과제정보
연구 과제 주관 기관 : 경찰청, 치안과학기술연구개발사업단
참고문헌
- Huayong, Ge, Huang Mingsheng, and Wang Qian, "Steganography and Steganalysis based on digital image," Image and Signal Processing (CISP), Vol. 1, pp. 252-255, 2011.
- T. Pevny, T. Filler, and P. Bas, "Using High-Dimensional Image Models to Perform Highly Undetectable Steganography," International Workshop on Information Hiding, Vol. 6387, No. 1, pp. 161-177, 2010.
- V. Holub, J. Fridrich, and T. Denemark, "Universal Distortion Function for Steganography in an Arbitrary Domain," EURASIP Journal on Information Security, pp. 1-13, Jan. 2014.
- V. Holub and J. Fridrich, "Designing Steganographic Distortion Using Directional Filters," IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234-239, 2012.
- Dhobale, D. D. et al., "Steganography by hiding data in TCP/IP headers," 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Vol. 4, pp. 61-65, 2010.
- J. Fridrich and J. Kodovsky, "Rich Models for Steganalysis of Digital Images," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 3, pp. 868-882, 2012. https://doi.org/10.1109/TIFS.2012.2190402
- J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble Classifiers for Steganalysis of Digital Media," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 432-444, 2012. https://doi.org/10.1109/TIFS.2011.2175919
- Yinlong Qian, et al., "Deep Learning for Steganalysis via Convolutional Neural Networks," Proc. of SPIE Media Watermarking, Security, and Forensics, pp. 94090J-94090J-10, 2015.
- Lionel Pibre et al., "Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch," Proc. of Media Watermarking, Security, and Forensics, 2016.
- LeCun, Yann, et al., "Gradient-based learning applied to document recognition," Proc. of the IEEE, Vol. 86, No. 11, pp. 2278-2324, 1998. https://doi.org/10.1109/5.726791
- P. Bas, T. Filler, and T. Pevny, "Break Our Steganographic System': The Ins and Outs of Organizing BOSS," Proc. of the 13th International Conference on Information Hiding, Vol. 6958, pp. 59-70, 2011.