Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-zzh7m Total loading time: 0 Render date: 2024-04-26T01:13:48.033Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  05 April 2014

Jessica Fridrich
Affiliation:
State University of New York, Binghamton
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Steganography in Digital Media
Principles, Algorithms, and Applications
, pp. 409 - 426
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] Fingerprints for car parts. The Economist, December 8, 2005.
[2] G. F., Amelio, M. F., Tompsett, and G. E., Smith. Experimentalverification of the charge coupled device concept. Bell Systems Technical Journal, 49:593–600, 1970.Google Scholar
[3] R., Anderson. Stretching the limits of steganography. In R. J., Anderson, editor, Information Hiding, 1st International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 39–48, Cambridge, May 30-June 1, 1996. Springer-Verlag, Berlin.Google Scholar
[4] R. J., Anderson, R., Needham, and A., Shamir. The steganographic file system. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 73–82, Portland, OR, April 14-17, 1998. Springer-Verlag, Berlin.Google Scholar
[5] R. J., Anderson and F. A. P., Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communication, 16(4):474–481, 1998.Google Scholar
[6] N., Aoki. A band extension technique for G.711 speech using steganography. IEICE Transactions on Communications, E89-B(6):1896–1898, 2006.Google Scholar
[7] N., Aoki. Potential of value-added speech communications by using steganography. In B.-Y., Liao, editor, Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, volume 2, pages 251–254, Kaohsiung, Taiwan, November 26-28, 2007.Google Scholar
[8] A., Aspect, J., Dalibard, and G., Roger. Experimental test of Bell's inequalities using time-varying analyzers. Physical Review Letters, 49:1804, 1982.Google Scholar
[9] I., Avcibas. Audio steganalysis with content-independent distortion measures. IEEE Signal Processing Letters, 13:92–95, February 2006.Google Scholar
[10] I., Avcibas, M., Kharrazi, N. D., Memon, and B., Sankur. Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing, 17:2749–2757, 2005.Google Scholar
[11] I., Avcibas, N. D., Memon, and B., Sankur. Steganalysis using image quality metrics. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, pages 523–531, San Jose, CA, January 22-25, 2001.Google Scholar
[12] I., Avcibas, N. D., Memon, and B., Sankur. Image steganalysis with binary similarity measures. In Proceedings IEEE, International Conference on Image Processing, ICIP 2002, volume 3, pages 645–648, Rochester, NY, September 22-25, 2002.Google Scholar
[13] F., Bach, D., Heckerman, and E., Horvitz. On the path to an ideal ROC curve: Considering cost asymmetry in learning classifiers. In R. G., Cowell and Z., Ghahramani, editors, Proceedings of the 10th International Workshop on Artificial Intelligence and Statistics (AISTATS), pages 9–16. Society for Artificial Intelligence and Statistics, 2005. Available electronically at http://www.gatsby.ucl.ac.uk/aistats/.Google Scholar
[14] M., Backes and C., Cachin. Public-key steganography with active attacks. In J., Kilian, editor, 2nd Theory of Cryptography Conference, volume 3378 of Lecture Notes in Computer Science, pages 210–226, Cambridge, MA, February 10-12, 2005. Springer-Verlag, Heidelberg.Google Scholar
[15] F., Bacon. Of the Advancement and Proficiencie of Learning or the Partitions of Sciences, volume VI. Leon Lichfield, Oxford, for R., Young and E., Forest, 1640.Google Scholar
[16] M., Barni and F., Bartolini. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, volume 21 of Signal Processing and Communications. Boca Raton, FL: CRC Press, 2004.Google Scholar
[17] R. J., Barron, B., Chen, and G. W., Wornell. The duality between information embedding and source coding with side information and some applications. IEEE Transactions on Information Theory, 49(5):1159–1180, 2003.Google Scholar
[18] R., Bergmair. Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. Final year thesis, April 2004. University of Derby, http://bergmair.cjb.net/pub/towlingsteg-rep-inoff-a4.ps.gz.Google Scholar
[19] J., Bierbrauer. Introduction to Coding Theory. London: Chapman & Hall/CRC, 2004.Google Scholar
[20] J., Bierbrauer and J., Fridrich. Constructing good covering codes for applications in steganography. LNCS Transactions on Data Hiding and Multimedia Security, 4920:1–22, 2008.Google Scholar
[21] R., Böhme. Weighted stego-image steganalysis for JPEG covers. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 178–194, Santa Barbara, CA, June 19-21, 2007. Springer-Verlag, New York.Google Scholar
[22] R., Böhme. Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals. PhD thesis, Faculty of Computer Science, Technische Universität Dresden, 2008.Google Scholar
[23] R., Böhme and A. D., Ker. A two-factor error model for quantitative steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 59–74, San Jose, CA, January 16-19, 2006.Google Scholar
[24] R., Böhme and A., Westfeld. Feature-based encoder classification of compressed audio streams. ACM Multimedia System Journal, 11(2):108–120, 2005.Google Scholar
[25] I. A., Bolshakov. Method of linguistic steganography based on collocationally-verified synonymy. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 180–191, Toronto, May 23-25, 2005. Springer-Verlag, Berlin.Google Scholar
[26] K., Borders and A., Prakash. Web tap: Detecting covert web traffic. In V., Atluri, B., Pfitz-mann, and P. Drew, McDaniel, editors, Proceedings 11th ACM Conference on Computer and Communications Security (CCS), pages 110–120, Washington, DC, October 25-29, 2004.Google Scholar
[27] S., Boyd and L., Vandenberghe. Convex Optimization. Cambridge: Cambridge University Press, 2004.Google Scholar
[28] W. S., Boyle and G. E., Smith. Charge coupled semiconductor devices. Bell Systems Technical Journal, 49:587–593, 1970.Google Scholar
[29] J., Brassil, S., Low, N. F., Maxemchuk, and L., O'Gorman. Hiding information in document images. In Proceedings of the Conference on Information Sciences and Systems, CISS, pages 482–489, Johns Hopkins University, Baltimore, MD, March 22-24, 1995.Google Scholar
[30] R. P., Brent, S., Gao, and A. G. B., Lauder. Random Krylov spaces over finite fields. SIAM Journal of Discrete Mathematics, 16(2):276–287, 2003.Google Scholar
