Access-date: 05-2-
2010).
[52] http://www.Stegoarchive.com (Access date: 05-02.2010).
[53] Jack Kelley., 2001, Terror Groups Hide Behind Web Encryption,
USA Today.
119
[54] Jacob Jackson, T., Gregg Gunsch, H., Roger Claypoole, L., Jr, and
Gary Lamont, B., 2003, Blind steganalysis Detection Using a
Computational Immune System: A Work in Progress, International
Journal of Digital Evidence, Vol. 4, No. 1, pp. 1-19.
[55] Johnson, N. F., and Jajodia, S., 1998, steganalysis: the
investigation of hidden information, Proceedings of the IEEE Information
Technology Conference, Syracuse, New York, USA, pp. 113-116.
[56] Johnson, N., and Jajodia, S., 1998, steganalysis of images created
using current steganalysis software, Journal of Information Hiding,
SpringerLink, Lecture notes in Computer Science, Vol. 1525, pp. 273-
289.
[57] Johnson, N., and Sklansky, J., 1998, Exploring steganalysis: seeing
the unseen, IEEE Computer, pp. 26-34.
[58] Ke Ke, Tao Zhao, and Ou Li, 2010, Bhattacharyya Distance for
Blind Image steganalysis, International Conference on Multimedia
Information Networking and Security (MINES), pp. 658-661.
[59] Kharrazi, M., Sencar, H.T., and Memon, N., 2005, Benchmarking
steganographic and steganalysis
17th Annual Symposium on Electronic Imaging Science and Technology,
San Jose, CA.
[60] Krenn, R., 2004, steganalysis and steganalysis, Retrieved from
http://www.krenn.nl/ univ/cry/ steg/ article.pdf.
[61] Li Hui, Sun Ziwen, and Zhou Zhiping, 2011, An image steganalysis
method based on characteristic function moments and PCA, proceedings
of Chinese Control Conference (CCC), pp. 3005-3008.
[62] Li Zhi, and Sui Ai Fen, 2004, Detection of Random LSB Image
steganalysis, 60th IEEE International Conference on Vehicular
Technology, Vol. 3, pp. 2113-2117.
120
[63] Liang Sun, Chong-Zhao Han, Ning Dai, and Jian-Jing Shen, 2006,
Feature Selection Based on Bhattacharyya Distance: A Generalized
Rough Set Method, Sixth World Congress on Intelligent Control and
Automation, WCICA, Vol. 2, pp. 101-105.
[64] Lingna Hu, Lingge Jiang, and Chen He, 2008, A novel steganalysis
of LSB matching based on kernel FDA in grayscale images, International
Conference on Neural Networks and Signal Processing, pp. 556-559.
[65] Liu Shaohu, I., Yao Hongxun., and Gao Wen., 2003, Neural
Network Based steganalysis in Still Images, IEEE International
Conference on Multimedia and Expo, (ICME), Vol. 2, pp. 509 - 512.
[66] Liu Shaohu, I., Yao Hongxun, and Gao Wen, 2004, steganalysis
Based on Wavelet Texture Analysis and Neural Network, Proceedings of
the 5th World Congress on Intelligent Control and Automation, China, pp.
4066-4069.
[67] Lyu, S., and Farid, H., 2004, steganalysis using color wavelet
statistics and one-class support vector machines, Proceeding of th Annual Symposium on Electronic Imaging Science and
Technology, San Jose, CA.
[68] Lyu, S., and Farid, H., 2002, Detecting Hidden Messages using
Higher order Statistics and Support Vector Machines, Lecture Notes in
Computer Science, Vol. 2578, pp. 340-354.
[69] Lyu, S., and Farid, H., 2004, steganalysis Using Color Wavelet
Statistics and One-Class Support Vector Machines, PIE Symposium on
Electronic Imaging, San Jose, CA.
[70] Malekmohamadi, H., and Ghaemmaghami, S., 2009, Reduced
complexity enhancement of steganalysis of LSB-matching image
steganalysis, IEEE/ACS International Conference on Computer Systems
and Applications, pp. 1013-1017.
