Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics

Novel Image Data-Hiding Methodologies for Robust and Secure Steganography with Extensions to Image Forensics

[1]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  Antoine Joux,et al.  Fast Correlation Attacks: An Algorithmic Point of View , 2002, EUROCRYPT.

[3]  Xinpeng Zhang,et al.  Stego-Encoding with Error Correction Capability , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[4]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[5]  Anindya Sarkar,et al.  Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[6]  Yun Q. Shi,et al.  JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.

[7]  B. S. Manjunath,et al.  Robust Image-Adaptive Data Hiding : Modeling , Source Coding and Channel Coding ∗ , 2003 .

[8]  Horst Bischof,et al.  Efficient Maximally Stable Extremal Region (MSER) Tracking , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[9]  Benoit M. Macq,et al.  Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..

[10]  Jessica J. Fridrich,et al.  Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.

[11]  Thierry Pun,et al.  Multibit digital watermarking robust against local nonlinear geometrical distortions , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[12]  Hany Farid,et al.  Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.

[13]  B. S. Manjunath,et al.  Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.

[14]  Jiying Zhao,et al.  LPM-based RST invariant digital image watermarking , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[15]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.

[16]  Aliazam Abbasfar Turbo-like Codes: Design for High Speed Decoding , 2007 .

[17]  Abdulmotaleb El-Saddik,et al.  A Survey of RST Invariant Image Watermarking Algorithms , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[18]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[19]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[20]  B. S. Manjunath,et al.  Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.

[21]  Andrew C. Gallagher Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).

[22]  Anindya Sarkar,et al.  Steganographic capacity estimation for the statistical restoration framework , 2008, Electronic Imaging.

[23]  Anindya Sarkar,et al.  Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[24]  Tomás Pevný,et al.  Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.

[25]  B. S. Manjunath,et al.  Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.

[26]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[27]  Michael G. Strintzis,et al.  Robust image watermarking based on generalized Radon transformations , 2003, IEEE Trans. Circuits Syst. Video Technol..

[28]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[29]  Thierry Pun,et al.  Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..

[30]  Anindya Sarkar,et al.  Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.

[31]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[32]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[33]  Hany Farid,et al.  Statistical Tools for Digital Forensics , 2004, Information Hiding.

[34]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[35]  P. P. Vaidyanathan,et al.  Optimal histogram modification with MSE metric , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[36]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[37]  B. S. Manjunath,et al.  Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.

[38]  Anindya Sarkar,et al.  Adding Gaussian noise to “denoise” JPEG for detecting image resizing , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[39]  Jessica J. Fridrich,et al.  Minimizing the embedding impact in steganography , 2006, MM&Sec '06.

[40]  B. S. Manjunath,et al.  High-volume data hiding in images: Introducing perceptual criteria into quantization based embedding , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[41]  Leonidas J. Guibas,et al.  The Earth Mover's Distance as a Metric for Image Retrieval , 2000, International Journal of Computer Vision.

[42]  Noboru Babaguchi,et al.  Breaking the YASS algorithm via pixel and DCT coefficients analysis , 2008, 2008 19th International Conference on Pattern Recognition.

[43]  Ariel Shamir,et al.  Seam Carving for Content-Aware Image Resizing , 2007, ACM Trans. Graph..

[44]  H. W. Park,et al.  Blocking effect reduction of JPEG images by signal adaptive filtering , 1998, IEEE Trans. Image Process..

[45]  Ioannis Pitas,et al.  Region-based image watermarking , 2001, IEEE Trans. Image Process..

[46]  Thierry Pun,et al.  Method for the estimation and recovering from general affine transforms in digital watermarking applications , 2002, IS&T/SPIE Electronic Imaging.

[47]  X. Jin Factor graphs and the Sum-Product Algorithm , 2002 .

[48]  T. Aaron Gulliver,et al.  Design of Rate-Compatible Punctured Repeat-Accumulate Codes , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[49]  Anindya Sarkar,et al.  Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.

[50]  Elke Franz Steganography Preserving Statistical Properties , 2002, Information Hiding.

