-
1
-
-
0035791440
-
Steganalysis based on image quality metrics
-
Cannes, October 2001
-
Avcibas I, Sankur B, Memon ND (2001) Steganalysis based on image quality metrics. Proceedings of the IEEE wokshop on multimedia signal processing, Cannes, October 2001, pp 517-522
-
(2001)
Proceedings of the IEEE Wokshop on Multimedia Signal Processing
, pp. 517-522
-
-
Avcibas, I.1
Sankur, B.2
Memon, N.D.3
-
2
-
-
84957868624
-
An information-theoretic model for steganography
-
Proceedings of the 2nd international workshop on information hiding, Berlin, April 1998. Springer, Berlin Heidelberg New York
-
Cachin C (1998) An information-theoretic model for steganography. Proceedings of the 2nd international workshop on information hiding, Berlin, April 1998. Lecture notes in computer science, vol 1525. Springer, Berlin Heidelberg New York, pp 306-318
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
3
-
-
0031122399
-
Infomax and maximum likelihood for source separation
-
Cardoso JF (1997) Infomax and maximum likelihood for source separation. IEEE Signal Process Lett (4): 112-114
-
(1997)
IEEE Signal Process Lett
, Issue.4
, pp. 112-114
-
-
Cardoso, J.F.1
-
4
-
-
0032187518
-
Blind signal separation: Statistical principles
-
Cardoso JF (1998) Blind signal separation: statistical principles. Proc IEEE 90(8):2009-2026
-
(1998)
Proc IEEE
, vol.90
, Issue.8
, pp. 2009-2026
-
-
Cardoso, J.F.1
-
9
-
-
0028416938
-
Independent component analysis - A new concept?
-
Comon P (1994) Independent component analysis - a new concept? Signal Process 36:287-314
-
(1994)
Signal Process
, vol.36
, pp. 287-314
-
-
Comon, P.1
-
10
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673-1687
-
(1997)
IEEE Trans Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
11
-
-
0034509108
-
Steganalysis of lsb encoding in color images
-
New York, July 2000
-
Fridrich J, Du R, Meng L (2000) Steganalysis of lsb encoding in color images. Proceedings of the IEEE international conference on multimedia and expo, New York, July 2000, vol 3, pp 1279-1282
-
(2000)
Proceedings of the IEEE International Conference on Multimedia and Expo
, vol.3
, pp. 1279-1282
-
-
Fridrich, J.1
Du, R.2
Meng, L.3
-
12
-
-
0035766166
-
Steganlysis based on jpeg compatability
-
Denver, August 2001
-
Fridrich J, Goljan M, Du R (2001) Steganlysis based on jpeg compatability. Proceedings of SPIE multimedia systems and applications IV, Denver, August 2001, pp 275-280
-
(2001)
Proceedings of SPIE Multimedia Systems and Applications IV
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
13
-
-
0034787093
-
Reliable detection of lsb steganography in grayscale and color images
-
Ottawa, October 2001
-
Fridrich J, Goljan M, Du R (2001) Reliable detection of lsb steganography in grayscale and color images. Proceedings of the ACM workshop on multimedia security, Ottawa, October 2001, pp 27-30
-
(2001)
Proceedings of the ACM Workshop on Multimedia Security
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
15
-
-
0032072064
-
Watermarking of uncompressed and compressed video
-
Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283-301
-
(1998)
Signal Process
, vol.66
, Issue.3
, pp. 283-301
-
-
Hartung, F.1
Girod, B.2
-
17
-
-
1442285759
-
-
URL http://www.digimarc.com
-
-
-
-
18
-
-
1442334722
-
-
URL http://www.jpeg.org
-
-
-
-
19
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Springer, Berlin Heidelberg New York
-
Johnson NF, Jajodia S (1998) Steganalysis of images created using current steganography software. Lecture notes on computer science, vol 1525. Springer, Berlin Heidelberg New York, pp 273-289