[31] D., Brewster. Microscope, volume XIV. Encyclopaedia Britannica or the Dictionary of Arts, Sciences, and General Literature, Edinburgh, IX – Application of photography to the microscope, 8th edition, 1857.Google Scholar
[32] C. W., Brown and B. J., Shepherd. Graphics File Formats. Greenwich, CT: Manning Publications Co., 1995.Google Scholar
[33] C. J. C., Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2(2):121–167, 1998.Google Scholar
[34] S., Cabuk, C. E., Brodley, and C., Shields. IP covert timing channels: Design and detection. In V., Atluri, B., Pfitzmann, and P. Drew, McDaniel, editors, Proceedings 11th ACM Conference on Computer and Communications Security (CCS), pages 178–187, Washington, DC, October 25-29, 2004.Google Scholar
[35] C., Cachin. An information-theoretic model for steganography. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 306–318, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.Google Scholar
[36] G., Cancelli and M., Barni. MPSteg-color: A new steganographic technique for color images. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 1–15, Saint Malo, June 11-13, 2007. Springer-Verlag, Berlin.Google Scholar
[37] G., Cancelli, G., Doërr, I. J., Cox, and M., Barni. A comparative study of ±1 steganalyzers. In Proceedings IEEE International Workshop on Multimedia Signal Processing, pages 791–796, Cairns, Australia, October 8-10, 2008.Google Scholar
[38] G., Cancelli, G., Doërr, I. J., Cox, and M., Barni. Detection of ± 1 LSB steganography based on the amplitude of histogram local extrema. In Proceedings IEEE, International Conference on Image Processing, ICIP 2008, pages 1288–1291, San Diego, CA, October 12-15, 2008.Google Scholar
[39] R., Chandramouli and N. D., Memon. A distributed detection framework for steganalysis. In J., Dittmann, K., Nahrstedt, and P., Wohlmacher, editors, Proceedings of the 3rd ACM Multimedia & Security Workshop, pages 123–126, Los Angeles, CA, November 4, 2000.Google Scholar
[40] R., Chandramouli and N. D., Memon. Analysis of LSB based image steganography techniques. In Proceedings IEEE International Conference on Image Processing, ICIP 2001, Thessaloniki, October 7-10, 2001. CD ROM version.Google Scholar
[41] M., Chapman, G. I., Davida, and M., Rennhard. A practical and effective approach to large-scale automated linguistic steganography. In Proceedings of the 4th International Conference on Information Security, volume 2200 of Lecture Notes in Computer Science, pages 156–165, Malaga, October 1-3, 2001. Springer-Verlag, Berlin.Google Scholar
[42] B., Chen and G., Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4):1423–1443, 2001.Google Scholar
[43] M., Chen, J., Fridrich, and M., Goljan. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, 1(1):74–90, March 2008.Google Scholar
[44] H. G., Chew, R. E., Bogner, and C. C., Lim. Dual-V support vector machine with error rate and training size biasing. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, volume 2, pages 1269–1272, Salt Lake City, UT, May 7-11, 2001.Google Scholar
[45] C. T., Clelland, V., Risca, and C., Bancroft. Hiding messages in DNA microdots. Nature, 399:533–534, June 10, 1999.Google Scholar
[46] G. D., Cohen, I., Honkala, S., Litsyn, and A., Lobstein. Covering Codes, volume 54. Amsterdam: Elsevier, North-Holland Mathematical Library, 1997.Google Scholar
[47] E., Cole. Hiding in Plain Sight: Steganography and the Art of Covert Communication. New York: Wiley Publishing Inc., 2003.Google Scholar
[48] S., Coll and S. B., Glasser. Terrorists turn to web as base of operations. Washington Post, page A01, August 7, 2005.Google Scholar
[49] P., Comesana and F., Pérez-Gonzáles. On the capacity of stegosystems. In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3–14, Dallas, TX, September 20-21, 2007.Google Scholar
[50] T. M., Cover and J. A., Thomas. Elements of Information Theory. NewYork: John Wiley & Sons, Inc., 1991.Google Scholar
[51] I. J., Cox, M. L., Miller, J. A., Bloom, J., Fridrich, and T., Kalker. Digital Watermarking and Steganography. Morgan Kaufman Publishers Inc., San Francisco, CA, 2007.Google Scholar
[52] R., Crandall. Some notes on steganography. Steganography Mailing List, available from http://os.inf.tu-dresden.de/~westfeld/crandall.pdf, 1998.Google Scholar
[53] S., Craver. On public-key steganography in the presence of an active warden. In D., Auc-smith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 355–368, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.Google Scholar
[54] N., Cristianini and J., Shawe-Taylor. Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge: Cambridge University Press, 2000.Google Scholar
[55] O., Dabeer, K., Sullivan, U., Madhow, S., Chandrasekaran, and B. S., Manjunath. Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing, 52:3046–3058, 2004.Google Scholar
[56] N., Dedic, G., Itkis, L., Reyzin, and S., Russell. Upper and lower bounds on black-box steganography. In J., Kilian, editor, Theory of Cryptography, volume 3378 of Lecture Notes in Computer Science, pages 227–244, Cambridge, MA, February 10-12, 2005. Springer-Verlag, London.Google Scholar
[57] Y., Desmedt. Subliminal-free authentication and signature. In C. G., Günther, editor, Advances in Cryptology – EUROCRYPT '88, Workshop on the Theory and Application of Cryptographic Techniques, volume 330 of Lecture Notes in Computer Science, pages 22–33, Davos, May 25-27, 1988. Springer-Verlag, Berlin.Google Scholar
[58] J., Dittmann, T., Vogel, and R., Hillert. Design and evaluation of steganography for voice-over-IP. In Proceedings IEEE International Symposium on Circuits and Systems (ISCAS), Kos, May 21-24, 2006.Google Scholar
[59] E. R., Dougherty. Random Processes for Image and Signal Processing, volume Monograph PM44. Washington, DC: SPIE Press, International Society for Optical Engineering, 1998.Google Scholar
[60] I., Dumer. Handbook of Coding Theory: Volume II, chapter 23, Concatenated Codes and Their Multilevel Generalizations, pages 1911–1988. Elsevier Science, Amsterdam, 1998.Google Scholar
[61] S., Dumitrescu and X., Wu. LSB steganalysis based on higher-order statistics. In A. M., Eskicioglu, J., Fridrich, and J., Dittmann, editors, Proceedings of the 7th ACM Multimedia & Security Workshop, pages 25–32, New York, NY, August 1-2, 2005.Google Scholar
