Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 325-331.doi: 10.11896/JsJkx.190600103
• Information Security • Previous Articles Next Articles
PENG Wei1, HU Ning2 and HU Jing-Jing1
CLC Number:
[1] LIU H X,XIA C H.Overview of Steganalytic Algorithm to Digi-tal Images .Computer Engineering and Design,2006,27(1):21-25. [2] WANG S Z,ZHANG X P,ZHANG W M.Recent Advances in Image Based Steganalysis Research .Chinese Journal of Computers,2009,32(7):1247-1263. [3] ZHANG J,XIONG F,ZHANG D.Overview on Image Steganaly-sis Technology .Computer Engineering,2013,39(4):165-168. [4] DONG J,QIAN Y L,WANG W.Recent Advances in Image Steganalysis .Journal of Image and Signal Processing,2017,6(3):131-138. [5] KARAMPIDIS K,KAVALLIERATOU E,PAPADOURAKIS G.A Review of Image Steganalysis Techniques for Digital Forensics .Journal of Information Security and Applications,2018,40:217-235. [6] GUAN Q X,ZHU J,ZHAO X F,et al.Image Steganalysis Based on Linear Programing Feature Selection and Ensemble Classifier .Journal of Cyber Security,2018,3(1):83-94. [7] KADHIM I J,PREMARATNE P,VIAL P J,et al.Comprehensive Survey of Image Steganography:Techniques,Evaluations,and Trends in Future Research .Neurocomputing,2019,335:299-326. [8] PROVES N,HONCYMAN P.Hide and Seek:An Introduction to Steganography .IEEE Security & Privacy,2003,1(3):32-44. [9] PAN F,LI J,YANG X.Image Steganography Method based on PVD and Modulus Function // Proceedings of the 2011 International Conference on Electronics,Communications and Control (ICECC),2011:282-284. [10] KAWAGUCHI K,EASON R O.Principle and Application of BPCS Steganography // Proceedings of SPIE Multimedia Systems and Applications.Boston,1998:464-472. [11] FRIDRICH J,GOLJAN M,DU R.Detecting LSB Steganography in Color and Gray-Scale Images .IEEE Multimedia,2001,8(4):22-28. [12] Proves N.Defending Against Statistical Steganalysis // 10th USENIX Security Symposium.2001:24-25. [13] WESTFELD A.F5-A Steganographic Algorithm:High Capacity Despite Better Steganalysis//Proceedings of 4th InternationalInformation Hiding Workshop.Pittsburgh,2001:289-302. [14] KUMAR V,KUMAR D.A Modified DWT-based Image Steganography Technique .Multimedia Tools and Applications,2018,77(11):13279-13308. [15] SALLEE P.Model-based Steganography // Proceedings of the International Workshop on Digital Watermarking.LNCS,vol.2939,Springer,2003:154-167. [16] SHAFEE S,RAJAEI B.A Secure Steganography Algorithm Using Compressive Sensing based on HVS Feature // Proceedings of the 2017 Seventh International Conference on Emerging Security Technology.IEEE,2017:74-78. [17] GIRDHAR A,KUMAR V.Comprehensive Survey of 3D Image Steganography Techniques .IET Image Processing,2018,12(1):1-10. [18] RABIE T,KAMEL I.High-capacity Steganography:a Global-adaptive-region Discrete Cosine Transform Approach .Multimedia Tools and Applications,2017,76(5):6473-6493. [19] HONG W.Human Visual System based Data Embedding Method Using Quadtree Partitioning .Signal Processing:Image Communication,2012,27(10):1123-1133. [20] XIAO J J,LU Q.Adaptive Steganography Algorithm Based on Vision Effect .Journal of Test and Measurement Technology,2012,26(1):9-14. [21] ZHOU Z,SUN H,HARIT R,et al.Coverless Image Steganography without Embedding // International Conference on Cloud Computing and Security,LNCS,vol.9483.Springer International