Skip to main content Accessibility help
×
  • Cited by 415
Publisher:
Cambridge University Press
Online publication date:
April 2014
Print publication year:
2009
Online ISBN:
9781139192903

Book description

Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.

Reviews

'… a very useful book for beginners in steganography and anyone who wants to learn more about the field.'

Todor Todorov Source: Reviews.com

'The distinguishing feature of the book is that it presents not only methods of hiding information in digital media files, but also an in-depth analysis of detecting the use of such methods (steganalysis) … excellent for teaching the subject of information hiding or security related courses. it enhances the landscape of textbooks on the subject. I am convinced that it will grip the reader as it touches on the most important aspects of steganography and steganalysis.'

Source: IEEE Communications Magazine

Refine List

Actions for selected content:

Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Save to Kindle
  • Save to Dropbox
  • Save to Google Drive

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.
×

Contents

References
[1] Fingerprints for car parts. The Economist, December 8, 2005 Google Scholar.
[2] G. F., Amelio, M. F., Tompsett, and G. E., Smith. Experimentalverification of the charge coupled device concept. Bell Systems Technical Journal, 49:593–600, 1970 Google Scholar.
[3] R., Anderson. Stretching the limits of steganography. In R. J., Anderson, editor, Information Hiding, 1st International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 39–48, Cambridge, May 30-June 1, 1996. Springer-Verlag, Berlin Google Scholar.
[4] R. J., Anderson, R., Needham, and A., Shamir. The steganographic file system. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 73–82, Portland, OR, April 14-17, 1998. Springer-Verlag, Berlin Google Scholar.
[5] R. J., Anderson and F. A. P., Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communication, 16(4):474–481, 1998 Google Scholar.
[6] N., Aoki. A band extension technique for G.711 speech using steganography. IEICE Transactions on Communications, E89-B(6):1896–1898, 2006 Google Scholar.
[7] N., Aoki. Potential of value-added speech communications by using steganography. In B.-Y., Liao, editor, Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, volume 2, pages 251–254, Kaohsiung, Taiwan, November 26-28, 2007 Google Scholar.
[8] A., Aspect, J., Dalibard, and G., Roger. Experimental test of Bell's inequalities using time-varying analyzers. Physical Review Letters, 49:1804, 1982 Google Scholar.
[9] I., Avcibas. Audio steganalysis with content-independent distortion measures. IEEE Signal Processing Letters, 13:92–95, February 2006 Google Scholar.
[10] I., Avcibas, M., Kharrazi, N. D., Memon, and B., Sankur. Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing, 17:2749–2757, 2005 Google Scholar.
[11] I., Avcibas, N. D., Memon, and B., Sankur. Steganalysis using image quality metrics. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, pages 523–531, San Jose, CA, January 22-25, 2001 Google Scholar.
[12] I., Avcibas, N. D., Memon, and B., Sankur. Image steganalysis with binary similarity measures. In Proceedings IEEE, International Conference on Image Processing, ICIP 2002, volume 3, pages 645–648, Rochester, NY, September 22-25, 2002 Google Scholar.
[13] F., Bach, D., Heckerman, and E., Horvitz. On the path to an ideal ROC curve: Considering cost asymmetry in learning classifiers. In R. G., Cowell and Z., Ghahramani, editors, Proceedings of the 10th International Workshop on Artificial Intelligence and Statistics (AISTATS), pages 9–16. Society for Artificial Intelligence and Statistics, 2005 Google Scholar. Available electronically at http://www.gatsby.ucl.ac.uk/aistats/.
[14] M., Backes and C., Cachin. Public-key steganography with active attacks. In J., Kilian, editor, 2nd Theory of Cryptography Conference, volume 3378 of Lecture Notes in Computer Science, pages 210–226, Cambridge, MA, February 10-12, 2005. Springer-Verlag, Heidelberg Google Scholar.
[15] F., Bacon. Of the Advancement and Proficiencie of Learning or the Partitions of Sciences, volume VI. Leon Lichfield, Oxford, for R., Young and E., Forest, 1640 Google Scholar.
[16] M., Barni and F., Bartolini. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, volume 21 of Signal Processing and Communications. Boca Raton, FL: CRC Press, 2004 Google Scholar.
[17] R. J., Barron, B., Chen, and G. W., Wornell. The duality between information embedding and source coding with side information and some applications. IEEE Transactions on Information Theory, 49(5):1159–1180, 2003 Google Scholar.
[18] R., Bergmair. Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. Final year thesis, April 2004 Google Scholar. University of Derby, http://bergmair.cjb.net/pub/towlingsteg-rep-inoff-a4.ps.gz.
[19] J., Bierbrauer. Introduction to Coding Theory. London: Chapman & Hall/CRC, 2004 Google Scholar.
[20] J., Bierbrauer and J., Fridrich. Constructing good covering codes for applications in steganography. LNCS Transactions on Data Hiding and Multimedia Security, 4920:1–22, 2008 Google Scholar.
[21] R., Böhme. Weighted stego-image steganalysis for JPEG covers. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 178–194, Santa Barbara, CA, June 19-21, 2007. Springer-Verlag, New York Google Scholar.
[22] R., Böhme. Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals. PhD thesis, Faculty of Computer Science, Technische Universität Dresden, 2008 Google Scholar.
[23] R., Böhme and A. D., Ker. A two-factor error model for quantitative steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 59–74, San Jose, CA, January 16-19, 2006 Google Scholar.
[24] R., Böhme and A., Westfeld. Feature-based encoder classification of compressed audio streams. ACM Multimedia System Journal, 11(2):108–120, 2005 Google Scholar.
[25] I. A., Bolshakov. Method of linguistic steganography based on collocationally-verified synonymy. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 180–191, Toronto, May 23-25, 2005. Springer-Verlag Google Scholar, Berlin.
[26] K., Borders and A., Prakash. Web tap: Detecting covert web traffic. In V., Atluri, B., Pfitz-mann, and P. Drew, McDaniel, editors, Proceedings 11th ACM Conference on Computer and Communications Security (CCS), pages 110–120, Washington, DC, October 25-29, 2004 Google Scholar.
[27] S., Boyd and L., Vandenberghe. Convex Optimization. Cambridge: Cambridge University Press, 2004 Google Scholar.
