Image Complexity and Feature Mining for Steganalysis of Least Significant Bit Matching Steganography


Related Project

CACTUS: Computational Analysis of CT against US


Information Sciences, Vol. 178, #1, pp. 21-36, Elsevier Science Inc. New York, NY, USA, January 2008


Cited by

Year 2011 : 11 citations

 Nguyen Thi Thanh Thuy, Nguyen Thi Ngoc Vinh and Ngo Anh Vien
Nomogram Visualization for Ranking Support Vector Machine, ADVANCES IN NEURAL NETWORKS – ISNN 2011
Lecture Notes in Computer Science, 2011, Volume 6676/2011, 94-102, DOI: 10.1007/978-3-642-21090-7_11

 Mansour Sheikhan, Mansoureh Pezhmanpour and M. Shahram Moin,
Improved contourlet-based steganalysis using binary particle swarm optimization and radial basis neural networks, NEURAL COMPUTING & APPLICATIONS, 2011, DOI: 10.1007/s00521-011-0729-9

 Zhihua XIA, Lincong YANG, Xingming SUN, Wei LIANG, Decai SUN, Zhiqiang RUAN ,
A Learning-Based Steganalytic Method against LSB Matching Steganography, RadioEngineering, Vol 20, nr. 1, pp 102-109, April, 2011

 Liu, Q.a , Sung, A.H.b , Chen, Z.c , Huang, X.d
A JPEG-based statistically invisible steganography
(2011) ACM International Conference Proceeding Series, pp. 78-81.

 Liu, Q.
Steganalysis of DCT-embedding based adaptive steganography and YASS
(2011) MM and Sec'11 - Proceedings of the 2011 ACM SIGMM Multimedia and Security Workshop, pp. 77-85. Cited 1 time.

 Liu, Q.a , Sung, A.H.b , Qiao, M.c
Derivative-based audio steganalysis
(2011) ACM Transactions on Multimedia Computing, Communications and Applications, 7 (3), art. no. 18, . Cited 3 times.

 Jiexin Zhang, "Research on Uncertainty of audio and Video Information
Hiding Based on Semantic and Statistical Moment", Journal of Software,
Vol 6, No 6 (2011), 1154-1162, Jun 2011, doi:10.4304/jsw.6.6.1154-1162

 Liu, Q.a , Sung, A.H.b , Qiao, M.c
Neighboring joint density-based JPEG steganalysis
(2011) ACM Transactions on Intelligent Systems and Technology, 2 (2), art. no. 16, .

 Sung, A.H.b c , Qiao, M.b c
A method to detect JPEG-based double compression
(2011) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 6676 LNCS (PART 2), pp. 466-476.

 Zheng, E.a , Ping, X.b , Zhang, T.b
Local linear transform and new features of histogram characteristic functions for steganalysis of least significant bit matching steganography
(2011) KSII Transactions on Internet and Information Systems, 5 (4), pp. 840-855.

 Xia, Z.a , Yang, L.b , Sun, X.a , Liang, W.a , Sun, D.a , Ruan, Z.a
A learning-based steganalytic method against LSB matching steganography
(2011) Radioengineering, 20 (1), pp. 102-109. Cited 1 time.

Year 2010 : 7 citations

 Tongue shape classification by geometric features, Huang, B., Wu, J., Zhang, D., Li, N. 2010 Information Sciences 180 (2), pp. 312-324

 Near-optimal solution to pair-wise LSB matching via an immune programming, H Xu, J Wang, HJ Kim - Information Sciences, 2010 - Elsevier

 Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistic, S Geetha, N Ishwarya, N Kamaraj - Information Sciences, 2010

 Estimating Watermarking Capacity in Gray Scale Images Based on Image Complexity, Y Farzin, J Mansour - EURASIP Journal on Advances in Signal Processing, 2010

 Steganalysis of LSB matching based on statistical modeling of pixel difference distributions,
T Zhang, W Li, Y Zhang, E Zheng, Information Sciences, 2010 - Elsevier

 Estimating Watermarking Capacity in Gray Scale Images Based on Image Complexity
from hindawi.comY Farzin… - EURASIP Journal on Advances in Signa Processing, 2010

 Histogram estimation-scheme-based steganalysis defeating the steganography using pixel-value differencing and modulus function
JC Joo, KS Kim, HK Lee, Optical Engineering, 2010

Year 2009 : 7 citations

 Tongue shape classification by geometric features ,Huang, B., Wu, J., Zhang, D., Li, N, Information Sciences 180 (2), pp. 312-324, 2010

 Adaptive embedding techniques for VQ-compressed images, CC Lin, SC Chen, NL Hsueh - Information Sciences, 2009 - Elsevier

 Image restoration-based steganalysis directed to LSB matching steganography, Xu, X., Ping, X., Zhang, T., Wang, G. 2009

 Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao, Journal of Computer-Aided Design and Computer Graphics 21, (2), pp. 262-267+274,2009

 Reliable Steganalysis Using a Minimum Set of Samples and Features M Yoan, B Patrick, L Amaury, J Christian, S ? - EURASIP Journal on Information Security, 2009

 A New Steganography Based on χ2 Technic, Zainab Famili , Karim Faez, and Abbas Fadavi, Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Lecture Notes in Computer Science, Volume 5856/2009, 1062-1069, 2009, DOI10.1007/978-3-642-10268-4

 Steganalysis of LSB Matching Based on Wavelet Estimation and Histogram Features,
XU Man-kun, LI Tian-yun, PING Xi-jian, Computer Engineering, Vol.35 No.19, 2009

Year 2008 : 5 citations

 Detect Information-Hiding Type and Length in JPEG Images by Using Neuro-fuzzy Inference Systems -
Q Liu, AH Sung - Image and Signal Processing, 2008. CISP'08. Congress on, 2008 -

V Nabiyev, M Ulutaş, G Ulutaş -

 Steganalysis of LSB matching based on histogram features in grayscale image
Mankun, X., Tianyun, L., Xijian, P. 2008 International Conference on Communication Technology Proceedings, ICCT, art. no. 4716192, pp. 669-672 0

 Image classification method of distinguishing LSB replacement from matching steganography
Luo, X.-Y., Liu, F.-L., Wang, D.-S. 2008 Tongxin Xuebao/Journal on Communication 29 (SUPPL.), pp. 122-128 0

The upper and lower bounds of the information-hiding capacity of digital images
Zhang, F., Pan, Z., Cao, K., Zheng, F., Wu, F. 2008 Information Sciences 178 (14), pp. 2950-2959