Have a personal or library account? Click to login

Security Method For Combination Steganography Algorithms On Transform Domain For Jpeg Images

Open Access
|Dec 2014

References

  1. M. Ramkumar & A.N. Akansu. “Some Design Issues For Robust Data hiding Systems”, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, 1528 – 1532, 1999
  2. N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding Information”, IEEE, pp. 113-116, 1998.
  3. R.Popa,”An Analysis of Steganographic System”, The Politehnica University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering, May 25, 1998.
  4. Kurak, C., and J. McHughes, “A Cautionary Note On Image Downgrading,” in IEEEComputer Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp.153-159.
  5. Johnson, N. F., and S. Jajodia, “Exploring Steganography Seeing the Unseen, IEEE Computer, vol. 31, no. 2, 1998, pp. 26-34.10.1109/MC.1998.4655281
  6. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.10.1109/5.771065
  7. Thomas Mittelholzer, An information-theoretic approach to steganography and watermarking,Information Hiding, pp.1-16,2006.10.1007/10719724_1
  8. C. Cachin, An Information-Theoretic Model for Steganography, Lecture Notes in Computer Science, vol.1525, pp.306-318, 199810.1007/3-540-49380-8_21
  9. A.Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proc. Information Hiding—3rd Int’l Workshop, Springer Verlag, 1999, pp. 61–76.10.1007/10719724_5
  10. N. Provos, “Defending Against Statistical Steganalysis,” In Proceedings of USENIX Security Symposium, 2001, pp. 323–335.
  11. Bender, W., D. Gruhl, and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 34, 1996, pp. 131-336.10.1147/sj.353.0313
  12. Möller, S., A. Pitzmann, and I. Stirand, “Computer Based Steganography How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best, in Information Hiding” First international Workshop, Proceedings, Springer, 1996, pp. 7-21.10.1007/3-540-61996-8_28
  13. Cox, I., et al., “A Secure, Robust Watermark for Multimedia,” in Information Hiding: First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 185-206.
  14. O. Runaidh, J. J. K., F. M. Boland, and O. Sinnen, “Watermarking Digital Images for Copyright Protection,, Image and Signal Processing, Aug. 1996, vol. 143, pp. 250–256.
  15. J.R. Hernandez, M. Amado, & F. PerezGonzalez, “DCTDomain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE Trans. Image Processing, 9, Jan. 2000, 55-68.10.1109/83.81759818255372
  16. Wallace, G. K., The JPEG Still Picture Compression Standard, Communications of the ACM, vol. 34, no. 4, 1991, pp. 30-44.10.1145/103085.103089
  17. J.J. Eggers, R. Bauml and B. Girod, “A communications approach to image steganography”, Proceedings of SPIE, vol.4675, pp.26-37, 2002.
  18. Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S. thesis, Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom,2008.
  19. Fridrich J., Goljan M., and Hogea D., “Attacking the OutGuess”, Proc.ACM Workshop Multimedia and Security, 2002.
  20. A. Westfeld. “F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis”, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.10.1007/3-540-45496-9_21
  21. H. G. Schaathun. “CSM25: Secure Information Hiding”, Lecture Notes, University of Surrey, UK, 2008.
  22. http;//www.cs.washington.eduresearchimagedatabasegroundtruth_tars.for.download
  23. Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, “Steganography: Dct Coefficient Replacement Method andCompare With Jsteg Algorithm” International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, August 2012.10.7763/IJCEE.2012.V4.533
  24. Hideki Noda, Michiharu Niimi, and Eiji Kawaguchi, “High performance JPEG steganographyusing quantization index modulation in DCT domain” Pattern Recognition Letters 27, (2006). Issue 5, 455 – 46110.1016/j.patrec.2005.09.008
  25. Yanmin LUO, Peizhong LIU and Minghong LIAO, An artificial immune network clustering algorithm for mangroves remote sensing, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648
  26. Daode Zhang et al., Research on chips’ defect extraction based on image-matching, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp.321 – 336, 2014.10.21307/ijssis-2017-658
Language: English
Page range: 1962 - 1979
Submitted on: Aug 6, 2014
Accepted on: Nov 3, 2014
Published on: Dec 3, 2014
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2014 Hamdan L. Jaheel, Zou Beiji, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.