10.07.2015 Views

A more secure steganography based on adaptive pixel-value ...

A more secure steganography based on adaptive pixel-value ...

A more secure steganography based on adaptive pixel-value ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Multimed Tools Appl6. Li B, Huang J, Shi Y (2008) Textural features <str<strong>on</strong>g>based</str<strong>on</strong>g> universal steganalysis. In: Proceedings of theSPIE <strong>on</strong> security, forensics, <str<strong>on</strong>g>steganography</str<strong>on</strong>g> and watermarking of multimedia, vol 6819, pp 6819127. Li X, Zeng T, Yang B (2008), Detecting LSB matching by applying calibrati<strong>on</strong> technique fordifference image. In: Proceedings of the 10th ACM workshop <strong>on</strong> multimedia and security,Oxford, United Kingdom, pp 133–1388. Nguyen B, Yo<strong>on</strong> S, Lee H (2006) Multi bit plane image <str<strong>on</strong>g>steganography</str<strong>on</strong>g>. In: Proceedings of 5thint. workshop <strong>on</strong> digital watermarking, pp 61–709. Noda H, Spaulding J (2002) Bit-plane decompositi<strong>on</strong> <str<strong>on</strong>g>steganography</str<strong>on</strong>g> combine with JPEG2000compressi<strong>on</strong>. In: Proceedings of 5th int. workshop <strong>on</strong> informati<strong>on</strong> hiding, pp 295–30910. NRCS Photo Gallery (2005) Available at: http://photogallery.nrcs.usda.gov/11. Pereira S, Voloshynovskiy S, Madueno M, Marchand-Maillet S, Pun T (2001) Sec<strong>on</strong>d generati<strong>on</strong>benchmarking and applicati<strong>on</strong> oriented evaluati<strong>on</strong>. In: Informati<strong>on</strong> hiding workshop III, pp 340–35312. Provos N (2001) Defending against statistical steganalysis. In: Proceedings of 10th c<strong>on</strong>f. <strong>on</strong>USENIX security symposium13. Schaefer G, Stich M (2003) Ucid: an uncompressed color image database. In: Proceedings ofSPIE electr<strong>on</strong>ic imaging, storage and retrieval methods and applicati<strong>on</strong>s for multimedia, vol5307, pp 472–48014. Shi Y, Xuan G, Zou D, Gao J, Yang C, Zhang Z, Chai P, Chen W, Chen C (2005) Image steganalysis<str<strong>on</strong>g>based</str<strong>on</strong>g> <strong>on</strong> moments of characteristic functi<strong>on</strong>s using wavelet decompositi<strong>on</strong>, predicti<strong>on</strong>errorimage, and neural network. In: IEEE int. c<strong>on</strong>f. <strong>on</strong> multimedia and expo15. Unser M (1986) Local linear transforms for texture measurements. Signal Process 11(1):61–7916. Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T (1999) A stochastic approach to c<strong>on</strong>tent<strong>adaptive</strong> digital image watermarking. In: Workshop <strong>on</strong> informati<strong>on</strong> hiding, pp 211–23617. Voloshynovskiy S, Pereira S, Herrigel A, Baumgartner N, Pun T (2000) Generalized watermarkingattack <str<strong>on</strong>g>based</str<strong>on</strong>g> <strong>on</strong> watermark estimati<strong>on</strong> and perceptual remodulati<strong>on</strong>. In: Proceedings of SPIE,vol 3971, pp 358–37018. Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: towards a sec<strong>on</strong>d generati<strong>on</strong>watermarking benchmark. Signal Process 81:1177–121419. Wang Y, Moulin P (2007) Optimized feature extracti<strong>on</strong> for learning-<str<strong>on</strong>g>based</str<strong>on</strong>g> image steganalysis.IEEE Trans. <strong>on</strong> Informati<strong>on</strong> Forensics and Security 2(1):31–4520. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substituti<strong>on</strong> and genetic algorithm.Pattern Recogn 34(3):671–68321. Westfeld A (2001) F5—a steganographic algorithm high capacity despite better steganalysis. In:Proceedings of 4th int. workshop <strong>on</strong> informati<strong>on</strong> hiding, pp 289–30222. Wu DC, Tsai WH (2003) A steganographic method for images by <strong>pixel</strong>-<strong>value</strong> differencing.Pattern Recogn Lett 24:1613–162623. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme <str<strong>on</strong>g>based</str<strong>on</strong>g> <strong>on</strong> <strong>pixel</strong>-<strong>value</strong>differencing and LSB replacement methods. In: Proceeding of IEE inst. elect. eng., vis. imagessignal process, vol 152, no 5, pp 611–61524. Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images withspatial LSB domain systems. IEEE Trans. <strong>on</strong> Informati<strong>on</strong> Forensics and Security 3(3):488–49725. Zhang X, Wang S (2004) Vulnerability of <strong>pixel</strong>-<strong>value</strong> differencing <str<strong>on</strong>g>steganography</str<strong>on</strong>g> to histogramanalysis and modificati<strong>on</strong> for enhanced security. Pattern Recogn Lett 25:331–33926. Zhang X, Wang S (2005) Steganography using multiple-<str<strong>on</strong>g>based</str<strong>on</strong>g> notati<strong>on</strong>al system and human vis<strong>on</strong>sensitivity. IEEE Signal Process Lett 12(1):66–70

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!