logo

SCIENCE CHINA Information Sciences, Volume 59 , Issue 3 : 032105(2016) https://doi.org/10.1007/s11432-015-5367-x

Stego key searching for LSB steganography on JPEG decompressed image

More info
  • ReceivedMar 7, 2015
  • AcceptedMay 8, 2015
  • PublishedJan 22, 2016

Abstract


References

[1] Zhang W M, Li S Q. Wuhan Univ J Nat Sci, 2005, 10: 315-318 CrossRef Google Scholar

[2] Regalia P A. IEEE Trans Inf Forens Secur, 2008, 3: 786-791 CrossRef Google Scholar

[3] Liu J F, Chen J Y, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. In: Proceedings of the IEEE International Conference on Multimedia Information Networking and Security, Nanjing, 2010. 691--695. Google Scholar

[4] Chen J Y, Liu J F, Zhang W M, et al. Int J Comput Intell Syst, 2013, 6: 639-647 CrossRef Google Scholar

[5] Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70--82. Google Scholar

[6] Fridrich J, Goljan M, Soukal D, et al. Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, 2005. 631--642. Google Scholar

[7] Zhang W M, Liu J F, Li S Q. Acta Sci Nat Univ Sunyatseni, 2005, 44: 29-33 Google Scholar

[8] Zhang W M, Li S Q, Liu J F. Chin J Comput, 2007, 30: 1625-1631 Google Scholar

[9] Liu J, Tang G M. J Multimedia, 2012, 7: 309-313 Google Scholar

[10] Zhang W M, Li S Q, Liu J F. Acta Electron Sin, 2007, 35: 2258-2261 Google Scholar

[11] Chen J Y, Zhu Y F, Zhang W M, et al. J Commun, 2010, 31: 73-80 Google Scholar

[12] Zhang J, Zhang D. IEEE Signal Process Lett, 2010, 17: 141-144 CrossRef Google Scholar

[13] Luo W Q, Wang Y G, Huang J W. IEEE Signal Process Lett, 2011, 18: 39-42 CrossRef Google Scholar

[14] Li X, Zhang T, Zhang Y, et al. Multimed Tools Appl, 2014, 68: 1051-1068 CrossRef Google Scholar

[15] Li X, Zhang T, Zhang Y, et al. Multimed Tools Appl, 2014, 73: 1487-1506 CrossRef Google Scholar

[16] Luo W Q, Huang J W, Qiu G P. IEEE Trans Inf Forens Secur, 2010, 5: 480-491 CrossRef Google Scholar

[17] Liu J F, Tian Y G, Han T, et al. Digit Signal Process, 2015, 38: 66-76 CrossRef Google Scholar