[28] W. S., Boyle and G. E., Smith. Charge coupled semiconductor devices. Bell Systems Technical Journal, 49:587–593, 1970 Google Scholar.
[29] J., Brassil, S., Low, N. F., Maxemchuk, and L., O'Gorman. Hiding information in document images. In Proceedings of the Conference on Information Sciences and Systems, CISS, pages 482–489, Johns Hopkins University, Baltimore, MD, March 22-24, 1995 Google Scholar.
[30] R. P., Brent, S., Gao, and A. G. B., Lauder. Random Krylov spaces over finite fields. SIAM Journal of Discrete Mathematics, 16(2):276–287, 2003 Google Scholar.
[31] D., Brewster. Microscope, volume XIV. Encyclopaedia Britannica or the Dictionary of Arts, Sciences, and General Literature, Edinburgh, IX – Application of photography to the microscope, 8th edition, 1857 Google Scholar.
[32] C. W., Brown and B. J., Shepherd. Graphics File Formats. Greenwich, CT: Manning Publications Co., 1995 Google Scholar.
[33] C. J. C., Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2(2):121–167, 1998 Google Scholar.
[34] S., Cabuk, C. E., Brodley, and C., Shields. IP covert timing channels: Design and detection. In V., Atluri, B., Pfitzmann, and P. Drew, McDaniel, editors, Proceedings 11th ACM Conference on Computer and Communications Security (CCS), pages 178–187, Washington, DC, October 25-29, 2004 Google Scholar.
[35] C., Cachin. An information-theoretic model for steganography. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 306–318, Portland, OR, April 14-17, 1998. Springer-Verlag, New York Google Scholar.
[36] G., Cancelli and M., Barni. MPSteg-color: A new steganographic technique for color images. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 1–15, Saint Malo, June 11-13, 2007. Springer-Verlag Google Scholar, Berlin.
[37] G., Cancelli, G., Doërr, I. J., Cox, and M., Barni. A comparative study of ±1 steganalyzers. In Proceedings IEEE International Workshop on Multimedia Signal Processing, pages 791–796, Cairns, Australia, October 8-10, 2008 Google Scholar.
[38] G., Cancelli, G., Doërr, I. J., Cox, and M., Barni. Detection of ± 1 LSB steganography based on the amplitude of histogram local extrema. In Proceedings IEEE, International Conference on Image Processing, ICIP 2008, pages 1288–1291, San Diego, CA, October 12-15, 2008 Google Scholar.
[39] R., Chandramouli and N. D., Memon. A distributed detection framework for steganalysis. In J., Dittmann, K., Nahrstedt, and P., Wohlmacher, editors, Proceedings of the 3rd ACM Multimedia & Security Workshop, pages 123–126, Los Angeles, CA, November 4, 2000 Google Scholar.
[40] R., Chandramouli and N. D., Memon. Analysis of LSB based image steganography techniques. In Proceedings IEEE International Conference on Image Processing, ICIP 2001, Thessaloniki, October 7-10, 2001 Google Scholar. CD ROM version.
[41] M., Chapman, G. I., Davida, and M., Rennhard. A practical and effective approach to large-scale automated linguistic steganography. In Proceedings of the 4th International Conference on Information Security, volume 2200 of Lecture Notes in Computer Science, pages 156–165, Malaga, October 1-3, 2001. Springer-Verlag, Berlin Google Scholar.
[42] B., Chen and G., Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4):1423–1443, 2001 Google Scholar.
[43] M., Chen, J., Fridrich, and M., Goljan. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, 1(1):74–90, March 2008 Google Scholar.
[44] H. G., Chew, R. E., Bogner, and C. C., Lim. Dual-V support vector machine with error rate and training size biasing. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, volume 2, pages 1269–1272, Salt Lake City, UT, May 7-11, 2001 Google Scholar.
[45] C. T., Clelland, V., Risca, and C., Bancroft. Hiding messages in DNA microdots. Nature, 399:533–534, June 10, 1999 Google Scholar.
[46] G. D., Cohen, I., Honkala, S., Litsyn, and A., Lobstein. Covering Codes, volume 54. Amsterdam: Elsevier, North-Holland Mathematical Library, 1997 Google Scholar.
[47] E., Cole. Hiding in Plain Sight: Steganography and the Art of Covert Communication. New York: Wiley Publishing Inc., 2003 Google Scholar.
[48] S., Coll and S. B., Glasser. Terrorists turn to web as base of operations. Washington Post, page A01, August 7, 2005 Google Scholar.
[49] P., Comesana and F., Pérez-Gonzáles. On the capacity of stegosystems. In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3–14, Dallas, TX, September 20-21, 2007 Google Scholar.
[50] T. M., Cover and J. A., Thomas. Elements of Information Theory. NewYork: John Wiley & Sons, Inc., 1991 Google Scholar.
[51] I. J., Cox, M. L., Miller, J. A., Bloom, J., Fridrich, and T., Kalker. Digital Watermarking and Steganography. Morgan Kaufman Publishers Inc., San Francisco, CA, 2007 Google Scholar.
[52] R., Crandall. Some notes on steganography. Steganography Mailing List, available from http://os.inf.tu-dresden.de/~westfeld/crandall.pdf, 1998 Google Scholar.
[53] S., Craver. On public-key steganography in the presence of an active warden. In D., Auc-smith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 355–368, Portland, OR, April 14-17, 1998. Springer-Verlag, New York Google Scholar.
[54] N., Cristianini and J., Shawe-Taylor. Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge: Cambridge University Press, 2000 Google Scholar.
[55] O., Dabeer, K., Sullivan, U., Madhow, S., Chandrasekaran, and B. S., Manjunath. Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing, 52:3046–3058, 2004 Google Scholar.
[56] N., Dedic, G., Itkis, L., Reyzin, and S., Russell. Upper and lower bounds on black-box steganography. In J., Kilian, editor, Theory of Cryptography, volume 3378 of Lecture Notes in Computer Science, pages 227–244, Cambridge, MA, February 10-12, 2005. Springer-Verlag, London Google Scholar.
[57] Y., Desmedt. Subliminal-free authentication and signature. In C. G., Günther, editor, Advances in Cryptology – EUROCRYPT '88, Workshop on the Theory and Application of Cryptographic Techniques, volume 330 of Lecture Notes in Computer Science, pages 22–33, Davos, May 25-27, 1988. Springer-Verlag, Berlin Google Scholar.
[58] J., Dittmann, T., Vogel, and R., Hillert. Design and evaluation of steganography for voice-over-IP. In Proceedings IEEE International Symposium on Circuits and Systems (ISCAS), Kos, May 21-24, 2006 Google Scholar.
[59] E. R., Dougherty. Random Processes for Image and Signal Processing, volume Monograph PM44. Washington, DC: SPIE Press, International Society for Optical Engineering, 1998 Google Scholar.
[60] I., Dumer. Handbook of Coding Theory: Volume II, chapter 23, Concatenated Codes and Their Multilevel Generalizations, pages 1911–1988. Elsevier Science, Amsterdam, 1998 Google Scholar.
