References
- D. Upham: http://www.funet.fi/pub/crypt/stegangraphy/jpeg-jsteg-v4.di(R).gz.
- N. Provos: Defending against statistical steganalysis. Proc. of 10th USENIX Security Symposium, Washington, DC, 2001.
- A. Westfeld: High capacity despite better steganalysis (F5 - a steganographic algorithm). Lecture Notes in Computer Science, vol. 2137, pp. 289 - 302, 2001. https://doi.org/10.1007/3-540-45496-9_21
- J. Eggers, R. Bauml, and B. Girod: A communications approach to steganography. Proc. of EI SPIE, vol. 4675, pp. 26 - 37, San Jose, CA, 2002.
- H.Noda, M. Niimi, and E. Kawaguchi: Application of QIM with dead zone for histogram preserving JPEG steganography. Proc. of ICIP, Genova, Italy, 2005.
- K. Solanki, A. Sakar, and B.S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. Information Hiding, 9th International Workshop Saint Malo, 2007.
- D. SchAonfeld and A. Winkler: Reducing the complexity of syndrome coding for embedding. Lecture Notes in Computer Science, vol. 4567, 2008, 145 - 158.
- R. Zhang, V. Sachnev, and H. J. Kim: Fast BCH syndrome coding for steganography. Lecture Notes in Computer Science, vol. 5806, pp. 48 - 58, 2009. https://doi.org/10.1007/978-3-642-04431-1_4
- V. Sachnev, H. J. Kim, R. Zhang, Less Detectable JPEG Steganography Method Based on Heuristic Optimization and BCH Syndrome Coding, Proceeding of the 11th ACM workshop on Multimedia and Security, pp 131 - 140, Princeton, 2009.
- T. Filler, J. Judas, and J. Fridrich, "Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes," IEEE Transaction on Information Forensics and Security, vol. 6, n. 3, pp. 920-935, 2011. https://doi.org/10.1109/TIFS.2011.2134094
- J. Fridrich, "Minimizing the embedding impact in steganography," Proceedings of ACM Multimedia and Security Workshop, pp. 2-10, 2006.
- J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography," Proceedings of SPIE, vol. 6505, pp. 2-3, 2007.
- J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography," ACM Multimedia and Security Journal, vol. 11, no. 2, pp. 98-107, 2005. https://doi.org/10.1007/s00530-005-0194-3
- J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography using wet paper codes," Proceedings of ACM Workshop on Multimedia and Security, pp. 4-15, 2004.
- J. Fridrich, T. Pevny, and J. Kodovsky, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," Proceedings of ACM Workshop on Multimedia and Security, pp. 3-15, 2007.
- J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images", IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868 - 882, 2012. https://doi.org/10.1109/TIFS.2012.2190402
- J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Security and Forensics, Vol. 7, No. 2, pp. 432-444, 2012. https://doi.org/10.1109/TIFS.2011.2175919
- V. Sachnev, H. J. Kim, Ternary Data Hiding Technique for JPEG Steganography, Lecture Notes and Computer Science, vol. 6526, pp 202 - 210.
- Y. H. Kim, Z. Duric, and D. Richards, Modified matrix encoding technique for minimal distortion steganography. Information Hiding, 8th International Workshop, vol. 4437, pp. 314 - 327, Springer-Verlag, Berlin, 2006
- P. Bass, T. Filler, T. Pevny, "Break Our Steganographic System - the ins and outs of organizing BOSS", In proceedings of 13th Information Hiding Conference, Prague, 2011.
- Y. S. Choi and J. H. Kim, "A Steganography Method Improving Image Quality and Minimizing Image Degradation," J. of Digital Contents Society, Vol.17, No.5, 2016
Cited by
- Improved histogram shifting-based data hiding method with alternative skipping method for image retrieval vol.35, pp.6, 2016, https://doi.org/10.3233/jifs-169859