-
1
-
-
81055143410
-
S-tool V4
-
A. Brown, "S-Tool V4," ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip.
-
-
-
Brown, A.1
-
2
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Th. 47, 4 (2001) 1423-1443.
-
(2001)
IEEE Trans. Inform. Th.
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
3
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Imag. Process. 6, 12 (1997) 1673-1687.
-
(1997)
IEEE Trans. Imag. Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
4
-
-
1542363250
-
A new steganographic method for palette-based images
-
J. Fridrich, "A new steganographic method for palette-based images," Proc. IS&T PICS, Savannah, Georgia, 25-28 April 1999, pp. 285-289.
-
Proc. ISandT PICS, Savannah, Georgia, 25-28 April 1999
, pp. 285-289
-
-
Fridrich, J.1
-
5
-
-
84940448623
-
Secure steganographic methods for palette-based images
-
J. Fridrich and R. Du, "Secure steganographic methods for palette-based images," Proc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, 29 September-1 October 1999, pp. 47-60.
-
Proc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, 29 September-1 October 1999
, pp. 47-60
-
-
Fridrich, J.1
Du, R.2
-
7
-
-
0142015192
-
Mandelsteg
-
H. Hastur, Mandelsteg, ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/.
-
-
-
Hastur, H.1
-
9
-
-
0031996445
-
Steganography: Seeing the unseen
-
N. F. Johnson and S. Jajodia, "Steganography: seeing the unseen," IEEE Comput. 31, 2 (1998) 26-34.
-
(1998)
IEEE Comput.
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
10
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," Proc. 2nd Int. Workshop on Information Hiding, Portland, Oregon, USA, 14-17 April 1998, pp. 273-289.
-
Proc. 2nd Int. Workshop on Information Hiding, Portland, Oregon, USA, 14-17 April 1998
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
11
-
-
84887769253
-
JPEG image compression FAQ
-
"JPEG image compression FAQ," http://www.faqs.org/faqs/jpeg.faq/.
-
-
-
-
14
-
-
0142015191
-
Stego
-
R. Machado, "Stego," http://www.stego.com.
-
-
-
Machado, R.1
-
15
-
-
80052286596
-
Hide and Seek
-
C. Maroney, "Hide and Seek," http://www.rugeley.demon.co.uk/security/hdsk50.zip.
-
-
-
Maroney, C.1
-
16
-
-
0032682054
-
Spread spectrum image steganography
-
L. M. Marvel Jr., C. G. Boncelet and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. Imag. Process. 8, 8 (1999) 1075-1083.
-
(1999)
IEEE Trans. Imag. Process
, vol.8
, Issue.8
, pp. 1075-1083
-
-
Marvel Jr., L.M.1
Boncelet, C.G.2
Retter, C.T.3
-
17
-
-
84921027387
-
Hide4PGP
-
H. Repp, "Hide4PGP," http://www.rugeley.demon.co.uk/security/hide4pgp.zip.
-
-
-
Repp, H.1
-
18
-
-
0142047038
-
Steganos
-
STEGANOS company
-
STEGANOS company, "Steganos," http://www.steganos.com.
-
-
-
-
19
-
-
84885903962
-
Jsteg
-
D. Upham, "Jsteg," ftp://ftp.funet.fi/pub/crypt/steganography.
-
-
-
Upham, D.1
-
20
-
-
0001849187
-
Attacks on steganographic systems breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools - and some lessons learned
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools - and some lessons learned," Proc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, 29 September-1 October 1999, pp. 61-76.
-
Proc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, 29 September-1 October 1999
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
21
-
-
0001320242
-
Embedding robust labels into images for copyright protection
-
J. Zhao and E. Koch, "Embedding robust labels into images for copyright protection," Proc. Int. Conf. Intellectual Property Rights for Information, Knowledge and New Techniques, 1995, pp. 242-251.
-
Proc. Int. Conf. Intellectual Property Rights for Information, Knowledge and New Techniques, 1995
, pp. 242-251
-
-
Zhao, J.1
Koch, E.2
|