From: Jean-François Couchot Date: Tue, 17 Dec 2013 14:14:55 +0000 (+0100) Subject: fin avant choix revue X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/commitdiff_plain/222b1caaf60e918817a332b5ce7774cf792fef59?ds=inline fin avant choix revue --- diff --git a/biblio.bib b/biblio.bib deleted file mode 100644 index 780ab67..0000000 --- a/biblio.bib +++ /dev/null @@ -1,812 +0,0 @@ - - -@String{elsevier={Elsevier Science Publishers B. V.}} - -@String{springer={Springer-Verlag}} -@String{springer_loc={Berlin}} -@String{lncs={Lecture Notes in Computer Science}} - -@String{ieecs={IEEE Computer Society}} -@String{ieecs_loc={Washington, DC}} - -@String{isoc={The Internet Society}} -@String{isoc_loc={Washington DC/Reston}} - -@String{westpress={Westview Press}} -@String{westpress_loc={Boulder, CO}} - -@String{spie={Society of Photo-Optical Instrumentation Engineers}} -@String{spie_loc={Bellingham, WA}} - - - -@String{NC = {Neural Computation}} -@String{TNN= {IEEE Transactions on Neural Networks}} -@String{STTT= {International Journal on Software Tools for Technology Transfer}} -@string{JACM={Journal of ACM}} -@String{JCAM={Journal of Computational and Applied Mathematics}} - -@String{tcs={Theoretical Computer Science}} -@String{jtb={Journal of Theoretical Biology}} -@string{prenticeHall={Prentice-Hall, Inc.}} -@string{discreteapplMath={Discrete Applied Mathematics}} -@string{advapplMath={Advances in Applied Mathematics}} -@string{ijma= {International Journal of Mathematical Algorithms}} -@string{cs= {Cognitive Science}} -@string{siam={SIAM Journal on Computing}} - - -@inproceedings{DBLP:conf/ih/PereiraVMMP01, - editor = {Ira S. Moskowitz}, - author = {Shelby Pereira and - Sviatoslav Voloshynovskiy and - Maribel Madueno and - St{\'e}phane Marchand-Maillet and - Thierry Pun}, - booktitle = {Information Hiding, 4th International Workshop, IHW 2001, - Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, - title = {Second Generation Benchmarking and Application Oriented - Evaluation}, - year = {2001}, - pages = {340-353}, - series = lncs, - publisher = springer, - address = springer_loc, - month = apr, - volume = {2137}, -} - - -@inproceedings{DBLP:conf/ih/Westfeld01, - added-at = {2011-06-28T00:00:00.000+0200}, - author = {Westfeld, Andreas}, - booktitle = {Information Hiding, 4th International Workshop, IHW 2001, - Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, - editor = {Ira S. Moskowitz}, - pages = {289-302}, - publisher = springer, - address = springer_loc, - month=apr, - series = lncs, - title = {F5-A Steganographic Algorithm.}, - volume = 2137, - year = 2001 -} - - - - - -@article{Chang20101286, -title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector", -journal = "Digital Signal Processing", -volume = "20", -number = "4", -pages = "1286 - 1307", -year = "2010", -note = "", -issn = "1051-2004", -doi = "10.1016/j.dsp.2009.11.005", -url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413", -author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le", -keywords = "Security", -keywords = "Wet paper coding", -keywords = "Steganography", -keywords = "Indicator", -keywords = "Fuzzy edge detector" -} - - - -@article{Hu:2007:HPE:1282866.1282944, - author = {Hu, Liming and Cheng, H. D. and Zhang, Ming}, - title = {A high performance edge detector based on fuzzy inference rules}, - journal = {Inf. Sci.}, - issue_date = {November, 2007}, - volume = {177}, - number = {21}, - month = nov, - year = {2007}, - issn = {0020-0255}, - pages = {4768--4784}, - numpages = {17}, - url = {http://dx.doi.org/10.1016/j.ins.2007.04.001}, - doi = {10.1016/j.ins.2007.04.001}, - acmid = {1282944}, - publisher = {Elsevier Science Inc.