[62] S., Dumitrescu, X., Wu, and N.D., Memon. On steg analysis of random LSB embedding in continuous-tone images. In Proceedings IEEE, International Conference on Image Processing, ICIP 2002, pages 324–339, Rochester, NY, September 22-25, 2002.Google Scholar
[63] S., Dumitrescu, X., Wu, and Z., Wang. Detection of LSB steganography via Sample Pairs Analysis. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 355–372, Noord-wijkerhout, October 7-9, 2002. Springer-Verlag, New York.Google Scholar
[64] J., Eggers, R., Bäuml, and B., Girod. A communications approach to steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 26–37, San Jose, CA, January 21-24, 2002.Google Scholar
[65] T., Ernst. Schwarzweisse Magie. Der Schlüssel zum dritten Buch der Steganographia des Trithemius. Daphnis, 25(1), 1996.Google Scholar
[66] J. M., Ettinger. Steganalysis and game equilibria. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 319–328, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.Google Scholar
[67] H., Farid and L., Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 340–354, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York.Google Scholar
[68] T., Filler and J., Fridrich. Binary quantization using belief propagation over factor graphs of LDGM codes. In 45th Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, September 26-28, 2007.Google Scholar
[69] T., Filler and J., Fridrich. Complete characterization of perfectly secure stegosystems with mutually independent embedding. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, Taipei, April 19-24, 2009.Google Scholar
[70] T., Filler and J., Fridrich. Fisher information determines capacity of e-secure steganog-raphy. In S., Katzenbeisser and A.-R., Sadeghi, editors, Information Hiding, 11th International Workshop, volume 5806 of Lecture Notes in Computer Science, pages 31–47, Darmstadt, June 7-10, 2009. Springer-Verlag, New York.Google Scholar
[71] T., Filler, A. D., Ker, and J., Fridrich. The Square Root Law of steganographic capacity for Markov covers. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 08 1-08 11, San Jose, CA, January 18-21, 2009.Google Scholar
[72] G., Fisk, M., Fisk, C., Papadopoulos, and J., Neil. Eliminating steganography in Internet traffic with active wardens. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 18–35, Noordwijkerhout, October 7-9, 2003. Springer-Verlag, New York.Google Scholar
[73] M. A., Fitch and R. E., Jamison. Minimum sum covers of small cyclic groups. Congressus Numerantium, 147:65–81, 2000.Google Scholar
[74] J. D., Foley, A., van Dam, S. K., Feiner, J. F., Hughes, and R. L., Phillips. Introduction to Computer Graphics. New York: Addison-Wesley, 1997.Google Scholar
[75] E., Franz. Steganography preserving statistical properties. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 278–294, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York.Google Scholar
[76] E., Franz. Embedding considering dependencies between pixels. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages D 1-D 12, San Jose, CA, January 27-31, 2008.Google Scholar
[77] E., Franz and A., Schneidewind. Pre-processing for adding noise steganography. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 189–203, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.Google Scholar
[78] J., Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67–81, Toronto, May 23-25, 2004. Springer-Verlag, New York.Google Scholar
[79] J., Fridrich. Asymptotic behavior of the ZZW embedding construction. IEEE Transactions on Information Forensics and Security, 4(1):151–153, March 2009.Google Scholar
[80] J., Fridrich and R., Du. Secure steganographic methods for palette images. In A., Pfitz-mann, editor, Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 47–60, Dresden, September 29-October 1, 1999. Springer-Verlag, New York.Google Scholar
[81] J., Fridrich, P., Lisonëk, and D., Soukal. On steganographic embedding efficiency. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 282–296, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.Google Scholar
[82] J., Fridrich and M., Goljan. Digital image steganography using stochastic modulation. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 191–202, Santa Clara, CA, January 21-24, 2003.Google Scholar
[83] J., Fridrich and M., Goljan. On estimation of secret message length in LSB steganog-raphy in spatial domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 23–34, San Jose, CA, January 19-22, 2004.Google Scholar
[84] J., Fridrich, M., Goljan, and R., Du. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, Special Issue on Security, 8(4):22–28, October-December 2001.Google Scholar
[85] J., Fridrich, M., Goljan, and R., Du. Steganalysis based on JPEG compatibility. In A. G., Tescher, editor, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, volume 4518, pages 275–280, Denver, CO, August 20-24, 2001.Google Scholar
[86] J., Fridrich, M., Goljan, and D., Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. In Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 310–323, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York.Google Scholar
[87] J., Fridrich, M., Goljan, D., Hogea, and D., Soukal. Quantitative steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, 9(3):288–302, 2003.Google Scholar
[88] J., Fridrich, M., Goljan, and D., Soukal. Higher-order statistical steganalysis of palette images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, pages 178–190, Santa Clara, CA, January 21-24, 2003.Google Scholar
[89] J., Fridrich, M., Goljan, and D., Soukal. Perturbed quantization steganography using wet paper codes. In J., Dittmann and J., Fridrich, editors, Proceedings of the 6th ACM Multimedia & Security Workshop, pages 4–15, Magdeburg, September 20-21, 2004.Google Scholar
[90] J., Fridrich, M., Goljan, and D., Soukal. Searching for the stego key. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 70–82, San Jose, CA, January 19-22, 2004.Google Scholar
[91] J., Fridrich, M., Goljan, and D., Soukal. Efficient wet papercodes. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, Lecture Notes in Computer Science, pages 204–218, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.Google Scholar
[92] J., Fridrich, M., Goljan, and D., Soukal. Perturbed quantization steganography. ACM Multimedia System Journal, 11(2):98–107, 2005.Google Scholar
