참고문헌
- F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding - a survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, 1999. https://doi.org/10.1109/5.771065
- C. Abbas, C. Joan, C. Kevin and M. Paul, "Digital image steganography : Survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, 2010. https://doi.org/10.1016/j.sigpro.2009.08.010
- A. Nissar, and A. H. Mir, "Classification of steganalysis techniques: A study", Digital Signal Processing, vol. 20, no, 6, pp. 1758-1770, 2010. https://doi.org/10.1016/j.dsp.2010.02.003
- H. Farid, S. Lyu, "Detecting hidden messages using higher order statistics and support vector machines", Lecture Notes in Computer Science, vol. 2578, pp. 340-354, 2002.
- Y. Wang, P. Moulin, "Optimized feature extraction for learning-based image steganalysis," IEEE Transactions on Image Processing, vol. 2, no. 1, pp. 31-45, 2007.
- X. Luo, F. Liu, S. Lian, C. Yang, S. Gritzalis, "On the typical statistic features for image blind steganalysis," IEEE Journal on Selected Areas in Communications, vol. 29, no. 7, pp. 1404-1422, 2011. https://doi.org/10.1109/JSAC.2011.110807
- M. Tang, J. Hu, M. Fan and W. Song, "A steganalysis by adjacency pixel bits structure," Computers and Electrical Engineering, vol. 39, no. 2, pp. 488-498. 2013. https://doi.org/10.1016/j.compeleceng.2012.09.008
- Q. Liu, A. H. Sung, B. Ribeiro, M. Wei, Z. Chen, J. Xu, "Image complexity and feature mining for steganalysis of least significant bit matching steganography," Information Sciences, vol. 178, pp. 21-36, 2008. https://doi.org/10.1016/j.ins.2007.08.007
- T. H. Park, S. H. Hyun, J. H. Kim and I. K. Eom, "Steganalysis using joint moment of wavelet subbands," Journal of IEEK, vol. 48-SP, no. 3, pp. 71-78, 2011.
- T. Pevny, P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE transaction on Information Forensics and Security. vol. 5, no. 2, pp. 215-224, 2010. https://doi.org/10.1109/TIFS.2010.2045842
- T. Pevny, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," Lecture Notes in Computer Science, vol. 6387, pp. 161-177, 2010.
- V. Holub and J. Fridrich, "Digital image steganography using universal distortion." Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 59-68, 2013.
- V. Holub, J. Fridrich and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP Journal on Information Security, vol. 2014:1, pp. 1-13, 2014.. https://doi.org/10.1186/1687-417X-2014-1
- J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transaction on Information Forensics and Security. vol. 7, no. 2, pp. 432-444, 2012. https://doi.org/10.1109/TIFS.2011.2175919
- Q. Liu, "Steganalysis of DCT-embedding based adaptive steganography and YASS," Proceedings of the thirteenth ACM Multimedia Workshop on Multimedia and Security, pp. 77-86), 2011.
- J. Fridrich, J. Kodovsky, V. Holub, and M. Goljan, "Steganalysis of content-adaptive steganography in spatial domain," Lecture Notes in Computer Science, vol. 6958, pp. 102-117, 2011.
- V. Holub, J. Fridrich, "Random projections of residuals for digital image seganalysis," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1996-2006, 2013. https://doi.org/10.1109/TIFS.2013.2286682
- T. Denemark, J. Fridrich and V. Holub, "Further Study on the Security of S-UNIWARD," Proceedings of SPIE Media Watermarking, Security, and Forensics, vol. 9028, pp. p. 902805-1-902805-13, 2014.
- NRCS Photo Gallery, http://photogallery.nrcs.usda.gov/res/sites/photogallery
- Bossbase1.01, http://www.agents.cz/boss
- I. H. Witten, and E. Frank, Data Mining, Elservier, 2005.
- A. Westfeld, "ROC curves for steganalysis," Proceedings of the third WAVILA Challenge, pp. 39-45, 2007.