17
Views
9
CrossRef citations to date
0
Altmetric
Research Articles

Evaluation of pixel-based steganography and stegodetection methods

, &
Pages 131-150 | Published online: 18 Jul 2013

References

  • Xu, J., Sung, A. H., Shi, P. and Liu, Q. Text stegano-graphy using wavelet transform, Proc. 7th IASTED Int. Conf. on Internet and Multimedia Systems and Applications, 13–15 August, 2003, pp. 473–478 (Acta Press).
  • Westfield, A. and Pfitzmann, A. Attacks on stegano-graphic systems, Proc. 3rd Int. Workshop, IH’99, Dresden, Germany, October, 1999, pp. 61–76.
  • Fridrich J. A new steganographic method for palette-based images, IS&T’s PICS Conf., 1999, Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY, pp. 285–289.
  • Machado, R. EzStego, Stego Online, http://www.stego.com, 1996.
  • Kwan, M. How GifShuffle works, http://www.darkside.com.au/gifshuffle/description.html, 1998.
  • Lee, Y. K. and Chen, L. H. Object-based image steganography using affine transformation. Int. J. Pattern Artif. Intell., 2002, 12(2), 681–696.
  • Lee, Y. K. and Chen, L. H. Secure error-free steganography for JPEG images. Int. J. Pattern Artif. Intell., 2002, 11(1), 22–29.
  • Fridrich, J. and Du, R. Secure steganographic methods for palette images, Center for Intelligent Systems, Dept. of SS&IE, SUNY Binghamton, Binghamton, NY, Information Hiding, Proc. 3rd Int. Workshop, IH’99, Dresden, Germany, October, 1999, pp. 47–60.
  • Murray, J. D. and van Ryper, W. Encyclopedia of Graphics File Formats, 1996, 2nd edn (O’Reilly).
  • Johnson, N. F. and Jajodia, S. Steganalysis of images created using current steganography software, Centre for Secure Information Systems, George Mason University, Fairfax, VA, Information Hiding, 2nd Int. Workshop, IH’98, Portland, OR, April 1998, pp. 273–289.
  • Johnson, N. F. Steganography: Art & Science of Hidden Communication, 2002 (Office of Naval Research (ONR) Naval-Industry Partnership Conference, Washington, DC).
  • Mahoney, S. and Johnson, N. F. Audio steganography and steganalysis, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University, 11–13 June, 2002.
  • Hansmann, F., Steganos. Deus ex machina communications, http://www.steganography.com, 1996.
  • Maroney, C. HideSeek v5.0, 1996, www.rugeley.demon.co.uk/security/hdsk50.zip
  • Brown A. S-Tools for Windows V.3, 1994, ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools3.zip
  • Zollner J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G. and Wolf, G. Modelling the security of steganographic systems, Information Hiding, 2nd Int. Workshop, IH’98, Portland, OR, April 1998, Computer Science, 1998, 1525, 344–354.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.