-
(1998)
Lecture Notes on Computer Science
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
20
-
-
0033701078
-
The watermark copy attack
-
San Jose, January 2000
-
Kutter M, Voloshynovskiy S, Herrigel A (2000) The watermark copy attack. Proceedings of SPIE security and watermarking of multimedia content II, San Jose, January 2000, vol 3971, pp 371-381
-
(2000)
Proceedings of SPIE Security and Watermarking of Multimedia Content II
, vol.3971
, pp. 371-381
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
21
-
-
0041308536
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Noordwijkerhout, The Netherlands
-
Lyu S, Fand H (2002) Detecting hidden messages using higher-order statistics and support vector machines. Proceedings of the 5th international workshop on information hiding, Noordwijkerhout, The Netherlands (available at http://www.cs.dartmouth.edu/farid/)
-
(2002)
Proceedings of the 5th International Workshop on Information Hiding
-
-
Lyu, S.1
Fand, H.2
-
23
-
-
84860464383
-
Detecting steganographic content on the Internet
-
San Diego, February 2002
-
Proves N, Honeyman P (2002) Detecting steganographic content on the Internet. Proceedings of ISOC NDSS'02, San Diego, February 2002 (available at http://www.citi.umich.edu/u/provos/)
-
(2002)
Proceedings of ISOC NDSS'02
-
-
Proves, N.1
Honeyman, P.2
-
24
-
-
0001217738
-
Prisoners' problem and the subliminal channel
-
Santa Barbara, August 1984
-
Simmons GJ (1984) Prisoners' problem and the subliminal channel. Proceedings of CRYPTO83 - Advances incryptology, Santa Barbara, August 1984, pp 51-67
-
(1984)
Proceedings of CRYPTO83 - Advances Incryptology
, pp. 51-67
-
-
Simmons, G.J.1
-
25
-
-
84955564864
-
Modulation and information hiding in images
-
Proceedings of the 1st information hiding workshop, Springer, Berlin Heidelberg New York
-
Smith JR, Comiskey BO (1996) Modulation and information hiding in images. Proceedings of the 1st information hiding workshop, Lecture notes in computer science, vol 1174, Springer, Berlin Heidelberg New York, pp 207-226
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 207-226
-
-
Smith, J.R.1
Comiskey, B.O.2
-
26
-
-
0035368528
-
Analysis of digital watermarks subjected to optimum linear filtering and additive noise
-
Su JK, Eggers JJ, Girod B (2001) Analysis of digital watermarks subjected to optimum linear filtering and additive noise. Signal Process 81(6):1141-1175
-
(2001)
Signal Process
, vol.81
, Issue.6
, pp. 1141-1175
-
-
Su, J.K.1
Eggers, J.J.2
Girod, B.3
-
27
-
-
0036035145
-
Stegowall: Blind statistical detection of hidden data
-
Santa Clara, CA
-
Voloshynovskiy S, Herrigel A, Ritsar Y, Pun T (2002) Stegowall: Blind statistical detection of hidden data. Proceedings of SPIE photonics west, security and watermarking of multimedia contents IV, Santa Clara, CA, pp 57-68
-
(2002)
Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents IV
, pp. 57-68
-
-
Voloshynovskiy, S.1
Herrigel, A.2
Ritsar, Y.3
Pun, T.4
-
28
-
-
0033688391
-
Generalized watermark attack based on watermark estimation and perceptual remodulation
-
San Jose
-
Voloshynovskiy S, Pereira S, Herrigel A, Baumgartner N, Pun T (2000) Generalized watermark attack based on watermark estimation and perceptual remodulation. Proceedings of SPIE security and watermarking of multimedia content II, San Jose, pp 358-370
-
(2000)
Proceedings of SPIE Security and Watermarking of Multimedia Content II
, pp. 358-370
-
-
Voloshynovskiy, S.1
Pereira, S.2
Herrigel, A.3
Baumgartner, N.4
Pun, T.5
|