@article{UZKU_2009_151_2_a15,
author = {E. V. Razinkov and R. Kh. Latypov},
title = {Security of {Steganographic} {Systems}},
journal = {U\v{c}\"enye zapiski Kazanskogo universiteta. Seri\^a Fiziko-matemati\v{c}eskie nauki},
pages = {126--132},
year = {2009},
volume = {151},
number = {2},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/UZKU_2009_151_2_a15/}
}
TY - JOUR AU - E. V. Razinkov AU - R. Kh. Latypov TI - Security of Steganographic Systems JO - Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki PY - 2009 SP - 126 EP - 132 VL - 151 IS - 2 UR - http://geodesic.mathdoc.fr/item/UZKU_2009_151_2_a15/ LA - ru ID - UZKU_2009_151_2_a15 ER -
E. V. Razinkov; R. Kh. Latypov. Security of Steganographic Systems. Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki, Kazanskii Gosudarstvennyi Universitet. Uchenye Zapiski. Seriya Fiziko-Matematichaskie Nauki, Tome 151 (2009) no. 2, pp. 126-132. http://geodesic.mathdoc.fr/item/UZKU_2009_151_2_a15/
[1] Simmons G. J., “The Prisoners' Problem and the Subliminal Channel”, Proc. of Crypto' 83, ed. D. Chaum, Plenum Press, N.Y., 1984, 51–67 | MR
[2] Cox I. J., Miller M. L., Bloom J. A., Fridrich J., Ton K., Digital Watermarking and Steganography, Elsevier, 2008, 593 pp.
[3] Wayner P., Disappearing Cryptography. Information Hiding: Steganography and Watermarking, Elsevier, 2002, 413 pp.
[4] Cachin C., “An Information-Theoretic Model for Steganography”, Proc. of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science, 1525, ed. D. Aucsmith, Springer-Verlag, N.Y., 1998, 306–318 | DOI
[5] Fridrich J., Goljan M., Du R., “Steganalysis Based on JPEG Compatibility”, Special session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, 2001, 275–280
[6] Lee K., Westfeld A., Lee S., “Generalised Category Attack – Improving Histogram-Based Attack on JPEG LSB Embedding”, Information Hiding, 9th Int. Workshop, Lecture Notes in Computer Science, 4567, Springer-Verlag, 2007, 378–391 | DOI
[7] Westfield A., “F5 – A Steganographic Algorithm: High Capacity Despite Better Steganalysis”, Information Hiding, 4th Intern. Workshop, Lecture Notes in Computer Science, 2137, Springer-Verlag, Berlin–Heidelberg–New York, 2001, 289–302 | DOI
[8] Fridrich J., Lisonek P., Soukal D., “On Steganographic Embedding Efficiency”, Information Hiding, 8th Int. Workshop, Lecture Notes in Computer Science, 4437, Springer-Verlag, 2007, 282–296 | DOI
[9] Fridrich J., Goljan M., Soukal D., “Perturbed Quantization Steganography”, ACM Multimedia and Security Journal, 11:2 (2005), 98–107 | DOI
[10] Fridrich J., Goljan M., Lisonek P., Soukal D., “Writing on Wet Paper”, IEEE Trans. Sig. Proc., 53:10, Special Issue on Media Security (2005), 3923–3935 | DOI | MR
[11] Razinkov E. V., Latypov R. Kh., “Skrytaya peredacha informatsii s ispolzovaniem granits ob'ektov”, Uchen. zap. Kazan. un-ta. Ser. Fiz.-matem. nauki, 149, no. 2, 2007, 128–137
[12] Razinkov E. V., Latypov R. Kh., “Image Steganography Technique Using Objects Outlines”, Proc. of the IEEE Systems, Man and Cybernetic Society 6th Conference on Cybernetic Systems, Dublin, 2007, 46–50
[13] Fridrich J., Goljan M., “Practical Steganalysis of Digital Images State of the Art”, Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 2002, 1–13 | DOI
[14] Farid H., Detecting Steganographic Message in Digital Images, Report TR2001-412, Dartmouth College, Hanover, NH, 2001 | Zbl
[15] Chandramouli R., Subbalakshmi K., “Current Trends in Steganalysis: A Critical Survey”, IEEE Int. Conf. on Control, Automation, Robotics and Vision, ICARCV, V. 2, 2004, 964–967
[16] Fridrich J., Pevny T., Kodovsky J., “Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities”, Proc. ACM Workshop Multimedia and Security, eds. J. Dittmann, J. Fridrich, Dallas, TX, 2007, 3–14
[17] Sullivan K., Madhow U., Chandrasekaran S., Manjunath B., “Steganalysis for Markov Cover Data With Applications to Images”, IEEE Transactions on Information Forensics and Security, 1:2 (2006), 275–287 | DOI
[18] Sencar H. T., Ramkumar M., Akansu A. N., Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia, Acad. Press, Orlando, FL, USA, 2004, 252 pp. | Zbl
[19] Duric Z., Jacobs M., Jajodia S., “Information Hiding: Steganography and Steganalysis”, Handbook of Statistics: Data Mining and Data Visualization, 24, 2005, 171–188 | DOI
[20] Fridrich J., Goljan M., Hogea D., “Steganalysis of JPEG Images: Breaking the F5 Algorithm”, Revised Papers from the 5th Int. Workshop on Information Hiding, 2002, 310–323
[21] Chandramouli R., Kharrazi M., Memon N. D., “Image steganography and steganalysis: Concepts and practice”, Digital Watermarking, 2nd Int. Workshop, IWDW 2003 (Seoul, Korea, 2003), Lecture Notes in Computer Science, 2939, Springer-Verlag, N.Y., 2004, 35–49 | DOI
[22] Chandramouli R., “A mathematical framework for active steganalysis”, ACM Multimedia Systems, 9:3 (2003), 303–311 | DOI
[23] Fridrich J., Goljan M., Hogea D., “Attacking the OutGuess”, Proc. ACM Workshop Multimedia and Security 2002, ACM Press, N.Y., 2002; http://faculty.ksu.edu.sa/ghazy/Steg/References/Ref11.pdf
[24] Fridrich J., Goljan M., Soukal D., “Searching for the Stego Key”, Proc. SPIE-Security, Steganography and Watermarking of Multimedia Contents, VI, Electronic Imaging, San Jose, CA, 2004, 70–82 | DOI