Have a personal or library account? Click to login
Steganalysis of Stegostorage Library Cover

References

  1. [1] KOŠDY, M.: Steganographic File System based on JPEG Files: Master’s Thesis, FEI STU, Bratislava, 2013.
  2. [2] JÓKAY, M.—MORAVČÍK, T.: Image-based JPEG steganography, Tatra Mt. Math. Publ. (45) (2010), 65–74.10.2478/v10127-010-0006-9
  3. [3] BÖHME, R.: Advanced Statistical Steganalysis, Springer-Verlag, Berlin, 2010.10.1007/978-3-642-14313-7
  4. [4] ZHANG, W.—LI, S.: Security measurements of steganographic systems in: Applied Cryptography and Network Security (ACNS) (M. Jakobsson, M. Yung, J. Zhou, Eds.), Lecture Notes in Comput. Sci. Vol. 3089, Springer-Verlag Berlin, 2004, pp. 194–204.
  5. [5] CHANDRAMOULI, R.—KHARRAZI, M.—MEMON, N.: Image steganography: concepts and practice, in: International Workshop on Digital Watermarking, 2003, pp. 35–49.10.1007/978-3-540-24624-4_3
  6. [6] JUIN-DE HUANG: The JPEG Standard, in: National Taiwan University, Taipei, Taiwan, ROC, http://slideplayer.com/slide/8779307/
  7. [7] FRIDRICH, J.—GOLJAN, M.—HOGEA, D.: Steganalysis of JPEG images: breaking the F5 algorithm, in: Information Hiding: 5th International Workshop, IH ’02, Noordwijkerhout, The Netherlands, October 7–9, 2002, Springer-Verlag, Berlin, Heidelberg, 2003, pp. 310–323. (Revised papers)10.1007/3-540-36415-3_20
  8. [8] FRIDRICH, J.—KODOVSKÝ, J.: Calibration revisited in: ACM New York, NY, USA, 2009, pp. 63–74.10.1145/1597817.1597830
  9. [9] ZHANG, W.—ZHANG, X.—WANG, S.: Maximizing steganographic embedding efficiency by combining Hamming codes and Wet paper codes, in: Information Hiding, 10th International Workshop, 2008, pp. 60–71.10.1007/978-3-540-88961-8_5
  10. [10] FRIDRICH, J.: Steganography in Digital Media: Principles, Algorithms and Applications, Cambridge University Press, U.K., 2010.10.1017/CBO9781139192903
  11. [11] FRIDRICH, J.—GOLJAN, M.: Practical steganalysis of digital images-state of the art, in: Proceedings of SPIE, 2002, pp. 1–13.10.1117/12.465263
  12. [12] FRIDRICH, J.—GOLJAN, M.—DU, R.: Reliable of LSB steganography in color and grayscale images. in: Proceeding MM&Sec ’01, Workshop on Multimedia and Security: New Challenges 2001, pp. 27–30, http://parsys.informatik.uni-oldenburg.de/~stego/workshopStatistik/g1/RS_Steganalysis.pdf10.1145/1232454.1232466
  13. [13] GULÁŠOVÁ, M.—JÓKAY, M.: Steganalysis of StegoStorage system. Tatra Mt. Math. Publ. 64 (2014), 205–2015.
DOI: https://doi.org/10.1515/tmmp-2016-0034 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 99 - 116
Submitted on: Sep 30, 2016
Published on: Feb 25, 2017
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2017 Michala Gulášová, Matúš Jókay, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.