[93] J., Fridrich, M., Goljan, and D., Soukal. Steganography via codes for memory with defective cells. In 43rd Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, September 28-30, 2005.Google Scholar
[94] J., Fridrich, M., Goljan, D., Soukal, and T., Holotyak. Forensic steganalysis: Determining the stego key in spatial domain steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 631–642, San Jose, CA, January 16-20, 2005.Google Scholar
[95] J., Fridrich, T., Pevny, and J., Kodovsky. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3–14, Dallas, TX, September 20-21, 2007.Google Scholar
[96] J., Fridrich and D., Soukal. Matrix embedding for large payloads. IEEE Transactions on Information Forensics and Security, 1(3):390–394, 2006.Google Scholar
[97] F., Galand and C., Fontaine. How Reed-Solomon codes can improve steganographic schemes. EURASIP Journal on Information Security, 2009. Article ID 274845, doi:10.1155/2009/274845.Google Scholar
[98] F., Galand and G., Kabatiansky. Information hiding by coverings. In Proceedings IEEE, Information Theory Workshop, ITW 2003, pages 151–154, Paris, March 31-April 4, 2003.Google Scholar
[99] S. I., Gel'fand and M. S., Pinsker. Coding for channel with random parameters. Problems of Control and Information Theory, 9(1):19–31, 1980.Google Scholar
[100] S., Gianvecchio and H., Wang. Detecting covert timing channels: An entropy-based approach. In P., Ning, S. De Capitani di, Vimercati, and P. F., Syverson, editors, Proceedings 14th ACM Conference on Computer and Communication Security (CCS), pages 307–316, Alexandria, VA, October 28-31, 2007.Google Scholar
[101] J., Giffin, R., Greenstadt, P., Litwack, and R., Tibbetts. Covert messaging through TCP timestamps. In R., Dingledine and P., Syverson, editors, Proceedings Privacy Enhancing Technologies Workshop (PET), volume 2482 of Lecture Notes in Computer Science, pages 194–208, San Francisco, CA, April 14-15, 2002. Springer-Verlag, Berlin.Google Scholar
[102] M., Goljan, J., Fridrich, and T., Holotyak. New blind steganalysis and its implications. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 1–13, San Jose, CA, January 16-19, 2006.Google Scholar
[103] R. L., Graham and N. J. A., Sloane. On additive bases and harmonious graphs. SIAM Journal on Algebraic and Discrete Methods, 1(4):382–404, December 1980.Google Scholar
[104] A., Gretton, K. M., Borgwardt, M., Rasch, B., Schölkopf, and A. J., Smola. A kernel method forthe two-sample-problem. In B., Schölkopf, J., Platt, and T., Hoffman, editors, Advances in Neural Information Processing Systems 19, pages 513–520. MIT Press, Cambridge, MA, 2007.Google Scholar
[105] H., Haanpää. Minimum sum and difference covers of abelian groups. Journal of Integer Sequences, 7(2), 2004. Article 04.2.6.Google Scholar
[106] T. G., Handel and M. T., Stanford IIIHiding data in the OSI network model. In Information Hiding, 1st International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 23-38, Cambridge, May 30-June 1, 1996. Springer-Verlag, Berlin.Google Scholar
[107] J. J., Harmsen and W. A., Pearlman. Steganalysis of additive noise modelable information hiding. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 131–142, Santa Clara, CA, January 21-24, 2003.Google Scholar
[108] C., Heegard and A. A., El-Gamal. On the capacity of computer memory with defects. IEEE Transactions on Information Theory, 29(5):731–739, 1983.Google Scholar
[109] Herodotus. The Histories. Penguin Books, London, 1996. Translated by Aubrey de Sélincourt.
[110] S., Hetzl and P., Mutzel. A graph-theoretic approach to steganography. In J., Dittmann, S., Katzenbeisser, and A., Uhl, editors, Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, volume 3677 of Lecture Notes in Computer Science, pages 119–128, Salzburg, September 19-21, 2005.Google Scholar
[111] F. S., Hill Jr., Computer Graphics Using Open GL. Upper Saddle River, NJ: Prentice Hall, 2nd edition, 2000.Google Scholar
[112] N. J., Hopper. On steganographic chosen covertext security. In 32nd Annual International Colloquium on Automata, Languages and Programming, (ICALP 2005), pages 311–321, Lisbon, July 11-15, 2005.Google Scholar
[113] N. J., Hopper, J., Langford, and L., von Ahn. Provably secure steganography. In M., Yung, editor, Advances in Cryptology, CRYPTO '02, 22nd Annual International Cryptology Conference, volume 2442 of Lecture Notes in Computer Science, pages 77–92, Santa Barbara, CA, August 18-22, 2002. Springer-Verlag.Google Scholar
[114] C., Hsu and C., Lin. A comparison of methods for multi-class support vector machines. Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, 2001.Google Scholar
[115] D. F., Hsu and X., Jia. Additive bases and extremal problems in groups, graphs and networks. Utilitas Mathematica, 66:61–91, 2004.Google Scholar
[116] G. A., Francia III and T. S., Gomez. Steganography obliterator: An attack on the least significant bits. In Proceedings 3rd Annual Conference on Information Security Curriculum Development (InfoSecCD '06), pages 85–91, Kennesaw State University, Kennesaw, GA, September 22-23, 2006.Google Scholar
[117] D., Johnson. White King and Red Queen: How the Cold War Was Fought on the Chessboard. Houghton Mifflin Company, Boston and New York, 2008.Google Scholar
[118] M. K., Johnson, S., Lyu, and H., Farid. Steganalysis of recorded speech. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 664–672, San Jose, CA, January 16-20, 2005.Google Scholar
[119] N. F., Johnson and S., Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer, 31:26–34, February 1998.Google Scholar
[120] N. F., Johnson and S., Jajodia. Steganalysis of images created using current steganography software. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 273–289, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.Google Scholar
[121] N. F., Johnson and S., Jajodia. Steganalysis: The investigation of hidden information. In Proceedings IEEE, Information Technology Conference, Syracuse, NY, September 1-3, 1998.Google Scholar
[122] N. F., Johnson and P., Sallee. Detection of hidden information, covert channels and information flows. In John G., Voeller, editor, Wiley Handbook of Science Technology for Homeland Security. New York: Wiley & Sons, Inc, April 4, 2008.Google Scholar
[123] S., Katzenbeisser and F. A. P., Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking. New York: Artech House, 2000.