[61] S., Dumitrescu and X., Wu. LSB steganalysis based on higher-order statistics. In A. M., Eskicioglu, J., Fridrich, and J., Dittmann, editors, Proceedings of the 7th ACM Multimedia & Security Workshop, pages 25–32, New York, NY, August 1-2, 2005 Google Scholar.
[62] S., Dumitrescu, X., Wu, and N.D., Memon. On steg analysis of random LSB embedding in continuous-tone images. In Proceedings IEEE, International Conference on Image Processing, ICIP 2002, pages 324–339, Rochester, NY, September 22-25, 2002 Google Scholar.
[63] S., Dumitrescu, X., Wu, and Z., Wang. Detection of LSB steganography via Sample Pairs Analysis. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 355–372, Noord-wijkerhout, October 7-9, 2002. Springer-Verlag, New York Google Scholar.
[64] J., Eggers, R., Bäuml, and B., Girod. A communications approach to steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 26–37, San Jose, CA, January 21-24, 2002 Google Scholar.
[65] T., Ernst. Schwarzweisse Magie. Der Schlüssel zum dritten Buch der Steganographia des Trithemius. Daphnis, 25(1), 1996 Google Scholar.
[66] J. M., Ettinger. Steganalysis and game equilibria. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 319–328, Portland, OR, April 14-17, 1998. Springer-Verlag, New York Google Scholar.
[67] H., Farid and L., Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 340–354, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York Google Scholar.
[68] T., Filler and J., Fridrich. Binary quantization using belief propagation over factor graphs of LDGM codes. In 45th Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, September 26-28, 2007 Google Scholar.
[69] T., Filler and J., Fridrich. Complete characterization of perfectly secure stegosystems with mutually independent embedding. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, Taipei, April 19-24, 2009 Google Scholar.
[70] T., Filler and J., Fridrich. Fisher information determines capacity of e-secure steganog-raphy. In S., Katzenbeisser and A.-R., Sadeghi, editors, Information Hiding, 11th International Workshop, volume 5806 of Lecture Notes in Computer Science, pages 31–47, Darmstadt, June 7-10, 2009. Springer-Verlag, New York Google Scholar.
[71] T., Filler, A. D., Ker, and J., Fridrich. The Square Root Law of steganographic capacity for Markov covers. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 08 1-08 11, San Jose, CA, January 18-21, 2009 Google Scholar.
[72] G., Fisk, M., Fisk, C., Papadopoulos, and J., Neil. Eliminating steganography in Internet traffic with active wardens. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 18–35, Noordwijkerhout, October 7-9, 2003. Springer-Verlag, New York Google Scholar.
[73] M. A., Fitch and R. E., Jamison. Minimum sum covers of small cyclic groups. Congressus Numerantium, 147:65–81, 2000 Google Scholar.
[74] J. D., Foley, A., van Dam, S. K., Feiner, J. F., Hughes, and R. L., Phillips. Introduction to Computer Graphics. New York: Addison-Wesley, 1997 Google Scholar.
[75] E., Franz. Steganography preserving statistical properties. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 278–294, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York Google Scholar.
[76] E., Franz. Embedding considering dependencies between pixels. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages D 1-D 12, San Jose, CA, January 27-31, 2008 Google Scholar.
[77] E., Franz and A., Schneidewind. Pre-processing for adding noise steganography. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 189–203, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin Google Scholar.
[78] J., Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67–81, Toronto, May 23-25, 2004. Springer-Verlag, New York Google Scholar.
[79] J., Fridrich. Asymptotic behavior of the ZZW embedding construction. IEEE Transactions on Information Forensics and Security, 4(1):151–153, March 2009 Google Scholar.
[80] J., Fridrich and R., Du. Secure steganographic methods for palette images. In A., Pfitz-mann, editor, Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 47–60, Dresden, September 29-October 1, 1999. Springer-Verlag, New York Google Scholar.
[81] J., Fridrich, P., Lisonëk, and D., Soukal. On steganographic embedding efficiency. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 282–296, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York Google Scholar.
[82] J., Fridrich and M., Goljan. Digital image steganography using stochastic modulation. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 191–202, Santa Clara, CA, January 21-24, 2003 Google Scholar.
[83] J., Fridrich and M., Goljan. On estimation of secret message length in LSB steganog-raphy in spatial domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 23–34, San Jose, CA, January 19-22, 2004 Google Scholar.
[84] J., Fridrich, M., Goljan, and R., Du. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, Special Issue on Security, 8(4):22–28, October-December 2001 Google Scholar.
[85] J., Fridrich, M., Goljan, and R., Du. Steganalysis based on JPEG compatibility. In A. G., Tescher, editor, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, volume 4518, pages 275–280, Denver, CO, August 20-24, 2001 Google Scholar.
[86] J., Fridrich, M., Goljan, and D., Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. In Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 310–323, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York Google Scholar.
[87] J., Fridrich, M., Goljan, D., Hogea, and D., Soukal. Quantitative steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, 9(3):288–302, 2003 Google Scholar.
[88] J., Fridrich, M., Goljan, and D., Soukal. Higher-order statistical steganalysis of palette images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, pages 178–190, Santa Clara, CA, January 21-24, 2003 Google Scholar.
[89] J., Fridrich, M., Goljan, and D., Soukal. Perturbed quantization steganography using wet paper codes. In J., Dittmann and J., Fridrich, editors, Proceedings of the 6th ACM Multimedia & Security Workshop, pages 4–15, Magdeburg, September 20-21, 2004 Google Scholar.
[90] J., Fridrich, M., Goljan, and D., Soukal. Searching for the stego key. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 70–82, San Jose, CA, January 19-22, 2004 Google Scholar.
[91] J., Fridrich, M., Goljan, and D., Soukal. Efficient wet papercodes. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, Lecture Notes in Computer Science, pages 204–218, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin Google Scholar.
[92] J., Fridrich, M., Goljan, and D., Soukal. Perturbed quantization steganography. ACM Multimedia System Journal, 11(2):98–107, 2005 Google Scholar.
