The use of a hidden Markov field for the steganalysis of images
Diskretnaya Matematika, Tome 17 (2005) no. 3, pp. 89-104.

Voir la notice de l'article provenant de la source Math-Net.Ru

We consider a method of steganalysis based on the use of a hidden Markov field model in the case of the LSB-modification of the initial discrete Markov field. We describe iterative filtering algorithms which yield estimates of some parameters of a hidden Markov field with prescribed accuracy.
@article{DM_2005_17_3_a8,
     author = {M. A. Sidorov},
     title = {The use of a hidden {Markov} field for the steganalysis of images},
     journal = {Diskretnaya Matematika},
     pages = {89--104},
     publisher = {mathdoc},
     volume = {17},
     number = {3},
     year = {2005},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/DM_2005_17_3_a8/}
}
TY  - JOUR
AU  - M. A. Sidorov
TI  - The use of a hidden Markov field for the steganalysis of images
JO  - Diskretnaya Matematika
PY  - 2005
SP  - 89
EP  - 104
VL  - 17
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/DM_2005_17_3_a8/
LA  - ru
ID  - DM_2005_17_3_a8
ER  - 
%0 Journal Article
%A M. A. Sidorov
%T The use of a hidden Markov field for the steganalysis of images
%J Diskretnaya Matematika
%D 2005
%P 89-104
%V 17
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/DM_2005_17_3_a8/
%G ru
%F DM_2005_17_3_a8
M. A. Sidorov. The use of a hidden Markov field for the steganalysis of images. Diskretnaya Matematika, Tome 17 (2005) no. 3, pp. 89-104. http://geodesic.mathdoc.fr/item/DM_2005_17_3_a8/

[1] Winkler G., Image analysis, random fields and dynamic Monte Carlo methods, Springer, Berlin, 1995 | MR

[2] Elliott R. J., Aggoun L., Moore J. B., Hidden Markov models: estimation and control, Springer, Berlin, 1995 | MR

[3] Rabiner L. R., “Skrytye markovskie modeli i ikh primenenie v izbrannykh prilozheniyakh pri raspoznavanii rechi”, TIIER, 77:2 (1989), 86–120

[4] Sidorov M. A., “Skrytye markovskie modeli i stegoanaliz”, Materialy VI Mezhdunarodnoi nauchno-prakticheskoi konferentsii «Informatsionnaya bezopasnost», TRTU, Taganrog, 2004, 464

[5] Sidorov M., “Hidden Markov models and steganalysis”, Proc. ACM Workshop on Multimedia and Security (2004), ACM Press, New York, 2004, 63–67

[6] Johnson N. F., Duric Z., Jajodia S., Information hiding: steganography and watermarking—attacks and countermeasures, Kluwer, New York, 2000

[7] Petitcolas F. A. P., Anderson R. J., Kuhn M. G., “Information hiding—a survey”, Proc. IEEE, 87 (1999), 1062–1078 | DOI

[8] Fridrich J., Goljan M, Du R., “Reliable detection of LSB steganography in grayscale and color images”, Proc. ACM Workshop on Multimedia and Security (2001), ACM Press, New York, 2001, 27–30

[9] Bulinskii A. V., Shiryaev A. N., Teoriya sluchainykh protsessov, Fizmatlit, Moskva, 2003

[10] Khalmosh P., Teoriya mery, Faktorial, Moskva, 2003

[11] Baum L.E., Petrie T., Soules G., Weiss N., “A maximization technique occuring in the statistical analysis of probabilistic functions of Markov chains”, Ann. Math. Stat., 41 (1970), 164–171 | DOI | MR | Zbl