}, - address = {New York, NY, USA}, - keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables}, -} - - -@inproceedings{Dumitrescu:2005:LSB:1073170.1073176, - author = {Sorina Dumitrescu and - Xiaolin Wu}, - editor = {Ahmet M. Eskicioglu and - Jessica J. Fridrich and - Jana Dittmann}, - title = {LSB steganalysis based on high-order statistics}, - booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, - MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, - year = {2005}, - publisher = {ACM}, - address = {New York, NY, USA}, - month=aug, - pages = {25-32}, - ee = {http://doi.acm.org/10.1145/1073170.1073176}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - -@inproceedings{DBLP:conf/ih/Ker05, - author = {Andrew D. Ker}, - title = {A General Framework for Structural Steganalysis of LSB Replacement}, - editor = {Mauro Barni and - Jordi Herrera-Joancomart\'{\i} and - Stefan Katzenbeisser and - Fernando P{\'e}rez-Gonz{\'a}lez}, - booktitle = {Information Hiding, 7th International Workshop, IH 2005, - Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, - year = {2005}, - pages = {296-311}, - ee = {http://dx.doi.org/10.1007/11558859_22}, - publisher = springer, - address = springer_loc, - month= jun, - series = lncs, - volume = {3727}, -} - - -@inproceedings{FK12, - editor = {Matthias Kirchner and - Dipak Ghosal}, - booktitle = {Information Hiding - 14th International Conference, IH 2012, - Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, - author = {Jessica J. Fridrich and - Jan Kodovsk{\'y}}, - title = {Steganalysis of LSB Replacement Using Parity-Aware Features}, - month=may, - year = {2012}, - pages = {31-45}, - ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3}, - volume = {7692}, - publisher = springer, - address = springer_loc, - series = lncs, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - -@article{DBLP:journals/tsp/DumitrescuWW03, - added-at = {2012-02-06T00:00:00.000+0100}, - author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe}, - biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp}, - ee = {http://dx.doi.org/10.1109/TSP.2003.812753}, - interhash = {f51bec0b4e4f8aba644eb0938018d2c6}, - intrahash = {556caad9b61980d3458885153a52321c}, - journal = {IEEE Transactions on Signal Processing}, - keywords = {dblp}, - number = 7, - pages = {1995-2007}, - timestamp = {2012-02-06T00:00:00.000+0100}, - title = {Detection of LSB steganography via sample pair analysis.}, - url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03}, - volume = 51, - year = 2003 -} - - - - -@inproceedings{DBLP:conf/mmsec/FridrichGD01, - editor = {Nicolas D. Georganas and - Radu Popescu-Zeletin}, - booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: - New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, - October 5, 2001}, - author = {Jessica J. Fridrich and - Miroslav Goljan and - Rui Du}, - title = {Reliable detection of LSB steganography in color and grayscale - images}, - year = {2001}, - pages = {27-30}, - ee = {http://doi.acm.org/10.1145/1232454.1232466}, - publisher = {ACM}, - address = {New York, NY, USA}, - month = oct, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - - - - -@inproceedings{DBLP:conf/ih/PevnyFB10, - author = {Tom{\'a}s Pevn{\'y} and - Tom{\'a}s Filler and - Patrick Bas}, - title = {Using High-Dimensional Image Models to Perform Highly Undetectable - Steganography}, - editor = {Rainer B{\"o}hme and - Philip W. L. Fong and - Reihaneh Safavi-Naini}, - booktitle = {Information Hiding - 12th International Conference, IH 2010, - Calgary, AB, Canada, June 28-30, 2010, Revised Selected - Papers}, - year = {2010}, - pages = {161-177}, - month=jun, - publisher = springer, - address = springer_loc, - series = lncs, - volume = {6387}, - ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - - - - -@Misc{Boss10, - OPTkey = {}, - author = {Tom{\'a}s Pevn{\'y} and - Tom{\'a}s Filler and - Patrick Bas}, - - title = {Break Our Steganographic System}, - OPThowpublished = {}, - OPTmonth = {}, - year = {2010}, - note = {Available