1. bookVolume 17 (2016): Edizione 2 (June 2016)
Dettagli della rivista
License
Formato
Rivista
eISSN
1407-6179
Prima pubblicazione
20 Mar 2000
Frequenza di pubblicazione
4 volte all'anno
Lingue
Inglese
Accesso libero

General Principles of Integrity Checking of Digital Images and Application for Steganalysis

Pubblicato online: 06 May 2016
Volume & Edizione: Volume 17 (2016) - Edizione 2 (June 2016)
Pagine: 128 - 137
Dettagli della rivista
License
Formato
Rivista
eISSN
1407-6179
Prima pubblicazione
20 Mar 2000
Frequenza di pubblicazione
4 volte all'anno
Lingue
Inglese

1. Rey, C. and Dugelay, J.-L. (2002) A survey of watermarking algorithms for image authentication. EURASIP Journal on Advances in Signal Processing, 6, 613-621. DOI: 10.1155/S1110865702204047.10.1155/S1110865702204047Search in Google Scholar

2. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Del Tongo, L. and Serra, G. (2013) Copy-move forgery detection and localization by means of robust clustering with J-Linkage. Signal Processing: Image Communication, 28(6), 659-669. DOI: 10.1016/j.image.2013.03.006.10.1016/j.image.2013.03.006Search in Google Scholar

3. Farid, H. (2009) Image forgery detection. IEEE Signal Processing Magazine, 26(2), 16-25. DOI: 10.1109/MSP.2008.931079.10.1109/MSP.2008.931079Search in Google Scholar

4. Gul, G. and Kurugollu, F. (2010) SVD-based universal spatial domain image steganalysis. IEEE Transactions on Information Forensics and Security, 5(2), 349-353. DOI: 10.1109/TIFS.2010.2041826.10.1109/TIFS.2010.2041826Search in Google Scholar

5. Bobok, I.I. and Kobozeva, A.A. (2011) Steganalysis as a special case of the analysis of the information system. Suchasna Spetsialna Tekhnika, 1, 21-34.Search in Google Scholar

6. Natarajan, V. and Anitha, R. (2012) Blind image steganalysis based on contourlet transform. International Journal on Cryptography & Information Security, 2(3), 77-87. DOI: 10.5121/ijcis.2012.2307.10.5121/ijcis.2012.2307Search in Google Scholar

7. Kobozeva, A.A. and Khoroshko, V.A. (2009) Analysis of Information Safety. Kyiv: DUT.Search in Google Scholar

8. Kobozeva, A.A. (2014) A basis of common approach to the development of universal steganalysis methods for digital images. Odes’kyi Politechnichnyi Universytet. Pratsi, 2, 136-146. DOI: 10.15276/opu.2.44.2014.25.10.15276/opu.2.44.2014.25Search in Google Scholar

9. Koch, E. and Zhao, J. (1995) Towards Robust and Hidden Image Copyright Labeling. In: Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, June 1995. Neos Marmaras, Greece: IEEE CAS and ASSP Societies, pp. 123-132.Search in Google Scholar

10. Kutter, M., Jordan, F. and Bossen, F. (1998) Digital signature of color images using amplitude modulation. Journal of Electronic Imaging, 7(2), 326-332.Search in Google Scholar

11. Xia, Z., Yang, L., Sun, X., Liang, W., Sun, D. and Ruan, Z. (2011) A Learning-Based Steganalytic Method against LSB Matching Steganography. Radioengineering, 20(1), 102-109.Search in Google Scholar

12. Li, B., He, J., Huang, J. and Shi, Y.Q. (2011) A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142-172.Search in Google Scholar

13. Fridrich, J. (2004) Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes. In: 6th International Workshop, IH 2004, Toronto, Canada, May 2004. Berlin: Springer, pp. 67-81.10.1007/978-3-540-30114-1_6Search in Google Scholar

Articoli consigliati da Trend MD

Pianifica la tua conferenza remota con Sciendo