[124] S., Katzenbeisser and F. A. P., Petitcolas. Defining security in steganographic systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 50–56, San Jose, CA, January 21-24, 2002.Google Scholar
[125] S. M., Kay. Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory, volume II. Upper Saddle River, NJ: Prentice Hall, 1998.Google Scholar
[126] S. M., Kay. Fundamentals of Statistical Signal Processing, Volume II: Detection Theory, volume II. Upper Saddle River, NJ: Prentice Hall, 1998.Google Scholar
[127] A. D., Ker. Improved detection of LSB steganography in grayscale images. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 97–115, Toronto, May 23-25, 2004. Springer-Verlag, Berlin.Google Scholar
[128] A. D., Ker. A general framework for structural analysis of LSB replacement. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 296–311, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.Google Scholar
[129] A. D., Ker. Resampling and the detection of LSB matching in color bitmaps. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 1–15, San Jose, CA, January 16-20, 2005.Google Scholar
[130] A. D., Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6):441–444, June 2005.Google Scholar
[131] A. D., Ker. Fourth-order structural steganalysis and analysis of cover assumptions. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 25–38, San Jose, CA, January 16-19, 2006.Google Scholar
[132] A. D., Ker. A capacity result for batch steganography. IEEE Signal Processing Letters, 14(8):525–528, 2007.Google Scholar
[133] A. D., Ker. A fusion of maximal likelihood and structural steganalysis. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 204–219, Saint Malo, June 11-13, 2007. Springer-Verlag, Berlin.Google Scholar
[134] A. D., Ker. Optimally weighted least-squares steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 6 1-6 16, San Jose, CA, January 29-February 1, 2007.Google Scholar
[135] A. D., Ker. Steganalysis of embedding in two least significant bits. IEEE Transactions on Information Forensics and Security, 2:46–54, 2007.Google Scholar
[136] A. D., Ker. The ultimate steganalysis benchmark? In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 141–148, Dallas, TX, September 20-21, 2007.Google Scholar
[137] A. D., Ker. Locating steganographic payload via WS residuals. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 27–32, Oxford, September 22-23, 2008.Google Scholar
[138] A. D., Ker and R., Böhme. Revisiting weighted stego-image steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1-5 17, San Jose, CA, January 27-31, 2008.Google Scholar
[139] A. D., Ker and I., Lubenko. Feature reduction and payload location with WAM steganalysis. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 0A 1-0A 13, San Jose, CA, January 18-21, 2009.Google Scholar
[140] A. D., Ker, T., Pevny, J., Kodovsky, and J., Fridrich. The Square Root Law of stegano-graphic capacity. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 107–116, Oxford, September 22-23, 2008.Google Scholar
[141] Y., Kim, Z., Duric, and D., Richards. Modified matrix encoding technique for minimal distortion steganography. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 314–327, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.Google Scholar
[142] G., Kipper. Investigator's Guide to Steganography. Boca Raton, FL: CRC Press, 2004.Google Scholar
[143] J., Kodovsky and J., Fridrich. Influence of embedding strategies on security of stegano-graphic methods in the JPEG domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 2 1-2 13, San Jose, CA, January 27-31, 2008.Google Scholar
[144] J., Kodovsky and J., Fridrich. On completeness of feature spaces in blind steganalysis. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123–132, Oxford, September 22-23, 2008.Google Scholar
[145] G., Kolata. A mystery unraveled, twice. The New York Times, pages F1–F6, April 14, 1998.Google Scholar
[146] G., Kolata. Veiled messages of terror may lurk in cyberspace. The New York Times, October 30, 2001.Google Scholar
[147] N., Komaki, N., Aoki, and T., Yamamoto. A packet loss concealment technique for VoIP using steganography. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, E86-A(8):2069–2072, 2003.Google Scholar
[148] O., Koval, S., Voloshynovskiy, T., Holotyak, and T., Pun. Information theoretic analysis of steganalysis in real images. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 11–16, Geneva, September 26-27, 2006.Google Scholar
[149] C., Krätzer and J., Dittmann. Pros and cons of melcepstrum based audio steganalysis using SVM classification. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, pages 359–377, Saint Malo, June 11-13, 2007.Google Scholar
[150] C., Krätzer, J., Dittmann, A., Lang, and T., Kühne. WLAN steganography: A first practical review. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 17–22, Geneva, September 26-27, 2006.Google Scholar
[151] M., Kutter and F. A. P., Petitcolas. A fair benchmark for image watermarking systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents I, volume 3657, pages 226–239, San Jose, CA, 1999.Google Scholar
[152] A. V., Kuznetsov and B. S., Tsybakov. Coding in a memory with defective cells. Problems of Information Transmission, 10:132–138, 1974.Google Scholar
[153] Tri, Van Le. Efficient provably secure public key steganography. Technical report, Florida State University, 2003. Cryptography ePrint Archive, http://eprint.iacr.org/2003/156.Google Scholar
[154] Tri, Van Le and K., Kurosawa. Efficient public key steganography secure against adaptively chosen stegotext attacks. Technical report, Florida State University, 2003. Cryptography ePrint Archive, http://eprint.iacr.org/2003/244.Google Scholar
[155] K., Lee, C., Jung, S., Lee, and J., Lim. New steganalysis methodology: LR cube analysis for the detection of LSB steganography. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 312–326, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.Google Scholar
[156] K., Lee and A., Westfeld. Generalized category attack - improving histogram-based attack on JPEG LSB embedding. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 378–392, Saint Malo, June 11-13, 2007. Springer-Verlag, Berlin.Google Scholar
[157] K., Lee, A., Westfeld, and S., Lee. Category attack for LSB embedding of JPEG images. In Y.-Q., Shi, B., Jeon, Y.Q., Shi, and B., Jeon, editors, Digital Watermarking, 5th International Workshop, volume 4283 of Lecture Notes in Computer Science, pages 35–48, Jeju Island, November 8-10, 2006. Springer-Verlag, Berlin.Google Scholar
[158] X., Li, B., Yang, D., Cheng, and T., Zeng. A generalization of LSB matching. IEEE Signal Processing Letters, 16(2):69–72, February 2009.Google Scholar
[159] X., Li, T., Zeng, and B., Yang. Detecting LSB matching by applying calibration technique for difference image. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 133–138, Oxford, September 22-23, 2008.Google Scholar
[160] X., Li, T., Zeng, and B., Yang. Improvement of the embedding efficiency of LSB matching by sum and difference covering set. In Proceedings IEEE, International Conference on Multimedia and Expo, pages 209–212, Hannover, June 23-April 26, 2008.Google Scholar
[161] Tsung-Yuan, Liu and Wen-Hsiang, Tsai. A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1):24–30, March 2007.Google Scholar
[162] D., Llamas, C., Allison, and A., Miller. Covert channels in internet protocols: A survey. In M., Merabti and R., Pereira, editors, Proceedings 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting (PGNET), Liverpool, June 27-28, 2005.Google Scholar
[163] P., Lu, X., Luo, Q., Tang, and L., Shen. An improved sample pairs method for detection of LSB embedding. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 116–127, Toronto, May 23-25, 2004. Springer-Verlag, Berlin.Google Scholar
[164] M., Luby. LT, codes. In 43rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2002, pages 271–282, Vancouver, November 16-19, 2002.Google Scholar
[165] N. B., Lucena, G., Lewandowski, and S. J., Chapin. Covert channels in IPv6. In G., Danezis and D., Martin, editors, Proceedings Privacy Enhancing Technologies Workshop (PET), volume 3856 of Lecture Notes in Computer Science, pages 147–166, Dubrovnik, May 30-June 1, 2006. Springer-Verlag, Berlin.Google Scholar
[166] A., Lysyanskaya and M., Meyerovich. Steganography with imperfect sampling. Technical report, Brown University, 2005. Cryptography ePrint Archive, http://eprint.iacr.org/2005/305.Google Scholar
[167] S., Lyu and H., Farid. Steganalysis using color wavelet statistics and one-class support vectormachines. In E.J., Delp and P.W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 35–45, San Jose, CA, January 19-22, 2004.Google Scholar
[168] S., Lyu and H., Farid. Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, 1(1):111–119, 2006.Google Scholar
[169] W., Mazurczyk and K., Szczypiorski. Steganography of VoIP streams. In Proceedings of the 3rd International Symposium on Information Security, volume 5332 of Lecture Notes in Computer Science, pages 1001–1018, Monterrey, Mexico, November 10-11, 2008. Springer-Verlag, Berlin.Google Scholar
[170] A. D., McDonald and M. G., Kuhn. StegFS: A steganographic file system for Linux. In Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 454–468, Dresden, September 29-October 1, 1999. Springer-Verlag, Berlin.Google Scholar
[171] D. J. C., McKay. Information Theory, Inference, and Learning Algorithms. Cambridge: Cambridge University Press, 2003.Google Scholar
[172] S., Meignen and H., Meignen. On the modeling of DCT and subband image data for compression. IEEE Transactions on Image Processing, 4(2):186–193, February 1995.Google Scholar
[173] Y., Miche, B., Roue, A., Lendasse, and P., Bas. A feature selection methodology for steganalysis. In B., Günsel, A. K., Jain, A. M., Tekalp, and B., Sankur, editors, Multimedia Content Representation, Classification and Security, International Workshop, volume 4105 of Lecture Notes in Computer Science, pages 49–56, Istanbul, September 11-13, 2006. Springer-Verlag.Google Scholar
[174] J., Mielikainen. LSB matching revisited. IEEE Signal Processing Letters, 13(5):285–287, May 2006.Google Scholar
[175] M. K., Mihcak, I., Kozintsev, K., Ramchandran, and P., Moulin. Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters, 6(12):300–303, December 1999.Google Scholar
[176] D. S., Mitrinovic, J. E., Pecaric, and A. M., Fink. Classical and New Inequalities in Analysis. Kluwer Academic Publishers, Dordrecht, 1993.Google Scholar
[177] I. S., Moskowitz, R. E., Newman, D. P., Crepeau, and A. R., Miller. Covert channels and anonymizing networks. In S., Jajodia, P., Samarati, and P. F., Syverson, editors, Proceedings Workshop on Privacy in the Electronic Society (WPES), pages 79–88, Washington, DC, October 30, 2003.Google Scholar
[178] P., Moulin, M. K., Mihcak, and G. I., Lin. An information-theoretic model for image watermarking and data hiding. In Proceedings IEEE, International Conference on Image Processing, ICIP 2000, volume 3, pages 667–670, Vancouver, September 10-13, 2000.Google Scholar
[179] P., Moulin and J. A., Sullivan. Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 49(3):563–593, March 2003.Google Scholar
[180] P., Moulin and Y., Wang. New results on steganographic capacity. In Proceedings of the Conference on Information Sciences and Systems, CISS, Princeton, NJ, March 17-19, 2004.Google Scholar
[181] A., Munoz and J. M., Moguerza. Estimation of high-density regions using one-class neighbor machines. IEEE Transactions on Pattern Analysis and Machine Intelligence, 26(3):476–480, 2006.Google Scholar
[182] B., Murphy and C., Vogel. Statistically constrained shallow text marking: Techniques, evaluation paradigm, and results. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages Z 1-Z 9, San Jose, CA, January 29-February 1, 2007.Google Scholar
[183] H., Noda, M., Niimi, and E., Kawaguchi. Application of QIM with dead zone for histogram preserving JPEG steganography. In Proceedings IEEE, International Conference on Image Processing, ICIP 2005, volume II, pages 1082–1085, Genova, September 11-14, 2005.Google Scholar
[184] H.-O., Peitgen, H., Jürgens, and D., Saupe. Chaos and Fractals: New Frontiers of Science. Berlin: Springer-Verlag, 1992.Google Scholar
[185] W., Pennebaker and J., Mitchell. JPEG: Still Image Data Compression Standard. Van Nostrand Reinhold, New York, 1993.Google Scholar
[186] F., Perez-Gonzalez and S., Voloshynovskiy, editors. Fundamentals of Digital Image Watermarking. New York: Wiley Blackwell, 2005.Google Scholar
[187] F. A. P., Petitcolas. MP3Stego software. 1998.Google Scholar
[188] K., Petrowski, M., Kharrazi, H. T., Sencar, and N. D., Memon. Psteg: Steganographic embedding through patching. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, pages 537–540, Philadelphia, PA, March 18-23, 2005.Google Scholar
[189] T., Pevny and J., Fridrich. Multiclass blind steganalysis for JPEG images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages O 1-O 13, San Jose, CA, January 16-19, 2006.Google Scholar
[190] T., Pevny and J., Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1-3 14, San Jose, CA, January 29-February 1, 2007.Google Scholar
[191] T., Pevny and J., Fridrich. Benchmarking for steganography. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 251–267, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York.Google Scholar