[93] J., Fridrich, M., Goljan, and D., Soukal. Steganography via codes for memory with defective cells. In 43rd Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, September 28-30, 2005 Google Scholar.
[94] J., Fridrich, M., Goljan, D., Soukal, and T., Holotyak. Forensic steganalysis: Determining the stego key in spatial domain steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 631–642, San Jose, CA, January 16-20, 2005 Google Scholar.
[95] J., Fridrich, T., Pevny, and J., Kodovsky. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3–14, Dallas, TX, September 20-21, 2007 Google Scholar.
[96] J., Fridrich and D., Soukal. Matrix embedding for large payloads. IEEE Transactions on Information Forensics and Security, 1(3):390–394, 2006 Google Scholar.
[97] F., Galand and C., Fontaine. How Reed-Solomon codes can improve steganographic schemes. EURASIP Journal on Information Security, 2009 Google Scholar. Article ID 274845, doi:10.1155/2009/274845.
[98] F., Galand and G., Kabatiansky. Information hiding by coverings. In Proceedings IEEE, Information Theory Workshop, ITW 2003, pages 151–154, Paris, March 31-April 4, 2003 Google Scholar.
[99] S. I., Gel'fand and M. S., Pinsker. Coding for channel with random parameters. Problems of Control and Information Theory, 9(1):19–31, 1980 Google Scholar.
[100] S., Gianvecchio and H., Wang. Detecting covert timing channels: An entropy-based approach. In P., Ning, S. De Capitani di, Vimercati, and P. F., Syverson, editors, Proceedings 14th ACM Conference on Computer and Communication Security (CCS), pages 307–316, Alexandria, VA, October 28-31, 2007 Google Scholar.
[101] J., Giffin, R., Greenstadt, P., Litwack, and R., Tibbetts. Covert messaging through TCP timestamps. In R., Dingledine and P., Syverson, editors, Proceedings Privacy Enhancing Technologies Workshop (PET), volume 2482 of Lecture Notes in Computer Science, pages 194–208, San Francisco, CA, April 14-15, 2002. Springer-Verlag, Berlin Google Scholar.
[102] M., Goljan, J., Fridrich, and T., Holotyak. New blind steganalysis and its implications. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 1–13, San Jose, CA, January 16-19, 2006 Google Scholar.
[103] R. L., Graham and N. J. A., Sloane. On additive bases and harmonious graphs. SIAM Journal on Algebraic and Discrete Methods, 1(4):382–404, December 1980 Google Scholar.
[104] A., Gretton, K. M., Borgwardt, M., Rasch, B., Schölkopf, and A. J., Smola. A kernel method forthe two-sample-problem. In B., Schölkopf, J., Platt, and T., Hoffman, editors, Advances in Neural Information Processing Systems 19, pages 513–520. MIT Press, Cambridge, MA, 2007 Google Scholar.
[105] H., Haanpää. Minimum sum and difference covers of abelian groups. Journal of Integer Sequences, 7(2), 2004 Google Scholar. Article 04.2.6.
[106] T. G., Handel and M. T., Stanford IIIHiding data in the OSI network model. In Information Hiding, 1st International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 23-38, Cambridge, May 30-June 1, 1996. Springer-Verlag, Berlin Google Scholar.
[107] J. J., Harmsen and W. A., Pearlman. Steganalysis of additive noise modelable information hiding. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 131–142, Santa Clara, CA, January 21-24, 2003 Google Scholar.
[108] C., Heegard and A. A., El-Gamal. On the capacity of computer memory with defects. IEEE Transactions on Information Theory, 29(5):731–739, 1983 Google Scholar.
[109] Herodotus. The Histories. Penguin Books, London, 1996 Google Scholar. Translated by Aubrey de Sélincourt.
[110] S., Hetzl and P., Mutzel. A graph-theoretic approach to steganography. In J., Dittmann, S., Katzenbeisser, and A., Uhl, editors, Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, volume 3677 of Lecture Notes in Computer Science, pages 119–128, Salzburg, September 19-21, 2005 Google Scholar.
[111] F. S., Hill Jr., Computer Graphics Using Open GL. Upper Saddle River, NJ: Prentice Hall, 2nd edition, 2000 Google Scholar.
[112] N. J., Hopper. On steganographic chosen covertext security. In 32nd Annual International Colloquium on Automata, Languages and Programming, (ICALP 2005), pages 311–321, Lisbon, July 11-15, 2005 Google Scholar.
[113] N. J., Hopper, J., Langford, and L., von Ahn. Provably secure steganography. In M., Yung, editor, Advances in Cryptology, CRYPTO '02, 22nd Annual International Cryptology Conference, volume 2442 of Lecture Notes in Computer Science, pages 77–92, Santa Barbara, CA, August 18-22, 2002 Google Scholar. Springer-Verlag.
[114] C., Hsu and C., Lin. A comparison of methods for multi-class support vector machines. Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, 2001 Google Scholar.
[115] D. F., Hsu and X., Jia. Additive bases and extremal problems in groups, graphs and networks. Utilitas Mathematica, 66:61–91, 2004 Google Scholar.
[116] G. A., Francia III and T. S., Gomez. Steganography obliterator: An attack on the least significant bits. In Proceedings 3rd Annual Conference on Information Security Curriculum Development (InfoSecCD '06), pages 85–91, Kennesaw State University, Kennesaw, GA, September 22-23, 2006 Google Scholar.
[117] D., Johnson. White King and Red Queen: How the Cold War Was Fought on the Chessboard. Houghton Mifflin Company, Boston and New York, 2008 Google Scholar.
[118] M. K., Johnson, S., Lyu, and H., Farid. Steganalysis of recorded speech. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 664–672, San Jose, CA, January 16-20, 2005 Google Scholar.
[119] N. F., Johnson and S., Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer, 31:26–34, February 1998 Google Scholar.
[120] N. F., Johnson and S., Jajodia. Steganalysis of images created using current steganography software. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 273–289, Portland, OR, April 14-17, 1998. Springer-Verlag, New York Google Scholar.
[121] N. F., Johnson and S., Jajodia. Steganalysis: The investigation of hidden information. In Proceedings IEEE, Information Technology Conference, Syracuse, NY, September 1-3, 1998 Google Scholar.
[122] N. F., Johnson and P., Sallee. Detection of hidden information, covert channels and information flows. In John G., Voeller, editor, Wiley Handbook of Science Technology for Homeland Security. New York: Wiley & Sons, Inc, April 4, 2008 Google Scholar.
[123] S., Katzenbeisser and F. A. P., Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking. New York: Artech House, 2000 Google Scholar.