at \url{http://www.agents.cz/boss/}}, - OPTannote = {} -} - -@proceedings{DBLP:conf/ih/2010, - editor = {Rainer B{\"o}hme and - Philip W. L. Fong and - Reihaneh Safavi-Naini}, - title = {Information Hiding - 12th International Conference, IH 2010, - Calgary, AB, Canada, June 28-30, 2010, Revised Selected - Papers}, - booktitle = {Information Hiding}, - publisher = springer, - address = springer_loc, - series = lncs, - volume = {6387}, - year = {2010}, - isbn = {978-3-642-16434-7}, - ee = {http://dx.doi.org/10.1007/978-3-642-16435-4}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - -@article{DBLP:journals/eswa/ChenCL10, - added-at = {2010-07-21T15:44:10.000+0200}, - author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan}, - biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp}, - date = {2010-05-03}, - ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050}, - interhash = {bc34a5f04661fee24ee62c39e76361be}, - intrahash = {28889a4ab329da28559f0910469f054b}, - journal = {Expert Systems with Applications}, - keywords = {dblp}, - number = 4, - pages = {3292-3301}, - timestamp = {2010-07-21T15:44:10.000+0200}, - title = {High payload steganography mechanism using hybrid edge detector.}, - url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10}, - volume = 37, - year = 2010 -} - -@article{DBLP:journals/tifs/FillerJF11, - added-at = {2011-09-29T00:00:00.000+0200}, - author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.}, - biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp}, - ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094}, - interhash = {b27d23ed0c9936d568e16c51378abccd}, - intrahash = {50e43c05a74eec17524b3df8db442da5}, - journal = {IEEE Transactions on Information Forensics and Security}, - keywords = {dblp}, - number = {3-2}, - pages = {920-935}, - timestamp = {2011-09-29T00:00:00.000+0200}, - title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.}, - url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11}, - volume = 6, - year = 2011 -} - - - - -@inproceedings{DBLP:conf/ih/KimDR06, - added-at = {2007-09-20T00:00:00.000+0200}, - author = {Kim, Younhee and Duric, Zoran and Richards, Dana}, - biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp}, - booktitle = {Information Hiding}, - crossref = {DBLP:conf/ih/2006}, - date = {2007-09-20}, - description = {dblp}, - editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil}, - ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21}, - interhash = {399aab122b39cfd6f6e951a1b276c786}, - intrahash = {f0324f70d62d9dfba568e393920aaa16}, - isbn = {978-3-540-74123-7}, - keywords = {dblp}, - pages = {314-327}, - month=jul, - publisher = springer, - address = springer_loc, - series = lncs, - timestamp = {2007-09-20T00:00:00.000+0200}, - title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.}, - url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06}, - volume = 4437, - year = 2006 -} - - -@proceedings{DBLP:conf/ih/2006, - editor = {Jan Camenisch and - Christian S. Collberg and - Neil F. Johnson and - Phil Sallee}, - title = {Information Hiding, 8th International Workshop, IH 2006, - Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, - booktitle = {Information Hiding}, - publisher = springer, - address = springer_loc, - series = lncs, - volume = {4437}, - year = {2007}, - isbn = {978-3-540-74123-7}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - - -@inproceedings{DBLP:conf/mmsec/FridrichPK07, - author = {Jessica J. Fridrich and - Tom{\'a}s Pevn{\'y} and - Jan Kodovsk{\'y}}, - title = {Statistically undetectable jpeg steganography: dead ends - challenges, and opportunities}, - pages = {3-14}, - ee = {http://doi.acm.org/10.1145/1288869.1288872}, - editor = {Deepa Kundur and - Balakrishnan Prabhakaran and - Jana Dittmann and - Jessica