121
[71] Martin, A., Sapiro G., and Seroussi G., 2004, Is image steganalysis
natural?, Information Theory Research Group, HP Laboratories Palo Alto,
HPL-39(R.1).
[72] Martin, A., Sapiro, G., and Seroussi, G., 2005, Is image
steganalysis natural? , IEEE Transactions on Image Processing, Vol. 14,
No. 12, pp. 2040-2050.
[73] Marvel, L., Boncelet Jr, C.G., and Retter, C.T., 1999, Spread
spectrum image steganalysis, IEEE Transaction on Image Processing,
Vol. 8, No. 8, pp. 1075-1083.
[74] Mehrabi, M.A., Faez, K., and Bayesteh, A.R., 2007, Image
steganalysis Based on Statistical Moments of Wavelet Sub band
Histograms in Different Frequencies and Support Vector Machine, 3rd
International Conference on Natural Computation, Vol. 1, pp. 587-590.
[75] Mei-Ching Chen, Agaian, S.S., Chen, C.L.P., and Rodriguez, B.M.,
2008, steganalysis detection using RBFNN, International Conference on
Machine Learning and Cybernetics, Vol. 7, pp. 3720-3725.
[76] Mei-Ching Chen, Agaian, S.S., Chen, C.L.P., and Rodriguez, B.M.,
2009, Alpha-trimmed image estimation for JPEG steganalysis detection
Systems, International Conference on Man and Cybernetics, pp. 4581-
4585.
[77] Meng Joo Er, Shiqian Wu, Juwei Lu, and Hock Lye Toh, 2002, Face
Recognition with Radial Basis Function(RBF) Neural Networks, IEEE
Transaction on Neural Networks, Vol. 13, No. 3, pp. 697-910.
[78] Ming Jiang, Edward Wong, Nasir Memon, and Xiaolin Wu, 2004, A
simple Technique for Estimating Message Lengths for Additive Noise
steganalysis, 8th International Conference on Control, Automation,
Robotics and Vision (ICARCV), Kunming, China, pp. 983-986.
[79] Muhanna, M., Turabieh, H., Aljarrah, O., and Elsayad., 2005, A
steganalysis of LSB Encoding in Digital Images Using GLCM and Neural
122
Networks, Proceedings of the 3rd International Conference on Informatics
and Systems (INFOS2005), Cairo, Egypt, Vol. 14, pp. 31-37.
[80] Neil Johnson, F., and Sushil Jajodia., 1998, steganalysis: the
investigation of hidden information, IEEE Information Technology
Conference, Syracuse, New York, USA, pp. 113-116.
[81] Neil Provos, and Peter Honeyman, 2003, Hide and Seek: An
Introduction to steganalysis, IEEE Security & Privacy, Vol. 1, No. 3, pp.
32-44.
[82] Onkar Dabeer, Kenneth Sullivan, Upamanyu Madhow, Shivakumar
Chandrasekaran, and Manjunath, B.S., 2004, Detection of Hiding in the
Least Significant Bit, IEEE Transactions on Signal Processing, Vol. 52,
No. 10, pp. 3046-3058.
[83] Petitcolas, F., Anderson, R., Kuhn, M., 1999, Information Hiding A
Survey, Proceeding of IEEE, Special Issue on protection on multimedia
content, Vol. 87, No. 7, pp. 1062-1078.
[84] Ping Wang, Fenlin Liu, Guodong Wang, Yifeng Sun, and Daofu
Gong, 2008, Multi-class steganalysis for Jpeg stego algorithms, 15th IEEE
International Conference on Image Processing, ICIP , pp. 2076-2079.
[85] Provos, N., and Honeyman, P., 2002, Detecting steganographic
CA.
[86] Provos N., 2001, Defending against statistical steganalysis, 10th
USENIX Security Symposium, Washington DC.
[87] Provos, N., and Honeyman, P., 2001, Detecting steganographic
content on the Internet, CITI Technical Report, pp. 01-11.
[88] Qian-lan, and Lin Jia-jun, 2009, A Universal steganalysis Using
Features Derived from the Differential Image Histogram in Frequency
Domain Deng, 2nd International Congress on Image and Signal
Processing, CISP'09, pp. 1-4.
