References
- J. Kim and H. Park, "A statistical approach for improving the embedding capacity of block matching based image steganography, Journal of Broadcast Engineering, Vol. 22, No. 5, 2017.
- W. Sohn and L. N. T. dung, "A blind watermarking scheme using singular vector based on DWT/RDWT/SVD," Journal of Broadcast Engineering, Vol. 21, No. 2, pp. 149-156, 2016. https://doi.org/10.5909/JBE.2016.21.2.149
- J. Seon-Su, "A study of optimal image steganography based on LSB techniques," Journal of the Korea Industrial Information Systems Reasearch, Vol. 20, No. 3, pp. 29-36, 2015.
- D. Wu and W. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Latters, Vol. 24, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
- J. Kim and H. Park, "Image steganography using layered pixel-value differencing," Jounal of Broadcasting Engineering, Vol. 22, No. 3, 2017.
-
G. Cancelli, G. Doerr, I. J. Cox and M. Barni, "Detection of
${\pm}$ 1 LSB steganography based on the amplitude of histogram local extrema," ICIP, 2008. - T. Pevny. P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 215-224, 2010. https://doi.org/10.1109/TIFS.2010.2045842
- J. Fridrich, Member, IEEE and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 3, pp. 868-882, 2012. https://doi.org/10.1109/TIFS.2012.2190402
- J. Kodovsky, J. Fridrich, Member, IEEE and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 432-444, 2012. https://doi.org/10.1109/TIFS.2011.2175919
- J. Ye, J. Ni, Member, IEEE and Y. Yi, "Deep learning hierarchical representations for image steganalysis," IEEE Transactions on Information Forensics and Security, Vol. 12, No. 11, pp. 2545-2557, 2017. https://doi.org/10.1109/TIFS.2017.2710946
- L. Pibre, J. Pasquet, D. ienco and M. Chaumont, "Deep learning is a good steganalysis tool when embedding key is reused for different im ages even if there is a cover source-mismatch," Society for Imagng Science and Technology, 2016.
- S. Kim and D. S. Han, "Real time traffic light detection algorithm based on color map and multilayer HOG-SVM," Journal of Broadcast Engineering, Vol. 22, No. 1, pp. 62-69, 2017. https://doi.org/10.5909/JBE.2017.22.1.62
- C. Cortes and V. Vapnik, "Support-vector networks," Machine Learning, Vol. 20, pp. 273-297, 1995.
- C. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, Vol.. 37, pp. 469-474, 2004. https://doi.org/10.1016/j.patcog.2003.08.007
- P. Bas, T. Filler and T. Pevny, "'Break our steganographic system': The ins and outs of organizing boss," in Proc. Int. Workshop Inf. Hiding, pp. 59-70, 2011.