[192] T., Pevny and J., Fridrich. Detection of double-compression for applications in steganography. IEEE Transactions on Information Forensics and Security, 3(2):247–258, 2008.Google Scholar
[193] T., Pevny and J., Fridrich. Multiclass detector of current steganographic methods for JPEG format. IEEE Transactions on Information Forensics and Security, 3(4):635–650, December 2008.Google Scholar
[194] T., Pevny and J., Fridrich. Novelty detection in blind steganalysis. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 167–176, Oxford, September 22-23, 2008.Google Scholar
[195] T., Pevny, J., Fridrich, and A. D., Ker. From blind to quantitative steganalysis. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 0C 1-0C 14, San Jose, CA, January 18-21, 2009.Google Scholar
[196] A. C., Popescu. Statistical Tools for Digital Image Forensics. PhD thesis, Department of Computer Science, Dartmouth College, 2005.Google Scholar
[197] S., Pradhan, J., Chou, and K., Ramchandran. Duality between source coding and channel coding and its extension to the side information case. IEEE Transactions on Information Theory, 49(5):1181–1203, 2003.Google Scholar
[198] N., Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, pages 323–335, Washington, DC, August 13-17, 2001.Google Scholar
[199] N., Provos and P., Honeyman. Detecting steganographic content on the internet. Technical report, 01-11, CITI, August 2001.Google Scholar
[200] R., Radhakrishnan, M., Kharrazi, and N. D., Memon. Data masking a new approach for data hiding?Journal of VLSI Signal Processing Systems, 41(3):293–303, November 2005.Google Scholar
[201] J. A., Reeds. Solved: The ciphers in Book III of Trithemius's Steganographia. Cryptologia, 22:291–319, October 1998.Google Scholar
[202] X.-M., Ru, H.-J., Zhang, and X., Huang. Steganalysis of audio: Attacking the Steghide. In Proceedings of the International Conference on Machine Learning and Cybernetics, volume 7, pages 3937–3942, Guangzhou, August 18-21, 2005.Google Scholar
[203] J., Rutenberg. A nation challenged: Videotape. New York Times, February 1, 2002.Google Scholar
[204] P., Sallee. Model-based steganography. In T., Kalker, I. J., Cox, and Y. Man, Ro, editors, Digital Watermarking, 2nd International Workshop, volume 2939 of Lecture Notes in Computer Science, pages 154–167, Seoul, October 20-22, 2003. Springer-Verlag, New York.Google Scholar
[205] P., Sallee. Model-based methods for steganography and steganalysis. International Journal of Image Graphics, 5(1):167–190, 2005.Google Scholar
[206] K., Sayood. Introduction to Data Compression (3rd edition). New York: Morgan Kaufmann, 2000.Google Scholar
[207] B., Schneier. Applied Cryptography. New York: John Wiley & Sons, 1996.Google Scholar
[208] D., Schönfeld and A., Winkler. Embedding with syndrome coding based on BCH codes. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 214–223, Geneva, September 26-27, 2006.Google Scholar
[209] T., Sharp. An implementation of key-based digital signal steganography. In I. S., Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 13–26, Pittsburgh, PA, April 25-27, 2001. Springer-Verlag, New York.Google Scholar
[210] Y. Q., Shi, C., Chen, and W., Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249–264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.Google Scholar
[211] F. Y., Shih. Digital Watermarking and Steganography: Fundamentals and Techniques. Boca Raton, FL: CRC Press, 2007.Google Scholar
[212] B., Shimanovsky, J., Feng, and M., Potkonjak. Hiding data in DNA. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 373–386, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, Berlin.Google Scholar
[213] M., Sidorov. Hidden Markov models and steganalysis. In J., Dittmann and J., Fridrich, editors, Proceedings of the 6th ACM Multimedia & Security Workshop, pages 63–67, Magdeburg, September 20-21, 2004.Google Scholar
[214] G. J., Simmons. The prisoner's problem and the subliminal channel. In D., Chaum, editor, Advances in Cryptology, CRYPTO '83, pages 51–67, Santa Barbara, CA, August 22-24, 1983. New York: Plenum Press.Google Scholar
[215] A. J., Smola and B., Schölkopf. A tutorial on support vector regression. NeuroCOLT2 Technical Report NC2-TR-1998-030, 1998.Google Scholar
[216] T., Sohn, J., Seo, and J., Moon. A study on the covert channel detection of TCP/IP header using support vector machine. In S., Qing, D., Gollmann, and J., Zhou, editors, Proceedings of the 5th International Conference on Information and Communications Security, volume 2836 of Lecture Notes in Computer Science, pages 313–324, Huhe-haote, October 10-13, 2003. Springer-Verlag, Berlin.Google Scholar
[217] K., Solanki, A., Sarkar, and B. S., Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 16–31, Saint Malo, June 11-13, 2007. Springer-Verlag, New York.Google Scholar
[218] K., Solanki, K., Sullivan, U., Madhow, B. S., Manjunath, and S., Chandrasekaran. Provably secure steganography: Achieving zero K-L divergence using statistical restoration. In Proceedings IEEE, International Conference on Image Processing, ICIP 2006, pages 125–128, Atlanta, GA, October 8-11, 2006.Google Scholar
[219] A., Somekh-Baruch and N., Merhav. On the capacity game of public watermarking systems. IEEE Transactions on Information Theory, 50(3):511–524, 2004.Google Scholar
[220] D., Soukal, J., Fridrich, and M., Goljan. Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 595–606, San Jose, CA, January 16-20, 2005.Google Scholar
[221] M. R., Spiegel. Schaum's Outline of Theory and Problems of Statistics. McGraw-Hill, New York, 3rd edition, 1961.Google Scholar
[222] M., Stamm and K. J., Ray Liu. Blind forensics of contrast enhancement in digital images. In Proceedings IEEE, International Conference on Image Processing, ICIP 2008, pages 3112–3115, San Diego, CA, October 12-15, 2008.Google Scholar
[223] I., Steinwart. On the influence of the kernel on the consistency of support vector machines. Journal of Machine Learning Research, 2:67–93, 2001. Available electronically at http://www.jmlr.org/papers/volume2/steinwart01a/steinwart01a.ps.gz.Google Scholar
[224] G. W. W., Stevens. Microphotography – Photography and Photofabrication at Extreme Resolutions. London, Chapman & Hall, 1968.Google Scholar
[225] K., Sullivan, U., Madhow, B. S., Manjunath, and S., Chandrasekaran. Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensics and Security, 1(2):275–287, June 2006.Google Scholar
[226] A., Tacticius. How to Survive Under Siege/Aineas the Tactician. Oxford: Clarendon Ancient History Series, 1990.Google Scholar
