Open Access

Steganalysis of StegoStorage system


Cite

[1] KOŠDY, M.: Steganographic File System Based on JPEG Files: Master’s Thesis. FEI STU, Bratislava, 2013.Search in Google Scholar

[2] BÖHME, R.: Advanced Statistical Steganalysis. Springer-Verlag, Berlin, 2010.10.1007/978-3-642-14313-7Search in Google Scholar

[3] ZHANG, W.-LI, S.: Security measurements of steganographic systems, in: Proc. of the 2nd Internat. Conf. Applied Cryptography and Network Security-ACNS ’04 (M. Jakobsson et al., eds.), Yellow Mountain, China, 2004, Lecture Notes in Comput. Sci., Vol. 3089, Springer-Verlag, Berlin, 2004, pp. 194-204.Search in Google Scholar

[4] KHARRAZI,M.-SENCAR, H.-MEMON, N.: Image steganography: concepts and practice, http://www2.ims.nus.edu.sg/preprints/2004-25.pdf, 2004.Search in Google Scholar

[5] CHANDRAMOULI, R.-KHARRAZI,M.-MEMON, N.: Image steganography: concepts and practice, in: Proc. of the 2nd Internat. Workshop-IWDW ’03, Seoul, Korea, 2003 (T. Kalker et al., eds), Lecture Notes in Comput. Sci., Vol. 2939, Springer-Verlag, Berlin, 2004, pp. 35-49.Search in Google Scholar

[6] GROŠEK, O.-VOJVODA, M.-ZAJAC, P.: Classical Ciphers. Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, 2007.Search in Google Scholar

[7] MORAVČÍK, T.: Steganografia v obrazovom sbore JPG: master’s thesis. FEI STU, Bratislava, 2013.Search in Google Scholar

[8] STANLEY, C.: Pairs of Values and the Chi-Ssquare Attack. Department of Mathematics, Iowa State University, 2010.Search in Google Scholar

[9] FRIDRICH, J.-GOLJAN, M.-HOGEA, D.: Steganalysis of JPEG images: breaking the F5 algorithm, in: 5th Internat. Workshop-IH ’02 (F.A.P. Petitcolas, ed.), Noordwijkerhout, The Netherlands, 2002, Lecture Notes in Comput. Sci., Vol. 2578, Springer-Verlag, Berlin, 2003, pp. 310-323.Search in Google Scholar

[10] FRIDRICH, J.-KODOVSKÝ, J.: Calibration Revisited. ACM, New York, NY, USA, 2009.10.1145/1597817.1597830Search in Google Scholar

[11] ZHANG,W.-ZHANG, X.-WANG, S.: Maximizing steganographic embedding efficiency by combining Hamming codes and Wet paper codes, in: Proc. of the 10th Internat. Workshop-IH ’08 (K. Solanki et al., eds.), Lecture Notes in Comput. Sci., Vol. 5284, Springer-Verlag, Berlin, 2008, pp. 60-71.Search in Google Scholar

eISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics