À propos de cet article

Citez

[1] KOŠDY, M.: Steganographic File System based on JPEG Files: Master’s Thesis, FEI STU, Bratislava, 2013.Search in Google Scholar

[2] JÓKAY, M.—MORAVČÍK, T.: Image-based JPEG steganography, Tatra Mt. Math. Publ. (45) (2010), 65–74.10.2478/v10127-010-0006-9Search in Google Scholar

[3] BÖHME, R.: Advanced Statistical Steganalysis, Springer-Verlag, Berlin, 2010.10.1007/978-3-642-14313-7Search in Google Scholar

[4] ZHANG, W.—LI, S.: Security measurements of steganographic systems in: Applied Cryptography and Network Security (ACNS) (M. Jakobsson, M. Yung, J. Zhou, Eds.), Lecture Notes in Comput. Sci. Vol. 3089, Springer-Verlag Berlin, 2004, pp. 194–204.Search in Google Scholar

[5] CHANDRAMOULI, R.—KHARRAZI, M.—MEMON, N.: Image steganography: concepts and practice, in: International Workshop on Digital Watermarking, 2003, pp. 35–49.10.1007/978-3-540-24624-4_3Search in Google Scholar

[6] JUIN-DE HUANG: The JPEG Standard, in: National Taiwan University, Taipei, Taiwan, ROC, http://slideplayer.com/slide/8779307/Search in Google Scholar

[7] FRIDRICH, J.—GOLJAN, M.—HOGEA, D.: Steganalysis of JPEG images: breaking the F5 algorithm, in: Information Hiding: 5th International Workshop, IH ’02, Noordwijkerhout, The Netherlands, October 7–9, 2002, Springer-Verlag, Berlin, Heidelberg, 2003, pp. 310–323. (Revised papers)10.1007/3-540-36415-3_20Search in Google Scholar

[8] FRIDRICH, J.—KODOVSKÝ, J.: Calibration revisited in: ACM New York, NY, USA, 2009, pp. 63–74.10.1145/1597817.1597830Search in Google Scholar

[9] ZHANG, W.—ZHANG, X.—WANG, S.: Maximizing steganographic embedding efficiency by combining Hamming codes and Wet paper codes, in: Information Hiding, 10th International Workshop, 2008, pp. 60–71.10.1007/978-3-540-88961-8_5Search in Google Scholar

[10] FRIDRICH, J.: Steganography in Digital Media: Principles, Algorithms and Applications, Cambridge University Press, U.K., 2010.10.1017/CBO9781139192903Search in Google Scholar

[11] FRIDRICH, J.—GOLJAN, M.: Practical steganalysis of digital images-state of the art, in: Proceedings of SPIE, 2002, pp. 1–13.10.1117/12.465263Search in Google Scholar

[12] FRIDRICH, J.—GOLJAN, M.—DU, R.: Reliable of LSB steganography in color and grayscale images. in: Proceeding MM&Sec ’01, Workshop on Multimedia and Security: New Challenges 2001, pp. 27–30, http://parsys.informatik.uni-oldenburg.de/~stego/workshopStatistik/g1/RS_Steganalysis.pdf10.1145/1232454.1232466Search in Google Scholar

[13] GULÁŠOVÁ, M.—JÓKAY, M.: Steganalysis of StegoStorage system. Tatra Mt. Math. Publ. 64 (2014), 205–2015.Search in Google Scholar

eISSN:
1210-3195
Langue:
Anglais
Périodicité:
3 fois par an
Sujets de la revue:
Mathematics, General Mathematics