J. Fridrich}, - booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, - MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, - publisher = {ACM}, - address = {New York, NY, USA}, - month=sep, - year = {2007}, - isbn = {978-1-59593-857-2}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - - - -@inproceedings{DBLP:conf/mediaforensics/FillerJF10, - editor = {Nasir D. Memon and - Jana Dittmann and - Adnan M. Alattar and - Edward J. Delp}, - booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE - Electronic Imaging Symposium, San Jose, CA, USA, January - 18-20, 2010, Proceedings}, - author = {Tom{\'a}s Filler and - Jan Judas and - Jessica J. Fridrich}, - title = {Minimizing embedding impact in steganography using trellis-coded - quantization}, - year = {2010}, - pages = {754105}, - ee = {http://dx.doi.org/10.1117/12.838002}, - bibsource = {DBLP, http://dblp.uni-trier.de}, - publisher = spie, - address = spie_loc, - month = jan, - series = {SPIE Proceedings}, - volume = {7541}, -} - - - - - - - - -@proceedings{DBLP:conf/mediaforensics/2010, - editor = {Nasir D. Memon and - Jana Dittmann and - Adnan M. Alattar and - Edward J. Delp}, - title = {Media Forensics and Security II, part of the IS{\&}T-SPIE - Electronic Imaging Symposium, San Jose, CA, USA, January - 18-20, 2010, Proceedings}, - booktitle = {Media Forensics and Security}, - publisher = spie, - address = spie_loc, - series = {SPIE Proceedings}, - volume = {7541}, - year = {2010}, - isbn = {978-0-8194-7934-1}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - -@article{DBLP:journals/corr/abs-1112-5239, - author = {Jacques M. Bahi and - Rapha{\"e}l Couturier and - Christophe Guyeux and - Pierre-Cyrille H{\'e}am}, - title = {Efficient and Cryptographically Secure Generation of Chaotic - Pseudorandom Numbers on GPU}, - journal = {CoRR}, - volume = {abs/1112.5239}, - year = {2011}, - ee = {http://arxiv.org/abs/1112.5239}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - -@Misc{psnrhvsm11, - author = {Ponomarenko, Nikolay}, - title = {PSNR-HVS-M page}, - OPThowpublished = {}, - OPTmonth = {}, - year = {2011}, - note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}}, - OPTannote = {} -} - -@Misc{biqi11, - OPTkey = {}, - author = {Bovik, Alan C.}, - title = {BIQI page}, - OPThowpublished = {}, - OPTmonth = {}, - year = {2011}, - note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}}, - OPTannote = {} -} - - -@InProceedings{PSECAL07, - author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir}, - title = {On between-coefficient contrast masking of DCT basis functions}, - booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA}, - OPTpages = {}, - year = {2007}, - editor = {Li,Baoxin}, - OPTvolume = {}, - OPTnumber = {}, - OPTseries = {}, - OPTaddress = {}, - month = jan, - OPTorganization = {}, - OPTpublisher = {}, - OPTnote = {}, - OPTannote = {} -} - - -@Article{MB10, - author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad}, - title = {A Two-Step Framework for Constructing Blind Image Quality Indices}, - journal = {IEEE Signal Processing Letters}, - year = {2010}, - volume = {17}, - number = {5}, - pages = {513--516}, - month = may, -} - - - - -@inproceedings{DBLP:conf/crypto/ShubBB82, - author = {Lenore Blum and - Manuel Blum and - Mike Shub}, - title = {Comparison of Two Pseudo-Random Number Generators}, - editor = {David Chaum and - Ronald L. Rivest and - Alan T. Sherman}, - booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa - Barbara, California, USA, August 23-25, 1982}, - pages = {61-78}, - bibsource = {DBLP, http://dblp.uni-trier.de}, - publisher = {Plenum Press}, - address={New York, NY, USA}, - month=aug, - year = {1983}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - -@inproceedings{Blum:1985:EPP:19478.19501, - booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa - Barbara, California, USA, August 19-22, 1984, Proceedings}, - author = {Manuel Blum and - Shafi Goldwasser}, - title = {An Efficient Probabilistic Public-Key Encryption Scheme - Which Hides All Partial Information}, - month=aug, - year = {1985}, - pages = {289-302}, - editor = {G. R. Blakley and - David Chaum}, - publisher = springer, - address = springer_loc, - series = lncs, - volume = {196} -} - - - -@article{DBLP:journals/ejisec/FontaineG07, - author = {Caroline Fontaine and - Fabien Galand}, - title = {A Survey of Homomorphic Encryption for Nonspecialists}, - journal = {EURASIP Journal on Information Security}, - volume = {2007}, - year = {2007}, - NUMBER = {1}, - PAGES = {013801}, - ee = {http://dx.doi.org/10.1155/2007/13801}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - -@article{Luo:2010:EAI:1824719.1824720, - author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu}, - title = {Edge adaptive image steganography based on LSB matching revisited}, - journal = {IEEE Transactions on Information Forensics and Security}, - volume = {5}, - number = {2}, - month = jun, - year = {2010}, - issn = {1556-6013}, - pages = {201--214}, - numpages = {14}, - url = {http://dx.doi.org/10.1109/TIFS.2010.2041812}, - doi = {10.1109/TIFS.2010.2041812}, - acmid = {1824720}, - publisher = {IEEE Press}, - address = {Piscataway, NJ, USA}, - keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis}, -} - -@article{Mielikainen06, - author = {Mielikainen, J.}, - title = {LSB Matching Revisited}, - journal = {IEEE Signal Processing Letters}, - year = {2006}, - OPTkey = {}, - volume = {13}, - number = {5}, - pages = {285--287}, - month = may, - OPTnote = {}, - OPTannote = {} -} - - - - - -@article{Liu:2008:FMP:1284917.1285196, - author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun}, - title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images}, - journal = {Pattern Recogn.}, - issue_date = {January, 2008}, - volume = {41}, - number = {1}, - month = jan, - year = {2008}, - issn = {0031-3203}, - pages = {56--66}, - numpages = {11}, - url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005}, - doi = {10.1016/j.patcog.2007.06.005}, - acmid = {1285196}, - publisher = {Elsevier Science Inc.}, - address = {New York, NY, USA}, - keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis}, -} - - - -@InProceedings{LHS08, - author = {Bin Li and Jiwu Huang and Yun Q. Shi}, - title = {Textural features based universal steganalysis}, - OPTcrossref = {}, - OPTkey = {}, - booktitle = {Proc. SPIE 6819}, - publisher = spie, - address = spie_loc, - pages = {12}, - year = {2008}, - OPTeditor = {}, - OPTvolume = {6819}, - - OPTseries = {}, - OPTaddress = {}, - month = feb, - OPTorganization = {}, - OPTpublisher = {}, - OPTnote = {}, - OPTannote = {} -} - - -@InProceedings{KF11, - author = {Jan Kodovsk{\'y} and Jessica Fridrich}, - title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces}, - OPTcrossref = {}, - OPTkey = {}, - booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII}, - publisher = spie, - address = spie_loc, - month=feb, - pages = {78800L-78800L-13}, - OPTpages = {}, - year = {2011}, - OPTeditor = {}, - OPTvolume = {}, - OPTnumber = {}, - OPTseries = {}, - OPTaddress = {}, - OPTmonth = {}, - OPTorganization = {}, - OPTpublisher = {}, - OPTnote = {}, - OPTannote = {} -} - -@article{DBLP:journals/tifs/KodovskyFH12, - author = {Jan Kodovsk{\'y} and - Jessica J. Fridrich and - Vojtech Holub}, - title = {Ensemble Classifiers for Steganalysis of Digital Media}, - journal = {IEEE Transactions on Information Forensics and Security}, - volume = {7}, - number = {2}, - year = {2012}, - pages = {432-444}, - ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - - -@article{Fillatre:2012:ASL:2333143.2333587, - author = {Fillatre, Lionel}, - title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images}, - journal = {IEEE Transactions on Signal Processing}, - year = {2012}, - volume = {60}, - number = {2}, - month = feb, - issn = {1053-587X}, - pages = {556--569}, - numpages = {14}, - url = {http://dx.doi.org/10.1109/TSP.2011.2174231}, - doi = {10.1109/TSP.2011.2174231}, - acmid = {2333587}, - publisher = {IEEE Press}, - address = {Piscataway, NJ, USA}, -} - - -@inproceedings{Tyan1993, - abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}}, - address = ieecs_loc, - publisher=ieecs, - author = {Tyan, C. Y. and Wang, P. P.}, - booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}}, - citeulike-article-id = {7936501}, - keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory}, - pages = {600--605}, - posted-at = {2010-10-01 17:27:48}, - priority = {0}, - month=apr, - title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}}, - volume = {1}, - year = {1993} -} - - -@article{Canny:1986:CAE:11274.11275, - author = {Canny, J}, - title = {A Computational Approach to Edge Detection}, - journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, - issue_date = {June 1986}, - volume = {PAMI-8}, - number = {6}, - month = jun, - year = {1986}, - issn = {0162-8828}, - pages = {679--698}, - numpages = {20}, - url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851}, - doi = {10.1109/TPAMI.1986.4767851}, - acmid = {11275}, - publisher = {IEEE Computer Society}, - address = {Washington, DC, USA}, - keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis}, -} - - -@inproceedings{DBLP:conf/ih/FridrichKHG11a, - author = {Jessica J. Fridrich and - Jan Kodovsk{\'y} and - Vojtech Holub and - Miroslav Goljan}, - title = {Steganalysis of Content-Adaptive Steganography in Spatial - Domain}, - booktitle = {Information Hiding}, - year = {2011}, - pages = {102-117}, - ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8}, - crossref = {DBLP:conf/ih/2011}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} -@proceedings{DBLP:conf/ih/2011, - editor = {Tom{\'a}s Filler and - Tom{\'a}s Pevn{\'y} and - Scott Craver and - Andrew D. Ker}, - title = {Information Hiding - 13th International Conference, IH 2011, - Prague, Czech Republic, May 18-20, 2011, Revised Selected - Papers}, - booktitle = {Information Hiding}, - publisher = springer, - address = springer_loc, - series = lncs, - volume = {6958}, - year = {2011}, - isbn = {978-3-642-24177-2}, - ee = {http://dx.doi.org/10.1007/978-3-642-24178-9}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - -@inproceedings{DBLP:conf/iwdw/Fridrich11, - author = {Jessica J. Fridrich}, - title = {Modern Trends in Steganography and Steganalysis}, - booktitle = {IWDW}, - year = {2011}, - pages = {1}, - ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1}, - crossref = {DBLP:conf/iwdw/2011}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} -@proceedings{DBLP:conf/iwdw/2011, - editor = {Yun-Qing Shi and - Hyoung-Joong Kim and - Fernando P{\'e}rez-Gonz{\'a}lez}, - title = {Digital Forensics and Watermarking - 10th International - Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, - 2011, Revised Selected Papers}, - booktitle = {IWDW}, - publisher = springer, - address = springer_loc, - series = lncs, - volume = {7128}, - year = {2012}, - isbn = {978-3-642-32204-4}, - ee = {http://dx.doi.org/10.1007/978-3-642-32205-1}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} - - - - - diff --git a/experiments.tex b/experiments.tex index 776a5a5..7afd27c 100644 --- a/experiments.tex +++ b/experiments.tex @@ -5,23 +5,42 @@ grayscale digital image in a RAW format. We restrict experiments to this set of cover images since this paper is more focused on the methodology than benchmarking. -We use the matrices given in table~\ref{table:matrices:H} -as introduced in~\cite{}, since these ones have experimentally + +We use the matrices $\hat{H}$ +generated by the integers given +in table~\ref{table:matrices:H} +as