123
[89] Qingzhong Liu, Andrew Sung, H., Jianyun Xu, and Bernardete
Ribeiro, M., 2006, Image Complexity and Feature Extraction for
steganalysis of LSB Matching steganalysis, 18th International Conference
on Pattern Recognition, Vol. 2, pp. 267-270.
[90] Rajarathnam Chandramouli, Mehdi Kharrazi, and Nasir Memon,
2004, Image steganalysis and steganalysis: Concepts and Practice,
Lecture Notes in Computer Science, International Workshop on Digital
Watermarking, Korea, Vol. 2939, pp. 35-49.
[91] Ramezani, M., and Ghaemmaghami, S., 2010, Towards Genetic
Feature Selection in Image steganalysis, 7th IEEE Consumer
Communications and Networking Conference (CCNC), pp.1-4.
[92] Roue, B., Bas, P., and Chassery, MJ., 2004, Improving LSB
steganalysis using marginal and joint probabilistic distributions,
Proceedings of ACM Multimedia and Security Workshop, pp. 75 80.
[93] Ryan Benton, and Henry Chu, 2005, Soft Computing Approach to
steganalysis of LSB Embedding in Digital Images, Third International
Conference on Information Technology: Research and Education, ITRE,
pp. 105-109.
[94] Sallee, P., 2005, Model-based methods for steganalysis and
steganalysis, International Journal of Image and Graphics (IJIG), Vol. 5,
No. 1, pp. 167 190.
[95] Seongho Cho, Byung-Ho Cha, Jingwei Wang, and Jay Kuo, C.-C.,
2010, Block-based image steganalysis, Algorithm and performance
evaluation, Proceedings of IEEE International Symposium Circuits and
Systems (ISCAS), pp. 1679-1682.
[96] Seongho Cho, Jingwei Wang, Jay Kuo, C.-C., and Byung-Ho Cha,
2010, Block-based image steganalysis for a multi-classifier, IEEE
International Conference on Multimedia and Expo (ICME), pp. 1457-
1462.
124
[97] Trivedi, S., and and Chandramouli, R., 2003, Active steganalysis of
Sequential steganalysis, SPIE conference California 5020, Vol. 13, pp.
123-130.
[98] Trivedi, S., and and Chandramouli, R., February 2005, Secret Key
Estimation in Sequential steganalysis, IEEE Transaction on Signal
Processing, Vol. 53, No. 2, pp. 746-757.
[99] Shaohui Liu, Lin Ma, Hongxun Yao, and Debin Zhao, 2009, Universal
steganalysis Based on Statistical Models Using Reorganization of Block-
based DCT Coefficients, 5th International Conference on Information
Assurance and Security, Vol. 1, pp. 778-781.
[100] Sheikhan, M., Moin, M.S., and Pezhmanpour, M., 2010, Blind
image steganalysis via joint co-occurrence matrix and statistical
moments of Contourlet transform, 10th International Conference on
Intelligent Systems Design and Applications (ISDA), pp. 368-372.
[101] Guorong Xuan, Jianjiong Gao, Shi, Y.Q., and Zou, D., 2005, Image
steganalysis Based on Statistical Image Moments of Wavelet Sub band
Histograms in DFT Domain, IEEE 7th International Workshop on
Multimedia Signal Processing, Shanghai, China, pp.1-4.
[102] Shi, Y.Q., Guorong Xuan, Zou, D., Jianjiong Gao, Chengyun Yang,
Zhenping Zhang, Peiqi Chai, Chen, W., and Chen, C., 2005, Image
steganalysis based on moments of characteristic functions using wavelet
decomposition, prediction-error image, and neural network, IEEE
International Conference on Multimedia and Expo, ICME, pp.1-4.
[103] Shreelekshmi, 2005, Statistical Techniques for Digital Image
steganalysis, ME Thesis, under supervision of C E Veni Madhavan.
[104] Sidorov, M., 2004, Hidden Markov models and steganalysis,
Proceeding of ACM Multimedia and Security Workshop, pp. 63 67.
[105]
Channel, CRYPTO83, Advances in Cryptology, pp. 51-67.
