Secure JPEG2000 Steganography by the Minimization of Code-block Noise Variance Changes |
Yoon, Sang-Moon
(금융결제원)
Lee, Hae-Yeoun (국립금오공과대학교 컴퓨터공학부) Joo, Jeong-Chun (한국과학기술원 전자전산학과) Bui, Cong-Nguyen (한국과학기술원 전자전산학과) Lee, Heung-Kyu (한국과학기술원 전자전산학과) |
1 | H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, “Application of Bit-Plane Decomposition Steganography to JPEG2000 Encoded Images,” IEEE Signal Processing Letters, Vol.9(12), 2002, pp.410-413 DOI ScienceOn |
2 | P.-C. Su and C.-C. Jay Juo, “Steganography in JPEG2000 Compressed Images,” IEEE Trans. on Consumer Electronics, Vol.49(4), 2003, pp.824-832 DOI ScienceOn |
3 | H. Jin, M. Fujiyoshi, Y. Seki, and H. Kiya, “A Data Hiding Method for JPEG 2000 Coded Images Using Modulo Arithmetic,” Electronics and Communications in Japan, Vol. 90(7), 2007 DOI ScienceOn |
4 | J. Spaulding, H. Noda, M. N. Shirazi, and E. Kawaguchi, “BPCS Steganography using EZW lossy compressed images,” Pattern Recognition Letters, Vol.23(13), 2002, pp.1579-1587 DOI ScienceOn |
5 | N. E. Huang, Z. Shen, S. R. Long, M. C. Wu, H. H. Shih, Q. Zheng, N.-C. Yen, C. C. Tung, and H. H. Liu, “The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis,” Proc. of the Royal Society of London, Vol.454, 1998, pp.903-995 |
6 | R. Duda, P. Hart, and D. Stork, “Pattern Classification”, 2nd edition. Wiley-Interscience, 2001 |
7 | K. Rank, M. Lendl, and R. Unbehauen, “Estimation of image noise variance,” IEE Proc. of Vision, Image and Signal Processing, Vol.146(2), 1999, pp.80-84 DOI ScienceOn |
8 | M. Kharrazi, H. T. Sencar, and N. Memon, “Performance study of common image steganography and steganalysis techniques,” J. of Electronic Imaging, Vol.15(4), 2006 DOI ScienceOn |
9 | A. Skodras, C. Christopoulos, and T. Ebrahimi, “The JPEG2000 Still Image Compression Standard,” IEEE Signal Processing Magazine, Vol.18(1), 2001, pp.36-58 DOI ScienceOn |
10 | S. Tan, J. Huang, Z. Yang, and Y. Q. Shi, “Steganalysis of JPEG2000 Lazy-Mode Steganography Using the Hilbert-Huang Transform Based Sequential Analysis,” Proc. of Int. Conf. on Image Processing, 2006, pp.101-104 |
11 | H. Noda, Y. Tsukamizu, and M. Niimi, “JPEG2000 Steganography which Preserves Histograms of DWT Coefficients,” IEICE Trans. on Information Systems, Vol. E90-D(4), 783-786 DOI |