[227] C. M., Taskiran, U., Topkara, M., Topkara, and E. J., Delp. Attacks on lexical natural language steganography systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 97–105, San Jose, CA, January 16-19, 2006.Google Scholar
[228] D. S., Taubman and M. W., Marcellin. JPEG 2000 Image Compression Fundamentals, Standards, and Practices. Kluwer Academic Publishers, Boston, MA, 2002.Google Scholar
[229] J., Taylor and A., Verbyla. Joint modeling of location and scale parameters of the t-distribution. Statistical Modeling, 4:91–112, 2004.Google Scholar
[230] J., Tobin and R., Dobard. Hidden in Plain View: The Secret Story of Quilts and the Underground Railroad. Doubleday, New York, 1999.Google Scholar
[231] B. S., Tsybakov. Defect and error correction. Problemy Peredachi Informatsii, 11:21–30, July-September 1975. Translated from Russian.Google Scholar
[232] R., Tzschoppe, R., Bäuml, J. B., Huber, and A., Kaup. Steganographic system based on higher-order statistics. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 156–166, Santa Clara, CA, January 21-24, 2003.Google Scholar
[233] M., van Dijk and F., Willems. Embedding information in grayscale images. In Proceedings of the 22nd Symposium on Information and Communication Theory, pages 147–154, Enschede, May 15-16, 2001.Google Scholar
[234] L., von Ahn and N., Hopper. Public-key steganography. In C., Cachin and J., Camenisch, editors, Advances in Cryptology – EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, volume 3027 of Lecture Notes in Computer Science, pages 323–341, Interlaken, May 2-6, 2004. Springer-Verlag, Heidleberg.Google Scholar
[235] Y., Wang and P., Moulin. Steganalysis of block-structured stegotext. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 477–488, San Jose, CA, January 19-22, 2004.Google Scholar
[236] Y., Wang and P., Moulin. Statistical modelling and steganalysis of DFT-based image steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 2 1-2 11, San Jose, CA, January 16-19, 2006.Google Scholar
[237] Y., Wang and P., Moulin. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security, 55(6):2706–2722, June 2008.Google Scholar
[238] P., Wayner. Mimic functions. CRYPTOLOGIA, 16(3):193–214, July 1992.Google Scholar
[239] P., Wayner. Disappearing Cryptography. Morgan Kaufmann, San Francisco, CA, 2nd edition, 2002.Google Scholar
[240] J., Werner. Optimization – Theory and Applications. Braunschweig: Vieweg, 1984.Google Scholar
[241] A., Westfeld. High capacity despite better steganalysis (F5 – a steganographic algorithm). In I. S., Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 289–302, Pittsburgh, PA, April 25-27, 2001. Springer-Verlag, New York.Google Scholar
[242] A., Westfeld. Detecting low embedding rates. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 324–339, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, Berlin.Google Scholar
[243] A., Westfeld. Space filling curves in steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 28–37, San Jose, CA, January 16-20, 2005.Google Scholar
[244] A., Westfeld. Generic adoption of spatial steganalysis to transformed domain. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 161–177, Santa Barbara, CA, June 19-21, 2007. Springer-Verlag, New York.Google Scholar
[245] A., Westfeld and R., Böhme. Exploiting preserved statistics for steganalysis. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 82–96, Toronto, May 23-25, 2004. Springer-Verlag, Berlin.Google Scholar
[246] A., Westfeld and A., Pfitzmann. Attacks on steganographic systems. In A., Pfitzmann, editor, Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 61–75, Dresden, September 29-October 1, 1999. Springer-Verlag, New York.Google Scholar
[247] E. H., Wilkins. A History of Italian Literature. Oxford University Press, London, 1954.Google Scholar
[248] F. J. M., Williams and N. J., Sloane. The Theory of Error-Correcting Codes. North-Holland, Amsterdam, 1977.Google Scholar
[249] P. W., Wong, H., Chen, and Z., Tang. On steganalysis of plus-minus one embedding in continuous-tone images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 643–652, San Jose, CA, January 16-20, 2005.Google Scholar
[250] F. B., Wrixon. Codes, Ciphers and Other Cryptic and Clandestine Communication. New York: Black Dog & Leventhal Publishers, 1998.Google Scholar
[251] Z., Wu and W., Yang. G.711-based adaptive speech information hiding approach. In De-Shuang Huang, K.Li, and G. W., Irwin, editors, Proceedings of the International Conference on Intelligent Computing, volume 4113 of Lecture Notes in Computer Science, pages 1139–1144, Kunming, August 16-19, 2006. Springer-Verlag, Berlin.Google Scholar
[252] G., Xuan, Y. Q., Shi, J., Gao, D., Zou, C., Yang, Z. Z. P., Chai, C., Chen, and W., Chen. Ste- ganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 262–277, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.Google Scholar
[253] C., Yang, F., Liu, X., Luo, and B., Liu. Steganalysis frameworks of embedding in multiple least-significant bits. IEEE Transactions on Information Forensics and Security, 3:662–672, 2008.Google Scholar
[254] R., Zamir, S., Shamai, and U., Erez. Nested linear/lattice codes for structured multiterminal binning. IEEE Transactions on Information Theory, 48(6):1250–1276, 2002.Google Scholar
[255] T., Zhang and X., Ping. A fast and effective steganalytic technique against Jsteg-like algorithms. In Proceedings of the ACM Symposium on Applied Computing, pages 307–311, Melbourne, FL, March 9-12, 2003.Google Scholar
[256] T., Zhang and X., Ping. A new approach to reliable detection of LSB steganography in natural images. Signal Processing, 83(10):2085–2094, October 2003.Google Scholar
[257] W., Zhang, X., Zhang, and S., Wang. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 60–71, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York.Google Scholar
[258] X., Zhang, W., Zhang, and S., Wang. Efficient double-layered steganographic embedding. Electronics Letters, 43:482–483, April 2007.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Jessica Fridrich, State University of New York, Binghamton
  • Book: Steganography in Digital Media
  • Online publication: 05 April 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139192903.021
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Jessica Fridrich, State University of New York, Binghamton
  • Book: Steganography in Digital Media
  • Online publication: 05 April 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139192903.021
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Jessica Fridrich, State University of New York, Binghamton
  • Book: Steganography in Digital Media
  • Online publication: 05 April 2014
  • Chapter DOI: https://doi.org/10.1017/CBO9781139192903.021
Available formats
×