125
[106] Dumitrescu, S., and Xiaolin Wu, 2005, A New Framework of LSB
steganalysis of Digital Media, IEEE Transactions on Signal Processing,
Vol. 53, No. 10, pp. 3936 3947.
[107] Dumitrescu, S., Xiaolin Wu, and Zhe Wang, 2003, Detection of LSB
steganalysis via Sample Pair Analysis, IEEE Transactions on Signal
Processing, Vol. 51, No. 7, pp. 1995-2007.
[108] Sullivan, K., Bi, Z., Madhow, U., Chandrasekaran, S., and
Manjunath, B.S., 2004, steganalysis of quantization index modulation
data hiding, Proceedings of IEEE International Conference on Image
Processing (ICIP), pp. 1165-1168. [109] Tao Zhang, Yan Zhang, Xijian
Ping, and Mingwu Song, 2006, Detection of LSB steganalysis Based on
Image Smoothness, IEEE International Conference on Multimedia and
Expo, pp. 1377-1380.
[110] Tariq Al Hawi, Mahmoud Al Qutayri, and Barada Hassan, 2004,
steganalysis attacks on stego images using stego-signatures and
statistical image properties, IEEE International Conference on Analog and
Digital Techniques in Electrical Engineering, Thailand, Vol. 2, pp. 104-
107.
[111] Tzschoppe, R., Bauml, R., Huber, J.B., and Kaup, A., 2003,
steganographic system based on higher-order statistics, Proceedings of th Annual Symposium on Electronic Imaging Science and
Technology, San Jose, CA.
[112] Vu Dao, N.P., and Rao Vemuri, 2002, A Performance Comparison
of Different Back Propagation Neural Networks Methods in Computer
Network Intrusion Detection, Differential Equations and Dynamical
Systems, Vol. 10, No. 1, pp. 201-214.
[113] Wang, Y., and Moulin, P., 2004, steganalysis of block-structured
Stego th Annual Symposium on
Electronic Imaging Science and Technology, San Jose, CA.
126
[114] Yong Wang, JiuFen Liu, and WeiMing Zhang, 2009, Blind JPEG
steganalysis Based on Correlations of DCT Coefficients in Multi-directions
and Calibrations, International Conference on Multimedia Information
Networking and Security, MINES'09, Vol. 1, pp. 495-499.
[115] Wayner, P., 2002, Disappearing cryptography, Morgan Kaufmann
Publications.
[116] Wenqiong Yu, Zhuo Li, and Lingdi Ping, 2010, Blind detection for
JPEG steganalysis, International Conference on Networking and
Information Technology (ICNIT), pp. 128-132.
[117] Wenqiong Yu, Zhuo Li, and Lingdi Ping, 2010, A Hidden
Information Blind Detection Method Based on Rough Set Theory, Chinese
Conference on Pattern Recognition (CCPR), pp. 1-5.
[118] Wenqiong Yu, Zhuo Li, and Lingdi Ping, 2010, steganalysis
Algorithm Based on the D Reduction of Improved Differential Matrix in
Images, Chinese Conference on Pattern Recognition (CCPR), pp. 1-7.
[119] Westfeld, A., and Pfitzmann, A., 1999, Attacks on steganographic
systems, Lecture notes in computer science, proceedings of the 3rd
International Workshop on Information Hiding, Vol. 1768, pp. 61-76.
[120] Westfeld, A., 2001, High capacity despite better steganalysis (F5 -
a steganographic algorithm), Lecture notes in computer science,
4th International Workshop on Information Hiding, Vol. 2137, pp. 289-
302.
[121] Westfeld, A., and Pfitzmann, A., 2000, Attacks on steganographic
Systems, Lecture Notes in Computer Science, Springer-Verlag, Berlin,
Vol. 1768, pp. 61-75.
[122] Wu, X., Dumitrescu, S., and Wang, Z., 2002, Detection of lsb
steganalysis via sample pair analysis, Proceedings of 5th International
Workshop on Information Hiding, Noordwijkerhout, The Netherlands,
pp.355-372.
127
[123] Xiangyang Luo, Bin Liu, and Fenlin Liu, 2005, Detecting LSB
steganalysis Based on Dynamic Masks, Proceedings of 5th International
pp. 251-255.