[124] S., Katzenbeisser and F. A. P., Petitcolas. Defining security in steganographic systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 50–56, San Jose, CA, January 21-24, 2002 Google Scholar.
[125] S. M., Kay. Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory, volume II. Upper Saddle River, NJ: Prentice Hall, 1998 Google Scholar.
[126] S. M., Kay. Fundamentals of Statistical Signal Processing, Volume II: Detection Theory, volume II. Upper Saddle River, NJ: Prentice Hall, 1998 Google Scholar.
[127] A. D., Ker. Improved detection of LSB steganography in grayscale images. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 97–115, Toronto, May 23-25, 2004. Springer-Verlag, Berlin Google Scholar.
[128] A. D., Ker. A general framework for structural analysis of LSB replacement. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 296–311, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin Google Scholar.
[129] A. D., Ker. Resampling and the detection of LSB matching in color bitmaps. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 1–15, San Jose, CA, January 16-20, 2005 Google Scholar.
[130] A. D., Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6):441–444, June 2005 Google Scholar.
[131] A. D., Ker. Fourth-order structural steganalysis and analysis of cover assumptions. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 25–38, San Jose, CA, January 16-19, 2006 Google Scholar.
[132] A. D., Ker. A capacity result for batch steganography. IEEE Signal Processing Letters, 14(8):525–528, 2007 Google Scholar.
[133] A. D., Ker. A fusion of maximal likelihood and structural steganalysis. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 204–219, Saint Malo, June 11-13, 2007. Springer-Verlag, Berlin Google Scholar.
[134] A. D., Ker. Optimally weighted least-squares steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 6 1-6 16, San Jose, CA, January 29-February 1, 2007 Google Scholar.
[135] A. D., Ker. Steganalysis of embedding in two least significant bits. IEEE Transactions on Information Forensics and Security, 2:46–54, 2007 Google Scholar.
[136] A. D., Ker. The ultimate steganalysis benchmark? In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 141–148, Dallas, TX, September 20-21, 2007 Google Scholar.
[137] A. D., Ker. Locating steganographic payload via WS residuals. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 27–32, Oxford, September 22-23, 2008 Google Scholar.
[138] A. D., Ker and R., Böhme. Revisiting weighted stego-image steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1-5 17, San Jose, CA, January 27-31, 2008 Google Scholar.
[139] A. D., Ker and I., Lubenko. Feature reduction and payload location with WAM steganalysis. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 0A 1-0A 13, San Jose, CA, January 18-21, 2009 Google Scholar.
[140] A. D., Ker, T., Pevny, J., Kodovsky, and J., Fridrich. The Square Root Law of stegano-graphic capacity. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 107–116, Oxford, September 22-23, 2008 Google Scholar.
[141] Y., Kim, Z., Duric, and D., Richards. Modified matrix encoding technique for minimal distortion steganography. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 314–327, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York Google Scholar.
[142] G., Kipper. Investigator's Guide to Steganography. Boca Raton, FL: CRC Press, 2004 Google Scholar.
[143] J., Kodovsky and J., Fridrich. Influence of embedding strategies on security of stegano-graphic methods in the JPEG domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 2 1-2 13, San Jose, CA, January 27-31, 2008 Google Scholar.
[144] J., Kodovsky and J., Fridrich. On completeness of feature spaces in blind steganalysis. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123–132, Oxford, September 22-23, 2008 Google Scholar.
[145] G., Kolata. A mystery unraveled, twice. The New York Times, pages F1–F6, April 14, 1998 Google Scholar.
[146] G., Kolata. Veiled messages of terror may lurk in cyberspace. The New York Times, October 30, 2001 Google Scholar.
[147] N., Komaki, N., Aoki, and T., Yamamoto. A packet loss concealment technique for VoIP using steganography. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, E86-A(8):2069–2072, 2003 Google Scholar.
[148] O., Koval, S., Voloshynovskiy, T., Holotyak, and T., Pun. Information theoretic analysis of steganalysis in real images. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 11–16, Geneva, September 26-27, 2006 Google Scholar.
[149] C., Krätzer and J., Dittmann. Pros and cons of melcepstrum based audio steganalysis using SVM classification. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, pages 359–377, Saint Malo, June 11-13, 2007 Google Scholar.
[150] C., Krätzer, J., Dittmann, A., Lang, and T., Kühne. WLAN steganography: A first practical review. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 17–22, Geneva, September 26-27, 2006 Google Scholar.
[151] M., Kutter and F. A. P., Petitcolas. A fair benchmark for image watermarking systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents I, volume 3657, pages 226–239, San Jose, CA, 1999 Google Scholar.
[152] A. V., Kuznetsov and B. S., Tsybakov. Coding in a memory with defective cells. Problems of Information Transmission, 10:132–138, 1974 Google Scholar.
[153] Tri, Van Le. Efficient provably secure public key steganography. Technical report, Florida State University, 2003 Google Scholar. Cryptography ePrint Archive, http://eprint.iacr.org/2003/156.
[154] Tri, Van Le and K., Kurosawa. Efficient public key steganography secure against adaptively chosen stegotext attacks. Technical report, Florida State University, 2003 Google Scholar. Cryptography ePrint Archive, http://eprint.iacr.org/2003/244.
[155] K., Lee, C., Jung, S., Lee, and J., Lim. New steganalysis methodology: LR cube analysis for the detection of LSB steganography. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 312–326, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin Google Scholar.
[156] K., Lee and A., Westfeld. Generalized category attack - improving histogram-based attack on JPEG LSB embedding. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 378–392, Saint Malo, June 11-13, 2007. Springer-Verlag, Berlin Google Scholar.
[157] K., Lee, A., Westfeld, and S., Lee. Category attack for LSB embedding of JPEG images. In Y.-Q., Shi, B., Jeon, Y.Q., Shi, and B., Jeon, editors, Digital Watermarking, 5th International Workshop, volume 4283 of Lecture Notes in Computer Science, pages 35–48, Jeju Island, November 8-10, 2006. Springer-Verlag, Berlin Google Scholar.