[51]  Aria Nosratinia Denoising JPEG images by re-application of JPEG , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[52]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[53]  Young Huh,et al.  Wavelet transforms in a JPEG-like image coder , 1994, Other Conferences.

[54]  Bernd Girod,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[55]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[56]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[57]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[58]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005 .

[59]  Qiong Wu,et al.  Detection of digital doctoring in exemplar-based inpainted images , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[60]  Stefan Katzenbeisser,et al.  Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.

[61]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[62]  Petra Mutzel,et al.  A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.

[63]  M. Hemahlathaa,et al.  A feature-based robust digital image watermarking scheme , 2012, 2012 International Conference on Computing, Communication and Applications.

[64]  Alin C. Popescu,et al.  Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.

[65]  Jiying Zhao,et al.  A Rectification Scheme for RST Invariant Image Watermarking , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[66]  Ying Wang,et al.  Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.

[67]  Jessica J. Fridrich,et al.  Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.

[68]  Dan Wang,et al.  A Novel Geometrical Robust Image Data Hiding Scheme , 2007, Eighth International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS '07).

[69]  Anindya Sarkar,et al.  Detection of seam carving and localization of seam insertions in digital images , 2009, MM&Sec '09.

[70]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[71]  Jun Wu,et al.  A feature-based robust digital image watermarking against desynchronization attacks , 2007, Int. J. Autom. Comput..

[72]  Ying Wang,et al.  Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.

[73]  Bin Li,et al.  Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..

[74]  B. S. Manjunath,et al.  Statistical restoration for robust and secure steganography , 2005, IEEE International Conference on Image Processing 2005.

[75]  Pierre Duhamel,et al.  Applied public-key steganography , 2002, IS&T/SPIE Electronic Imaging.

[76]  Sviatoslav Voloshynovskiy,et al.  Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.

[77]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[78]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[79]  C. D. McGillem,et al.  Multitemporal Geometric Distortion Correction Utilizing the Affine Transformation , 1973 .

[80]  Soo-Chang Pei,et al.  Image normalization for pattern recognition , 1995, Image Vis. Comput..

[81]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[82]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[83]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[84]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[85]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[86]  Shih-Fu Chang,et al.  Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[87]  Ying Wang,et al.  Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[88]  Dariush Divsalar,et al.  Coding theorems for 'turbo-like' codes , 1998 .

[89]  Xiaojun Qi,et al.  Towards a Robust Feature-Based Watermarking Scheme , 2006, 2006 International Conference on Image Processing.

[90]  Dan Wang,et al.  A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization , 2007, Information Hiding.

[91]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[92]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[93]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[94]  Babak Mahdian,et al.  Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .

[95]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[96]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[97]  Shiyan Hu,et al.  Geometric-Invariant Image Watermarking by Key-Dependent Triangulation , 2008, Informatica.

[98]  Michael Backes,et al.  Public-Key Steganography with Active Attacks , 2005, TCC.

[99]  Ahmed H. Tewfik,et al.  Geometric Invariance in image watermarking , 2004, IEEE Transactions on Image Processing.

[100]  Matthias Kirchner On the detectability of local resampling in digital images , 2008, Electronic Imaging.

[101]  Heung-Kyu Lee,et al.  Robust image watermarking using local invariant features , 2006 .

[102]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[103]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[104]  B. S. Manjunath,et al.  Determining Achievable Rates for Secure, Zero Divergence, Steganography , 2006, 2006 International Conference on Image Processing.

[105]  Christopher G. Harris,et al.  A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.

[106]  Anindya Sarkar,et al.  Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation , 2007, 2007 IEEE International Conference on Image Processing.

[107]  Chengyun Yang,et al.  Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.

[108]  Chi-Keung Tang,et al.  Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..

[109]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[110]  B. S. Manjunath,et al.  Image adaptive high volume data hiding based on scalar quantization , 2002, MILCOM 2002. Proceedings.

[111]  Husrev T. Sencar,et al.  Image Steganography: Concepts and Practice , 2004 .

[112]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[113]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[114]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[115]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[116]  Mike Fisk,et al.  Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.