[124] Xiangyang Luo, Qingxian Wang, Chunfang Yang, and Fenlin Liu,
2006, Detection of LTSB steganalysis Based on Quartic Equation,
Proceedings of 8th International Conference on Advanced Communication
Technology (ICACT), Vol. 2, pp. 1199-1204.
[125] Xiao Yi Yu, and Aiming Wang, 2009, An Investigation of Genetic
Algorithm on steganalysis Techniques, Fifth International Conference on
Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP
'09. pp. 1118-1121.
[126] Xiao Yi Yu, and Aiming Wang, 2009, steganalysis Based on
Regression Model and Bayesion Network, International Conference on
Multimedia Information Networking and Security, MINES'09, Vol. 1, pp.
41-44.
[127] Xiao Yi Yu, and Aiming Wang, 2009, steganalysis Based on
Bayesion Network and Genetic Algorithm, 2nd International Congress on
Image and Signal Processing, CISP'09, pp. 1-4.
[128] Xiao Yi Yu, and Aiming Wang, 2009, An Investigation of Genetic
Algorithm on steganalysis Techniques, 5th International Conference on
Intelligent Information Hiding and Multimedia Signal Processing,
pp. 1118-1121.
[129] Xiaoyuan Yang, Shifeng Wang, and Jia Liu, 2009, Universal
steganalysis to Images with WBMC Model, Fifth International Conference
on Information Assurance and Security, IAS'09, Vol. 2, pp. 627-630.
[130] Xiaoyuan Yang, Yu Lei, Xiaozhong Pan, and Jia Liu, 2009,
Universal Image steganalysis Based on Wavelet Packet Decomposition
and Empirical Transition Matrix in Wavelet Domain, International Forum
128
on Computer Science Technology and Applications, IFCSTA'09, Vol. 2 ,
pp. 179-182.
[131] Xiongfei He, Fenlin Liu, Xiangyang Luo, and Chunfang Yang, 2009,
Classification between PS and stego images Based on Noise Model, 3rd
International Conference on Multimedia and Ubiquitous Engineering, pp.
31-36.
[132] Xue Zhang, and Shang-Ping Zhong, 2009, Blind steganalysis
method for BMP images based on statistical MWCF and F-score method,
International Conference on Wavelet Analysis and Pattern Recognition,
pp. 442-447.
[133] Yamini, B, and Sabitha, R., 2010, Steganalytic attack for an
adaptive steganalysis using support vector machine, International
Conference on Emerging Trends in Robotics and Communication
Technologies (INTERACT), pp. 56-58.
[134] Ying Wang, and Pierre Moulin, 2007, Optimized Feature Extraction
for Learning-Based Image steganalysis, IEEE Transactions on
Information Forensics and Security, Vol. 2, No. 1, pp. 31-45.
[135] Yuan Liu, Li Huang, Ping Wang, and Guodong Wang, 2008, A blind
image steganalysis based on features from three domains, Proceedings
of Control and Decision Conference (CCDC), pp. 2933-2936.
[136] Yun Shi, Q., Guorong Xuan, Chengyun Yang, Jianjiong Gao,
Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, and Wen Chen,
2005, Effective steganalysis Based on Statistical Moments of Wavelet
Characteristic Function, IEEE International Conference on Information
Technology: Coding and Computing, Vol. 1, pp. 768-773.
[137] Zhang, T., and Ping, X., 2003, A new approach to reliable
detection of LSB steganalysis in natural images, Signal Processing,
Science Direct, Vol. 83, No. 10, pp. 2085-2093.
129
[138] Zhi-Min He, Ng, W.W.Y., Chan, P.P.K., and Yeung, D.S., 2011,
Blind steganalysis with high generalization capability for different image
databases using L-GEM, International Conference on Machine Learning
and Cybernetics (ICMLC), Vol. 4, pp. 1690-1695.
[139] Zhiping Zhou, and Maomao Hui, 2009, steganalysis for Markov
Feature of Difference Array in DCT Domain, Sixth International
Conference on Fuzzy Systems and Knowledge Discovery, FSKD'09, Vol.
7, pp. 581-584.