Publishing,2015:123-132. [22] WU J,LIU Y,DAI Z,et al.A Coverless Information Hiding Algorithm Based on Grayscale Gradient Co-occurrence Matrix .IETE Technical Review,2018,35(sup1):23-33. [23] RUAN S H,QIN Z C.Coverless Covert Communication based on GIF Image .Communications Technology,2017,50(7):160-167. [24] ZHANG X,PENG F,LONG M.Robust Coverless Image Steganography Based on DCT and LDA Topic Classification .IEEE Transactions on Multimedia,2018,20(12):3223-3238. [25] DUAN X,SONG H,QIN C,et al.Coverless Steganography for Digital Images Based on a Generative Model .Computers,Materials & Continua,2018,55(3):483-493. [26] WESTFELD A,PFITZMANN A.Attacks on Steganographic Systems // Proc.of International Workshop on Information Hiding (IH’99).Springer-Verlag,LNCS,1999:61-76. [27] KWANGSOO L,JUNG C,LEE S,et al.New Steganalysis Methodology:LR Cube Analysis for the Detection of LSB Steganography // Proc.of International Workshop on Information Hiding (IH’05).Springer-Verlag,LNCS,2005:312-326. [28] ZHANG T,PING X.A New Approach to Reliable Detection of LSB Steganography in Natural Images .Signal Processing,2003,83(10):2085-2093. [29] ZHANG X P,WANG S Z.Statistical Analysis Against Spatial BPCS Steganography .Journal of Computer Aided Design & Computer Graphics,2005,17(7):1625-1629. [30] ZIOU D,JAFARI R.Efficient Steganalysis of Images:Learning is Good for Anticipation .Pattern Analysis Applications,2014,17(2):279-289. [31] FRIDRICH J,GOLJAN M,HOGEA D.Steganalysis of JPEG Images:Breaking the F5 Algorithm // Proc.of International Workshop on Information Hiding (IH’02).LNCS,2578,2002:310-323. [32] HAN X D,PING X J,ZHANG T.Steganalysis Based on the Differences of Coefficient Combinations of 0,1 for Detecting F5 Steganography .Journal of Information Engineering University,2009,10(2):184-187. [33] PROVOS N,HONEYMAN P.Detecting Steganographic Content on the Internet // Proc.of ISOC NDSS’02.2002:408-412. [34] ZHANG T,PIRLG X.A Fast and Effective Steganalytic Technique Against Jsteg-like Algorithms // Proc.of 2003 ACM Symposium on Applied Computing.ACM Press,2003:307-311. [35] LEE K,WESTFELD A,LEE S.Generalized Category Attack - Improving Histogram-based Attack on JPEG LSB Embedding // Proc.of 9th Information Hiding Workshop.Springer,LNCS,2007:35-48. [36] FRIDRICH J,GOLJAN M,HOGEA D.New Methodology for Breaking Steganographic Techniques for JPEGs // Proc.of IS&T/SHE Electronic Imaging:Security and Watermarking of Multimedia Contents V.SPIE,2003:143-155. [37] LYU S,FARID H.Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines // Proc.IH’02,Springer-Verlag.LNCS,2002:340-354. [38] FARID H,LYU S.Higher-order Wavelet Statistics and Their Application to Digital Forensics // Computer Vision and Pattern Recognition Workshop (CVPRW’03).2003:94-94. [39] HE J H,LIANG X P,LI J Q,et al.Image Steganalysis Based on Bit-Plane Statistical Correlation Using Support Vector Machine .Acta Scientiarum Naturalium Universitatis Sunyatseni,2004,43(sup2):17-20. [40] PEVNY T,BAS P,FRIDRICH J.Steganalysis by Subtractive Pixel AdJacency Matrix .IEEE Transactions on Information Forensics and Security,2010,5(2):215-224. [41] FRIDRICH J,KODOVSKY J.Rich Models for Steganalysis of Digital Images .IEEE Transactions on Information Forensics and Security,2012,7(3):868-882. [42] HOLUB V,FRIDRICH J.Random