introduced in~\cite{FillerJF11}, since these ones have experimentally be proven to have the best modification efficiency. +For instance if the rate between the size of message and the size of the host is +1/4, each number in $\{81, 95, 107, 121\}$ is translated into a binary number +and each one consitutes thus an column of $\hat{H}$. \begin{table} $$ \begin{array}{|l|l|} -\textrm{rate} & \textrm{matrix generators} \\ -$\frac{1}{2} & \{71,109\} -$\frac{1}{3} & \{95, 101, 121\} -$\frac{1}{4} & \{81, 95, 107, 121\} -$\frac{1}{5} & \{75, 95, 97, 105, 117\} -$\frac{1}{6} & \{73, 83, 95, 103, 109, 123\} -$\frac{1}{7} & \{69, 77, 93, 107, 111, 115, 121\} -$\frac{1}{8} & \{69, 79, 81, 89, 93, 99, 107, 119\} -$\frac{1}{9} & \{69, 79, 81, 89, 93, 99, 107, 119, 125] - +\hline +\textrm{Rate} & \textrm{Matrix generators} \\ +\hline +{1}/{2} & \{71,109\}\\ +\hline +{1}/{3} & \{95, 101, 121\}\\ +\hline +{1}/{4} & \{81, 95, 107, 121\}\\ +\hline +{1}/{5} & \{75, 95, 97, 105, 117\}\\ +\hline +{1}/{6} & \{73, 83, 95, 103, 109, 123\}\\ +\hline +{1}/{7} & \{69, 77, 93, 107, 111, 115, 121\}\\ +\hline +{1}/{8} & \{69, 79, 81, 89, 93, 99, 107, 119\}\\ +\hline +{1}/{9} & \{69, 79, 81, 89, 93, 99, 107, 119, 125\}\\ +\hline +\end{array} +$$ +\caption{Matrix Generator for $\hat{H}$ in STC}\label{table:matrices:H} +\end{table} Our approach is always compared to Hugo~\cite{DBLP:conf/ih/PevnyFB10} diff --git a/intro.tex b/intro.tex index cb4c669..d1ee499 100644 --- a/intro.tex +++ b/intro.tex @@ -21,7 +21,7 @@ only if this one does not correspond to the secret bit. %TODO : modifier ceci By considering well-encrypted hidden messages, probabilities of increasing or of decreasing value of pixels are equal. Then usual statistical approaches cannot be applied here to discover stego-contents in LSBM. -The most accurate detectors for this matching are universal steganalysers such as~\cite{LS08,DBLP:conf/ih/Ker05,FK12}, +The most accurate detectors for this matching are universal steganalysers such as~\cite{LHS08,DBLP:conf/ih/Ker05,FK12}, which classify images according to extracted features from neighboring elements of residual noise. diff --git a/main.tex b/main.tex index 422a796..bb3f143 100755 --- a/main.tex +++ b/main.tex @@ -144,7 +144,7 @@ Furthermore, we plan to investigate information hiding on other models, such as \bibliographystyle{compj} -\bibliography{biblio} +\bibliography{abbrev,biblioand} diff --git a/ourapproach.tex b/ourapproach.tex index 1b2ee1a..eeabc98 100644 --- a/ourapproach.tex +++ b/ourapproach.tex @@ -148,12 +148,13 @@ This is the classical approach adopted in steganography. Practically, the Canny algorithm generates a set of edge pixels related to a threshold that is decreasing until its cardinality -is sufficient. +is sufficient. Even in this situation, our scheme is adapting +its algorithm to met all the user requirements. - -Two methods may further be applied to select bits that -will be modified. +Once the map of possibly modified pixels is computed, +two methods may further be applied to extract bits that +are really modified. The first one randomly chooses the subset of pixels to modify by applying the BBS PRNG again. This method is further denoted as a \emph{sample}. Once this set is selected, a classical LSB replacement is applied to embed the diff --git a/stc.tex b/stc.tex index 09ae436..26ac732 100644 --- a/stc.tex +++ b/stc.tex @@ -68,7 +68,7 @@ is a practical solution to this complexity. Thanks to this contribution, the solving algorithm has a linear complexity with respect to $n$. First of all, Filler \emph{et al.} compute the matrix $H$ -by placing a small sub-matrix $\hat{H}$ of size $h × w$ next +by placing a small sub-matrix $\hat{H}$ next to each other and by shifting down by one row. Thanks to this special form of $H$, one can represent any solution of $m=Hy$ as a path through a trellis.