[140] Zhuo Li, Kuijun Lu, Xianting Zeng, and Xuezeng Pan, 2009,
Feature-Based steganalysis for JPEG Images, International Conference
on Digital Image Processing, pp. 76-80.
[141] Ziwen Sun, Hui Li, Zhijian Wu, and Zhiping Zhou, 2009, An Image
steganalysis Method Based on Characteristic Function Moments of
Wavelet Sub bands, International Conference on Artificial Intelligence
and Computational Intelligence, Vol. 1, pp. 291-295.
[142] Ziwen Sun, Maomao Hui, and ChaoGuan, 2008, steganalysis Based
on Co-occurrence Matrix of Differential Image, International Conference
on Intelligent Information Hiding and Multimedia Signal Processing,
IIHMSP'08, pp. 1097-1100. [143] Ziwen Sun, Maomao Hui, and
ChaoGuan, 2008, steganalysis Based on Co-occurrence Matrix of
Differential Image, International Conference on Intelligent Information
Hiding and Multimedia Signal Processing, IIHMSP'08, pp. 1097-1100.
[144] Zolner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke,
R., Westfeld, A., Wicke, G., and Wolf, G., 1998, Modeling the security of
steganographic systems, Lecture notes in computer science,
2nd International Workshop on Information Hiding, Vol. 1525, pp. 345
355.
[145] Zugen Liu, Xuezeng Pan, Lie Shi, Jimin Wang, and Lingdi
Ping, 2006, Effective steganalysis based on statistical moments of
130
differential characteristic function, International Conference on
Computational Intelligence and Security, Vol. 2, pp. 1195-1198.
[146] Weng, S., Zhao, Y., Pan, J.S., and Ni, R., 2008, Reversible data
hiding using the companding technique and improved DE method,
Circuits Systems and Signal Processing, Vol. 27, No. 2, pp. 229 245.
[147] Wei-Liang Tai, Chia-Ming Yeh, and Chin-Chen Chang, 2009,
Reversible data hiding based on histogram modification of pixel
differences, IEEE Transactions on Circuits and Systems for Video
Technology, Vol. 19, No. 6, pp. 906 910.
[148] Zhe-Ming Lu, Wang, JX., and Liu, BB., 2009, An improved lossless
data hiding scheme based on image VQ-index residual value coding,
Journal of Systems and Software, Vol. 82, No. 6, pp. 1016 1024.
[149] Wang. JX., and Lu, ZM., 2009, A path optional lossless data hiding
scheme based on VQ index table joint neighboring coding, International
journal of Information Sciences, Vol. 179, No. 19, pp. 3332-3348.
[150] Yang, B., Lu, ZM., and Sun, SH., 2005, Reversible watermarking in
the VQ-compressed domain, Proceedings of the fifth international
conference on visualization, imaging, and image processing, pp. 289
303.
[151] Chin-Chen Chang, Lin, CY., and Fan, YH., 2008, Lossless data
hiding for color images based on block truncation coding, Pattern
Recognition, Vol. 41, No. 7, pp. 2347 2357.
[152] Mobasseri, B.G., and Cinalli, D., 2006, Lossless watermarking of
compressed media using reversibly decodable packets, journal of Signal
Processing, Vol. 86, No. 5, pp. 951 961.
[153] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su, 2003,
915.
[154] Yu-Chiang Li, Chia-Ming Yeh, and Chin-Chen Chang , 2009, Data
hiding based on the similarity between neighboring pixels with
131
reversibility, International journal for Digital Signal Processing, Vol. 20,
No. 4, pp. 1116-1128.
[155] Tian, J., 2003, Reversible data embedding using a difference
expansion, IEEE Transactions on Circuits and Systems for Video
Technology, Vol. 13, No. 8, pp. 890 896.
[156] Piyu Tsai, Yu-Chen Hu, and Hsiu-Lien Yeh, 2009, Reversible image
hiding scheme using predictive coding and histogram shifting,
International journal of Signal Processing, Vol. 89, No. 6, pp. 1129-1143.
[157] Alattar, A.M., 2004, Reversible watermark using the difference
expansion of a generalized integer transform, IEEE Transactions on
Image Processing, Vol. 13, No. 8, pp. 1147-1156.