ProJections of Residuals for Digital Image Steganalysis.IEEE Transactions on Information Forensics and Security,2013,8(12):1996-2006. [43] WHITAKER J M,KER A D.Steganalysis of Overlapping Images .Proceedings of SPIE,vol.9409,Media Watermarking,Security,and Forensics,2015,94090X. [44] AVCIBAS I,MEMON N,SANKUR B.Steganalysis Using Image Quality Metrics .IEEE Transactions on Image Processing,2003,12(2):221-229. [45] SHI Y,CHEN C,CHEN W.A Markov Process based Approach to Effective Attacking JPEG Steganography // Proc.of 8th International Workshop on Information Hiding (IH’2006).Springer,LNCS,2007:249-264. [46] PEVNY T,FRIDRICH J.Merging Markov and DCT Features for Multi-Class JPEG Steganalysis // Proc.of SPIE Electronic Imaging.Photonics West,2007:3-4. [47] KODOVSKY J,FRIDRICH J.Calibration revisited // Proceedings of the 11th ACM Workshop on Multimedia and Security (MM&Sec’09).New York,ACM,2009:63-74. [48] GUAN J B.Research and Implementation of Steganalysis for JPEG Images .Guilin:Guilin University of Electronic Technology,2013. [49] KODOVSKY J,FRIDRICH J.Steganalysis of JPEG Images Using Rich Models // Proc.of SPIE Electronic Imaging,Media Watermarking.Security,and Forensics,2012:1-13. [50] HULOB V,FRIDRICH J.Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT .IEEE Transactions on Information Forensics and Security,2015,10(2):219-228. [51] SONG X,LIU F,YANG C,et al.Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters // Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec’15).New York:ACM,2015:15-23. [52] WANG C,FENG G.Calibration-based Features for JPEG Steganalysis Using Multi-level Filter // Proc.of IEEE International Conference on Signal Processing,Communications and Computing (ICSPCC 2015).2015. [53] SAJEDI H.Adaptive Image Steganalysis .Multimedia Tools and Applications,2018,77(13):17269-17284. [54] FRIDRICH J.Feature-based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes // Proc.of 6th Information Hiding Workshop.Springer,LNCS,2004:67-81. [55] FU D,SHI Y Q,ZOU D,et al.JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain // International Workshop on Multimedia Signal Processing (MMSP’2006).2006:310-313. [56] DONG J,WANG W,TAN T N.Multi-Class Blind Steganalysis Based on Image Run-Length Analysis // Proc.of International Workshop on Digital Watermarking (IWDW’09).LNCS,2009:199-210. [57] XU M.Steganalysis for JPEG Image Based on SVM .Changsha:Hunan University,2012. [58] WANG L N,WANG H S,ZHAI L M,et al.A Blind Steganalytic Method to Detect JPEG Image Steganography .Journal of Wuhan University (Nature Science Edition),2018,64(3):217-224. [59] BABU J,RANGU S,MANOGNA P.A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis .Journal of Information Security,2017,8(3):186-202. [60] XU G,WU H,SHI Y.Structural Design of Convolutional Neural Networks for Steganalysis .IEEE Signal Processing Letters,2016,23(5):708-712. [61] YE J,NI J,YI Y.Deep Learning Hierarchical Representations for Image Steganalysis .IEEE Transactions on Information Forensics and Security,2017,12(11):2545-2557. [62] WU S,ZHONG S,LIU Y.Deep residual learning for image steganalysis .Multimedia Tools and Applications,2018,77(9):10437-10453. [63] GAO P X,WEI L X,LIU J,et al.Image Steganalysis Based on Deep Residual Neural Network .Computer Engineering and Design,2018,39(10):3045-3049. [64] QIN B.JPEG Images Steganalysis Research Based on Bayes Decision .Shenyang:Northeastern University of China,2011. [65] KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble Classifiers for Steganalysis of Digital Media .IEEE Transactions on Information Forensics and Security,2012,7(2):432-444. [66] MA Y,LUO X,LI X,et al.Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction .IEEE Transactions on Circuits and Systems for Video Technology,2019,29(2):336-350. [67] ADELI A,BROUMANDNIA A.Image Steganalysis Using Improved Particle Swarm Optimization Based Feature Selection .Applied Intelligence,2018,48(6):1609-1622. [68] WU M Q,ZHU Z L,JIN S Y.Secret Key Estimation in Sequential Steganography Based on the Laplacian Model .Computer Engineering & Science,2008,30(2):9-14. [69] CHAUMONT M.Deep Learning in Steganography and Steganalysis from 2015 to 2018 .Draft,Montpellier University,2019. |
[1] | LI Yin, LI Bi-xin. Memory Leak Test Acceleration Based on Script Prediction and Reconstruction [J]. Computer Science, 2020, 47(9): 31-39. |
[2] | DING Yu, WEI Hao, PAN Zhi-song, LIU Xin. Survey of Network Representation Learning [J]. Computer Science, 2020, 47(9): 52-59. |
[3] | SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251. |
[4] | DONG Ming-gang, HUANG Yu-yang, JING Chao. K-Nearest Neighbor Classification Training Set Optimization Method Based on Genetic Instance and Feature Selection [J]. Computer Science, 2020, 47(8): 178-184. |
[5] | WANG Hui, LE Zi-chun, GONG Xuan, WU Yu-kun, ZUO Hao. Review of Link Prediction Methods Based on Feature Classification [J]. Computer Science, 2020, 47(8): 302-312. |
[6] | YUAN Ye, HE Xiao-ge, ZHU Ding-kun, WANG Fu-lee, XIE Hao-ran, WANG Jun, WEI Ming-qiang, GUO Yan-wen. Survey of Visual Image Saliency Detection [J]. Computer Science, 2020, 47(7): 84-91. |
[7] | ZHANG Yan, QIN Liang-xi. Improved Salp Swarm Algorithm Based on Levy Flight Strategy [J]. Computer Science, 2020, 47(7): 154-160. |
[8] | WANG Meng, DING Zhi-jun. New Device Fingerprint Feature Selection and Model Construction Method [J]. Computer Science, 2020, 47(7): 257-262. |
[9] | REN Shuai, WANG Meng, FAN Ao-xiong, GAO Ze, XU Jie, Shahzad KHURRAM, ZHANG Tao. Zero-high-resolution Information Hiding Algorithm for 3D Mesh Model [J]. Computer Science, 2020, 47(7): 328-334. |
[10] | BAO Zhen-shan, GUO Jun-nan, XIE Yuan and ZHANG Wen-bo. Model for Stock Price Trend Prediction Based on LSTM and GA [J]. Computer Science, 2020, 47(6A): 467-473. |
[11] | LI Jin-xia, ZHAO Zhi-gang, LI Qiang, LV Hui-xian and LI Ming-sheng. Improved Locality and Similarity Preserving Feature Selection Algorithm [J]. Computer Science, 2020, 47(6A): 480-484. |
[12] | ZHU Lin-li, HUA Gang, GAO Wei. Stability Analysis of Ontology Learning Algorithm in Decision Graph Setting [J]. Computer Science, 2020, 47(5): 43-50. |
[13] | JIAN Song-lei, LU Kai. Survey on Representation Learning of Complex Heterogeneous Data [J]. Computer Science, 2020, 47(2): 1-9. |
[14] | LIU Miao-miao,HU Qing-cui,GUO Jing-feng,CHEN Jing. Survey of Link Prediction Algorithms in Signed Networks [J]. Computer Science, 2020, 47(2): 21-30. |
[15] | WU Yu-kun,XIAO Jie,Wei William LEE,LOU Ji-lin. Support Vector Machine Model Based on Grey Wolf Optimization Fused Asymptotic [J]. Computer Science, 2020, 47(2): 37-43. |
|