[158] X., Li, B., Yang, D., Cheng, and T., Zeng. A generalization of LSB matching. IEEE Signal Processing Letters, 16(2):69–72, February 2009 Google Scholar.
[159] X., Li, T., Zeng, and B., Yang. Detecting LSB matching by applying calibration technique for difference image. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 133–138, Oxford, September 22-23, 2008 Google Scholar.
[160] X., Li, T., Zeng, and B., Yang. Improvement of the embedding efficiency of LSB matching by sum and difference covering set. In Proceedings IEEE, International Conference on Multimedia and Expo, pages 209–212, Hannover, June 23-April 26, 2008 Google Scholar.
[161] Tsung-Yuan, Liu and Wen-Hsiang, Tsai. A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1):24–30, March 2007 Google Scholar.
[162] D., Llamas, C., Allison, and A., Miller. Covert channels in internet protocols: A survey. In M., Merabti and R., Pereira, editors, Proceedings 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting (PGNET), Liverpool, June 27-28, 2005 Google Scholar.
[163] P., Lu, X., Luo, Q., Tang, and L., Shen. An improved sample pairs method for detection of LSB embedding. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 116–127, Toronto, May 23-25, 2004. Springer-Verlag, Berlin Google Scholar.
[164] M., Luby. LT, codes. In 43rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2002, pages 271–282, Vancouver, November 16-19, 2002 Google Scholar.
[165] N. B., Lucena, G., Lewandowski, and S. J., Chapin. Covert channels in IPv6. In G., Danezis and D., Martin, editors, Proceedings Privacy Enhancing Technologies Workshop (PET), volume 3856 of Lecture Notes in Computer Science, pages 147–166, Dubrovnik, May 30-June 1, 2006. Springer-Verlag, Berlin Google Scholar.
[166] A., Lysyanskaya and M., Meyerovich. Steganography with imperfect sampling. Technical report, Brown University, 2005 Google Scholar. Cryptography ePrint Archive, http://eprint.iacr.org/2005/305.
[167] S., Lyu and H., Farid. Steganalysis using color wavelet statistics and one-class support vectormachines. In E.J., Delp and P.W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 35–45, San Jose, CA, January 19-22, 2004 Google Scholar.
[168] S., Lyu and H., Farid. Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, 1(1):111–119, 2006 Google Scholar.
[169] W., Mazurczyk and K., Szczypiorski. Steganography of VoIP streams. In Proceedings of the 3rd International Symposium on Information Security, volume 5332 of Lecture Notes in Computer Science, pages 1001–1018, Monterrey, Mexico, November 10-11, 2008. Springer-Verlag, Berlin Google Scholar.
[170] A. D., McDonald and M. G., Kuhn. StegFS: A steganographic file system for Linux. In Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 454–468, Dresden, September 29-October 1, 1999. Springer-Verlag, Berlin Google Scholar.
[171] D. J. C., McKay. Information Theory, Inference, and Learning Algorithms. Cambridge: Cambridge University Press, 2003 Google Scholar.
[172] S., Meignen and H., Meignen. On the modeling of DCT and subband image data for compression. IEEE Transactions on Image Processing, 4(2):186–193, February 1995 Google Scholar.
[173] Y., Miche, B., Roue, A., Lendasse, and P., Bas. A feature selection methodology for steganalysis. In B., Günsel, A. K., Jain, A. M., Tekalp, and B., Sankur, editors, Multimedia Content Representation, Classification and Security, International Workshop, volume 4105 of Lecture Notes in Computer Science, pages 49–56, Istanbul, September 11-13, 2006 Google Scholar. Springer-Verlag.
[174] J., Mielikainen. LSB matching revisited. IEEE Signal Processing Letters, 13(5):285–287, May 2006 Google Scholar.
[175] M. K., Mihcak, I., Kozintsev, K., Ramchandran, and P., Moulin. Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters, 6(12):300–303, December 1999 Google Scholar.
[176] D. S., Mitrinovic, J. E., Pecaric, and A. M., Fink. Classical and New Inequalities in Analysis. Kluwer Academic Publishers, Dordrecht, 1993 Google Scholar.
[177] I. S., Moskowitz, R. E., Newman, D. P., Crepeau, and A. R., Miller. Covert channels and anonymizing networks. In S., Jajodia, P., Samarati, and P. F., Syverson, editors, Proceedings Workshop on Privacy in the Electronic Society (WPES), pages 79–88, Washington, DC, October 30, 2003 Google Scholar.
[178] P., Moulin, M. K., Mihcak, and G. I., Lin. An information-theoretic model for image watermarking and data hiding. In Proceedings IEEE, International Conference on Image Processing, ICIP 2000, volume 3, pages 667–670, Vancouver, September 10-13, 2000 Google Scholar.
[179] P., Moulin and J. A., Sullivan. Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 49(3):563–593, March 2003 Google Scholar.
[180] P., Moulin and Y., Wang. New results on steganographic capacity. In Proceedings of the Conference on Information Sciences and Systems, CISS, Princeton, NJ, March 17-19, 2004 Google Scholar.
[181] A., Munoz and J. M., Moguerza. Estimation of high-density regions using one-class neighbor machines. IEEE Transactions on Pattern Analysis and Machine Intelligence, 26(3):476–480, 2006 Google Scholar.
[182] B., Murphy and C., Vogel. Statistically constrained shallow text marking: Techniques, evaluation paradigm, and results. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages Z 1-Z 9, San Jose, CA, January 29-February 1, 2007 Google Scholar.
[183] H., Noda, M., Niimi, and E., Kawaguchi. Application of QIM with dead zone for histogram preserving JPEG steganography. In Proceedings IEEE, International Conference on Image Processing, ICIP 2005, volume II, pages 1082–1085, Genova, September 11-14, 2005 Google Scholar.
[184] H.-O., Peitgen, H., Jürgens, and D., Saupe. Chaos and Fractals: New Frontiers of Science. Berlin: Springer-Verlag, 1992 Google Scholar.
[185] W., Pennebaker and J., Mitchell. JPEG: Still Image Data Compression Standard. Van Nostrand Reinhold, New York, 1993 Google Scholar.
[186] F., Perez-Gonzalez and S., Voloshynovskiy, editors. Fundamentals of Digital Image Watermarking. New York: Wiley Blackwell, 2005 Google Scholar.
[187] F. A. P., Petitcolas. MP3Stego software. 1998 Google Scholar.
[188] K., Petrowski, M., Kharrazi, H. T., Sencar, and N. D., Memon. Psteg: Steganographic embedding through patching. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, pages 537–540, Philadelphia, PA, March 18-23, 2005 Google Scholar.
[189] T., Pevny and J., Fridrich. Multiclass blind steganalysis for JPEG images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages O 1-O 13, San Jose, CA, January 16-19, 2006 Google Scholar.
[190] T., Pevny and J., Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1-3 14, San Jose, CA, January 29-February 1, 2007 Google Scholar.