[158] Hu, Y., Lee, H.K., and Li, J., 2009, DE-based reversible data hiding
with improved overflow location map, IEEE Transactions on Circuits and
systems for Video Technology, Vol. 19, No. 2, pp. 250-260.
[159] Lin, C.C., Tai, W.L., and Chang, C.C, 2008, Multilevel reversible
data hiding based on histogram modification of difference images,
International journal of Pattern Recognition, Vol. 41, No. 12, pp. 3582-
3591.
[160] Yambem Jina Chanu, Manglem Singh, and Themrichon Tuithung,
2012, Image steganalysis and steganalysis: A Survey, International
journal of Computer Applications, Vol. 52, No. 2, pp. 1-11.
[161] Rengarajan Amirtharajan, Jiaohua Qin, and John Bosco Balaguru
Rayappan, 2012, Random Image steganalysis and steganalysis: Present
Status and Future Directions, Infromation Technology Journal, No. 11,
pp. 566-576.
[162] Natarajan, V., and Anitha, R., 2012, Blind Image steganalysis
Based on Contourlet Transform, International journal on Cryptography &
Information Security, Vol. 2, No. 3, pp. 77-87.
132
[163] Xiaochuan Chen, Yunhong Wang, Tienjui Tan, and Lei Guo, 2006,
Blind Image steganalysis Based on Statistical Analysis, 18th International
Conference on Pattern Recognition, Vol. 3, pp. 1107 1110.
[164] Xiangyang Luo, Fenlin Liu, Jianming Chen, and Yining Zhang,
2008, Image universal steganalysis based on wavelet packet transform,
IEEE 10th Workshop on Multimedia Signal Processing, pp. 780 - 784.
[165] Jing-Qu Lin, and Shang-Ping Zhong, 2009, JPEG image
steganalysis method based on binary similarity measures, International
Conference on Machine Learning and Cybernetics, Vol. 4, pp. 2238 -
2243.
[166] Yuan-lu Tu, and Sheng- rong Gong, 2008, Universal steganalysis
Using Color Correlation and Feature Fusion, International Symposium on
Information Science and Engineering, ISISE'08, Vol. 1, pp. 107 - 111.
[167] Zhi-Min, He., Ng, Wing W y., Chan, Patrick, P K., Yeung, and
Daniel, S., 2010, steganalysis detection using localized generalization
error model, IEEE International Conference on Systems Man and
Cybernetics (SMC), pp. 1544 1549.
[168] Lie, W-N., and Lin, G.S., 2005, A feature based classification for
blind image steganalysis, IEEE Transactions on Multimedia, Vol. 7, No. 6,
pp. 1007- 1020.
[169] Liu Shaohui, Yao Hongxun, and Gao Wen, 2003, Neural Network
Based steganalysis in Still Images, Proceedings of International
Conference on Multimedia and EXPO, Vol. 2, pp. 509-512.
[170] Sedighe Ghanbari , Manije Keshtegary, and Najme ghanbari ,
2012, New steganalysis Method using Glcm and Neural Network,
International Journal of Computer Applications, Vol. 42, No. 7, pp. 45-
50.
[171] Anitha, P.T., Rajaram M., and Sivanandham, S.M., 2012, A hybrid
approach for detecting stego content in corporate mail using NN based
133
simplified data encryption standard algorithm, American Journal of
Applied Sciences, Vol. 9, No. 5, pp. 766-771.
[172] Patricia Lafferty, and Farid Ahmed, 2004, Texture based
steganalysis: results for color images, Proceedings of SPIE, Vol. 5561,
pp. 145-151.
[173] Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su, 2006,
Reversible Data Hiding, IEEE Transactions on circuits and systems for
video technology, Vol. 16, No. 3, pp. 354 362.
[174] Mohsenzadeh, Y., Mohajeri, J., and Ghaemmaghami, S., 2009,
Histogram shift steganography: A technique to thwart histogram based
steganalysis, Proceedings of 2nd International Workshop on Computer
Science and Engineering, Vol. 2, pp. 166-170.
[175] Daniel Lerch-
Methods for the Detection of Histogram Shifting Data Hiding Schemes,
Proceedings of Reunión Española Cryptology and Information Security
(RECSI).