@article{DM_2005_17_3_a8,
author = {M. A. Sidorov},
title = {The use of a hidden {Markov} field for the steganalysis of images},
journal = {Diskretnaya Matematika},
pages = {89--104},
year = {2005},
volume = {17},
number = {3},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/DM_2005_17_3_a8/}
}
M. A. Sidorov. The use of a hidden Markov field for the steganalysis of images. Diskretnaya Matematika, Tome 17 (2005) no. 3, pp. 89-104. http://geodesic.mathdoc.fr/item/DM_2005_17_3_a8/
[1] Winkler G., Image analysis, random fields and dynamic Monte Carlo methods, Springer, Berlin, 1995 | MR
[2] Elliott R. J., Aggoun L., Moore J. B., Hidden Markov models: estimation and control, Springer, Berlin, 1995 | MR
[3] Rabiner L. R., “Skrytye markovskie modeli i ikh primenenie v izbrannykh prilozheniyakh pri raspoznavanii rechi”, TIIER, 77:2 (1989), 86–120
[4] Sidorov M. A., “Skrytye markovskie modeli i stegoanaliz”, Materialy VI Mezhdunarodnoi nauchno-prakticheskoi konferentsii «Informatsionnaya bezopasnost», TRTU, Taganrog, 2004, 464
[5] Sidorov M., “Hidden Markov models and steganalysis”, Proc. ACM Workshop on Multimedia and Security (2004), ACM Press, New York, 2004, 63–67
[6] Johnson N. F., Duric Z., Jajodia S., Information hiding: steganography and watermarking—attacks and countermeasures, Kluwer, New York, 2000
[7] Petitcolas F. A. P., Anderson R. J., Kuhn M. G., “Information hiding—a survey”, Proc. IEEE, 87 (1999), 1062–1078 | DOI
[8] Fridrich J., Goljan M, Du R., “Reliable detection of LSB steganography in grayscale and color images”, Proc. ACM Workshop on Multimedia and Security (2001), ACM Press, New York, 2001, 27–30
[9] Bulinskii A. V., Shiryaev A. N., Teoriya sluchainykh protsessov, Fizmatlit, Moskva, 2003
[10] Khalmosh P., Teoriya mery, Faktorial, Moskva, 2003
[11] Baum L.E., Petrie T., Soules G., Weiss N., “A maximization technique occuring in the statistical analysis of probabilistic functions of Markov chains”, Ann. Math. Stat., 41 (1970), 164–171 | DOI | MR | Zbl