[191] T., Pevny and J., Fridrich. Benchmarking for steganography. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 251–267, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York Google Scholar.
[192] T., Pevny and J., Fridrich. Detection of double-compression for applications in steganography. IEEE Transactions on Information Forensics and Security, 3(2):247–258, 2008 Google Scholar.
[193] T., Pevny and J., Fridrich. Multiclass detector of current steganographic methods for JPEG format. IEEE Transactions on Information Forensics and Security, 3(4):635–650, December 2008 Google Scholar.
[194] T., Pevny and J., Fridrich. Novelty detection in blind steganalysis. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 167–176, Oxford, September 22-23, 2008 Google Scholar.
[195] T., Pevny, J., Fridrich, and A. D., Ker. From blind to quantitative steganalysis. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 0C 1-0C 14, San Jose, CA, January 18-21, 2009 Google Scholar.
[196] A. C., Popescu. Statistical Tools for Digital Image Forensics. PhD thesis, Department of Computer Science, Dartmouth College, 2005 Google Scholar.
[197] S., Pradhan, J., Chou, and K., Ramchandran. Duality between source coding and channel coding and its extension to the side information case. IEEE Transactions on Information Theory, 49(5):1181–1203, 2003 Google Scholar.
[198] N., Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, pages 323–335, Washington, DC, August 13-17, 2001 Google Scholar.
[199] N., Provos and P., Honeyman. Detecting steganographic content on the internet. Technical report, 01-11, CITI, August 2001 Google Scholar.
[200] R., Radhakrishnan, M., Kharrazi, and N. D., Memon. Data masking a new approach for data hiding?Journal of VLSI Signal Processing Systems, 41(3):293–303, November 2005 Google Scholar.
[201] J. A., Reeds. Solved: The ciphers in Book III of Trithemius's Steganographia. Cryptologia, 22:291–319, October 1998 Google Scholar.
[202] X.-M., Ru, H.-J., Zhang, and X., Huang. Steganalysis of audio: Attacking the Steghide. In Proceedings of the International Conference on Machine Learning and Cybernetics, volume 7, pages 3937–3942, Guangzhou, August 18-21, 2005 Google Scholar.
[203] J., Rutenberg. A nation challenged: Videotape. New York Times, February 1, 2002 Google Scholar.
[204] P., Sallee. Model-based steganography. In T., Kalker, I. J., Cox, and Y. Man, Ro, editors, Digital Watermarking, 2nd International Workshop, volume 2939 of Lecture Notes in Computer Science, pages 154–167, Seoul, October 20-22, 2003. Springer-Verlag, New York Google Scholar.
[205] P., Sallee. Model-based methods for steganography and steganalysis. International Journal of Image Graphics, 5(1):167–190, 2005 Google Scholar.
[206] K., Sayood. Introduction to Data Compression (3rd edition). New York: Morgan Kaufmann, 2000 Google Scholar.
[207] B., Schneier. Applied Cryptography. New York: John Wiley & Sons, 1996 Google Scholar.
[208] D., Schönfeld and A., Winkler. Embedding with syndrome coding based on BCH codes. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 214–223, Geneva, September 26-27, 2006 Google Scholar.
[209] T., Sharp. An implementation of key-based digital signal steganography. In I. S., Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 13–26, Pittsburgh, PA, April 25-27, 2001. Springer-Verlag, New York Google Scholar.
[210] Y. Q., Shi, C., Chen, and W., Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249–264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York Google Scholar.
[211] F. Y., Shih. Digital Watermarking and Steganography: Fundamentals and Techniques. Boca Raton, FL: CRC Press, 2007 Google Scholar.
[212] B., Shimanovsky, J., Feng, and M., Potkonjak. Hiding data in DNA. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 373–386, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, Berlin Google Scholar.
[213] M., Sidorov. Hidden Markov models and steganalysis. In J., Dittmann and J., Fridrich, editors, Proceedings of the 6th ACM Multimedia & Security Workshop, pages 63–67, Magdeburg, September 20-21, 2004 Google Scholar.
[214] G. J., Simmons. The prisoner's problem and the subliminal channel. In D., Chaum, editor, Advances in Cryptology, CRYPTO '83, pages 51–67, Santa Barbara, CA, August 22-24, 1983. New York Google Scholar: Plenum Press.
[215] A. J., Smola and B., Schölkopf. A tutorial on support vector regression. NeuroCOLT2 Technical Report NC2-TR-1998-030, 1998 Google Scholar.
[216] T., Sohn, J., Seo, and J., Moon. A study on the covert channel detection of TCP/IP header using support vector machine. In S., Qing, D., Gollmann, and J., Zhou, editors, Proceedings of the 5th International Conference on Information and Communications Security, volume 2836 of Lecture Notes in Computer Science, pages 313–324, Huhe-haote, October 10-13, 2003. Springer-Verlag, Berlin Google Scholar.
[217] K., Solanki, A., Sarkar, and B. S., Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 16–31, Saint Malo, June 11-13, 2007. Springer-Verlag, New York Google Scholar.
[218] K., Solanki, K., Sullivan, U., Madhow, B. S., Manjunath, and S., Chandrasekaran. Provably secure steganography: Achieving zero K-L divergence using statistical restoration. In Proceedings IEEE, International Conference on Image Processing, ICIP 2006, pages 125–128, Atlanta, GA, October 8-11, 2006 Google Scholar.
[219] A., Somekh-Baruch and N., Merhav. On the capacity game of public watermarking systems. IEEE Transactions on Information Theory, 50(3):511–524, 2004 Google Scholar.
[220] D., Soukal, J., Fridrich, and M., Goljan. Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 595–606, San Jose, CA, January 16-20, 2005 Google Scholar.
[221] M. R., Spiegel. Schaum's Outline of Theory and Problems of Statistics. McGraw-Hill, New York, 3rd edition, 1961 Google Scholar.
[222] M., Stamm and K. J., Ray Liu. Blind forensics of contrast enhancement in digital images. In Proceedings IEEE, International Conference on Image Processing, ICIP 2008, pages 3112–3115, San Diego, CA, October 12-15, 2008 Google Scholar.
[223] I., Steinwart. On the influence of the kernel on the consistency of support vector machines. Journal of Machine Learning Research, 2:67–93, 2001 Google Scholar. Available electronically at http://www.jmlr.org/papers/volume2/steinwart01a/steinwart01a.ps.gz.
[224] G. W. W., Stevens. Microphotography – Photography and Photofabrication at Extreme Resolutions. London, Chapman & Hall, 1968 Google Scholar.
