1 |
R.W. Buccigrossi, E.P. Simoncelli, "Image Compression via Joint Statistical Characterization in the Wavelet Domain," IEEE Trans Image Proc, vol. 8(12), pp. 1688-1701, Dec 1999.
DOI
ScienceOn
|
2 |
CorelDraw Software, www.CorelDraw.com
|
3 |
I. H. Witten and E. Frank, Data Mining, Elsevier, 2005.
|
4 |
A. P. Bradley. The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, 30:1145-1159, 1997.
DOI
ScienceOn
|
5 |
원태연, 통계조사분석, 한나래아카데미, 2010.
|
6 |
G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen, "Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions," in Proceedings of Information Hiding Workshop, Barcelona, Spain, pp. 262-277, Jun, 2005.
|
7 |
J.-L. Starck, J. Fadili, F. Murtagh, "The Undecimated Wavelet Decomposition and its Reconstruction," IP(16), No. 2, February 2007, pp. 297-309. IEEE DOI Link 0702
|
8 |
M.A. Mehrabi, H. Aghaeinia, M. Abolghasemi, "Image Steganalysis Based on Statistical Moments of Wavelet Subband Histogram of Images with Least Signigicant Bit Planes," Congress on Images and Signal Processing, IEEE, 2008.
|
9 |
I. Avcibas, N. Memon, and B. sankur, "Image steganalysis with binary similarity measures," in IEEE International Conference on Image Processing, September, 2002.
|
10 |
S. Lyu, H. Farid, "Detecting hidden messages using higher order statistics and support vector machines," presented at the 5th Int. Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 2002.
|
11 |
Y.Shi, G. Xuan, C. Yang, J. Gao, Z. Zhang, P. Chai, D. Zou, C. Chen, W. Chen, "Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Functions," Int1. Conf. on Infor.Tech., Las Vegas, USA, April 4-6, 2005.
|
12 |
Y. Sun, F. Liu, B. Liu and P. Wang, "Steganalysis Based on Difference Image," IWDW 2008, LNCS, vol. 5450, pp. 184-198, Springer, Heidelberg, 2009.
|
13 |
R. Anderson and F. Petitcolas, "On the limits of steganography," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 474-481, 1998.
DOI
ScienceOn
|
14 |
A. Piva, M. Barni and E. Bartolini, "DCT-based watermark recovering without resorting to the uncorrupted original image," Proc. ICIP 97, vol. 1, pp. 520
|
15 |
N. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998.
DOI
|
16 |
T. Zhang, X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Signal Processing, vol. 83, no. 10, pp 2085-2093, 2003.
DOI
ScienceOn
|
17 |
I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. On Image Processing, vol. 6, pp. 1673-1687, 1997.
|
18 |
http://en.wikipedia.org/wiki/Steganalysis
|
19 |
D. Kahn, "The history of steganography," in Proc Information Hiding, First International Workshop, Cambridge, U.K., 1996.
|
20 |
http://en.wikipedia.org/wiki/Steganography
|