[225] K., Sullivan, U., Madhow, B. S., Manjunath, and S., Chandrasekaran. Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensics and Security, 1(2):275–287, June 2006 Google Scholar.
[226] A., Tacticius. How to Survive Under Siege/Aineas the Tactician. Oxford: Clarendon Ancient History Series, 1990 Google Scholar.
[227] C. M., Taskiran, U., Topkara, M., Topkara, and E. J., Delp. Attacks on lexical natural language steganography systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 97–105, San Jose, CA, January 16-19, 2006 Google Scholar.
[228] D. S., Taubman and M. W., Marcellin. JPEG 2000 Image Compression Fundamentals, Standards, and Practices. Kluwer Academic Publishers, Boston, MA, 2002 Google Scholar.
[229] J., Taylor and A., Verbyla. Joint modeling of location and scale parameters of the t-distribution. Statistical Modeling, 4:91–112, 2004 Google Scholar.
[230] J., Tobin and R., Dobard. Hidden in Plain View: The Secret Story of Quilts and the Underground Railroad. Doubleday, New York, 1999 Google Scholar.
[231] B. S., Tsybakov. Defect and error correction. Problemy Peredachi Informatsii, 11:21–30, July-September 1975 Google Scholar. Translated from Russian.
[232] R., Tzschoppe, R., Bäuml, J. B., Huber, and A., Kaup. Steganographic system based on higher-order statistics. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 156–166, Santa Clara, CA, January 21-24, 2003 Google Scholar.
[233] M., van Dijk and F., Willems. Embedding information in grayscale images. In Proceedings of the 22nd Symposium on Information and Communication Theory, pages 147–154, Enschede, May 15-16, 2001 Google Scholar.
[234] L., von Ahn and N., Hopper. Public-key steganography. In C., Cachin and J., Camenisch, editors, Advances in Cryptology – EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, volume 3027 of Lecture Notes in Computer Science, pages 323–341, Interlaken, May 2-6, 2004. Springer-Verlag, Heidleberg Google Scholar.
[235] Y., Wang and P., Moulin. Steganalysis of block-structured stegotext. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 477–488, San Jose, CA, January 19-22, 2004 Google Scholar.
[236] Y., Wang and P., Moulin. Statistical modelling and steganalysis of DFT-based image steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 2 1-2 11, San Jose, CA, January 16-19, 2006 Google Scholar.
[237] Y., Wang and P., Moulin. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security, 55(6):2706–2722, June 2008 Google Scholar.
[238] P., Wayner. Mimic functions. CRYPTOLOGIA, 16(3):193–214, July 1992 Google Scholar.
[239] P., Wayner. Disappearing Cryptography. Morgan Kaufmann, San Francisco, CA, 2nd edition, 2002 Google Scholar.
[240] J., Werner. Optimization – Theory and Applications. Braunschweig: Vieweg, 1984 Google Scholar.
[241] A., Westfeld. High capacity despite better steganalysis (F5 – a steganographic algorithm). In I. S., Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 289–302, Pittsburgh, PA, April 25-27, 2001. Springer-Verlag, New York Google Scholar.
[242] A., Westfeld. Detecting low embedding rates. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 324–339, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, Berlin Google Scholar.
[243] A., Westfeld. Space filling curves in steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 28–37, San Jose, CA, January 16-20, 2005 Google Scholar.
[244] A., Westfeld. Generic adoption of spatial steganalysis to transformed domain. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 161–177, Santa Barbara, CA, June 19-21, 2007. Springer-Verlag, New York Google Scholar.
[245] A., Westfeld and R., Böhme. Exploiting preserved statistics for steganalysis. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 82–96, Toronto, May 23-25, 2004. Springer-Verlag, Berlin Google Scholar.
[246] A., Westfeld and A., Pfitzmann. Attacks on steganographic systems. In A., Pfitzmann, editor, Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 61–75, Dresden, September 29-October 1, 1999. Springer-Verlag, New York Google Scholar.
[247] E. H., Wilkins. A History of Italian Literature. Oxford University Press, London, 1954 Google Scholar.
[248] F. J. M., Williams and N. J., Sloane. The Theory of Error-Correcting Codes. North-Holland, Amsterdam, 1977 Google Scholar.
[249] P. W., Wong, H., Chen, and Z., Tang. On steganalysis of plus-minus one embedding in continuous-tone images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 643–652, San Jose, CA, January 16-20, 2005 Google Scholar.
[250] F. B., Wrixon. Codes, Ciphers and Other Cryptic and Clandestine Communication. New York: Black Dog & Leventhal Publishers, 1998 Google Scholar.
[251] Z., Wu and W., Yang. G.711-based adaptive speech information hiding approach. In De-Shuang Huang, K.Li, and G. W., Irwin, editors, Proceedings of the International Conference on Intelligent Computing, volume 4113 of Lecture Notes in Computer Science, pages 1139–1144, Kunming, August 16-19, 2006. Springer-Verlag, Berlin Google Scholar.
[252] G., Xuan, Y. Q., Shi, J., Gao, D., Zou, C., Yang, Z. Z. P., Chai, C., Chen, and W., Chen. Ste- ganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 262–277, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin Google Scholar.
[253] C., Yang, F., Liu, X., Luo, and B., Liu. Steganalysis frameworks of embedding in multiple least-significant bits. IEEE Transactions on Information Forensics and Security, 3:662–672, 2008 Google Scholar.
[254] R., Zamir, S., Shamai, and U., Erez. Nested linear/lattice codes for structured multiterminal binning. IEEE Transactions on Information Theory, 48(6):1250–1276, 2002 Google Scholar.
[255] T., Zhang and X., Ping. A fast and effective steganalytic technique against Jsteg-like algorithms. In Proceedings of the ACM Symposium on Applied Computing, pages 307–311, Melbourne, FL, March 9-12, 2003 Google Scholar.
[256] T., Zhang and X., Ping. A new approach to reliable detection of LSB steganography in natural images. Signal Processing, 83(10):2085–2094, October 2003 Google Scholar.
[257] W., Zhang, X., Zhang, and S., Wang. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 60–71, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York Google Scholar.
[258] X., Zhang, W., Zhang, and S., Wang. Efficient double-layered steganographic embedding. Electronics Letters, 43:482–483, April 2007 Google Scholar.

Metrics

Full text views

Total number of HTML views: 0
Total number of PDF views: 4273 *
Loading metrics...

Book summary page views

Total views: 11420 *
Loading metrics...

* Views captured on Cambridge Core between September 2016 - 15th April 2025. This data will be updated every 24 hours.

Usage data cannot currently be displayed.