-
2
-
-
20444372785
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
Toronto, CA, May 23-35
-
th Information Hiding Workshop, Toronto, CA, May 23-35, 2004.
-
(2004)
th Information Hiding Workshop
-
-
Fridrich, J.1
-
3
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
August 22-24
-
G.J. Simmons, The Prisoners' Problem and the Subliminal Channel, CRYPTO83 - Advances in Cryptology, August 22-24, pp. 51-67, 1984.
-
(1984)
CRYPTO83 - Advances in Cryptology
, pp. 51-67
-
-
Simmons, G.J.1
-
5
-
-
0032070303
-
On the limits of steganography
-
Special Issue on Copyright and Privacy Protection
-
R.J. Anderson and F.A.P. Petitcolas, "On the Limits of Steganography", IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, vol. 16(4), pp. 474-481, 1998.
-
(1998)
IEEE Journal of Selected Areas in Communications
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
6
-
-
84957868624
-
An information-theoretic model for steganography
-
nd International Workshop. Springer-Verlag, New York
-
nd International Workshop. Lecture Notes in Computer Science, Vol. 1525. Springer-Verlag, New York, pp. 306-318, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
7
-
-
84957886335
-
Modeling the security of steganographic systems
-
nd International Workshop. Springer-Verlag, New York
-
nd International Workshop. Lecture Notes in Computer Science, Vol. 1525. Springer-Verlag, New York, pp. 344-354, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 344-354
-
-
Zöllner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
8
-
-
0036030621
-
Defining security in steganographic systems
-
Watermarking of Multimedia Contents IV. 4675, Electronic Imaging 2000, San Jose, CA
-
S. Katzenbeisser and F.A.P. Petitcolas, "Defining Security in Steganographic Systems", SPIE Security and Watermarking of Multimedia Contents IV, Vol. 4675, Electronic Imaging 2000, San Jose, CA, pp. 50-56, 2002.
-
(2002)
SPIE Security and
, pp. 50-56
-
-
Katzenbeisser, S.1
Petitcolas, F.A.P.2
-
9
-
-
35248889376
-
Steganography preserving statistical properties
-
th International Workshop. Springer-Verlag, Berlin Heidelberg New York
-
th International Workshop. Lecture Notes in Computer Science, Vol. 2578. Springer-Verlag, Berlin Heidelberg New York, pp. 278-294, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 278-294
-
-
Franz, E.1
-
10
-
-
84940448623
-
Secure steganographic methods for palette images
-
nd International Workshop, Springer-Verlag, New York
-
nd International Workshop. Lecture Notes in Computer Science, Vol. 1768, Springer-Verlag, New York, pp. 47-60. 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1768
, pp. 47-60
-
-
Fridrich, J.1
Du, R.2
-
11
-
-
14844321260
-
A hierarchical protocol for increasing the stealthiness of steganographic methods
-
to appear Magdeburg, Germany, September 20-21
-
M. Karahan, U. Topkara, M. Atallah, C. Taskiran, E. Lin, E. Delp, "A Hierarchical Protocol for Increasing the Stealthiness of Steganographic Methods", to appear in Proc. ACM Multimediam Workshop, Magdeburg, Germany, September 20-21,2004.
-
(2004)
Proc. ACM Multimediam Workshop
-
-
Karahan, M.1
Topkara, U.2
Atallah, M.3
Taskiran, C.4
Lin, E.5
Delp, E.6
-
13
-
-
84937814312
-
High capacity despite better steganalysis (F5-A steganographic algorithm)
-
th International Workshop on Information Hiding. Springer-Verlag, New York
-
th International Workshop on Information Hiding, LNCS, Vol. 2137. Springer-Verlag, New York, pp. 289-302, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
14
-
-
14844285173
-
Some notes on steganography
-
posted on
-
R. Crandall, "Some Notes on Steganography", posted on Steganography Mailing List, http://os.inf.tu-dresden.de/̃westfeld/crandall. pdf, 1998.
-
(1998)
Steganography Mailing List
-
-
Crandall, R.1
-
15
-
-
0019148101
-
Coding for channel with random parameters
-
S.I. Gelfand and M.S. Pinsker, "Coding for channel with random parameters," Probl. Pered. Inform. (Probl. Inform. Transm.), vol. 9(1), pp. 19-31, 1980.
-
(1980)
Probl. Pered. Inform. (Probl. Inform. Transm.)
, vol.9
, Issue.1
, pp. 19-31
-
-
Gelfand, S.I.1
Pinsker, M.S.2
-
16
-
-
0020752342
-
Writing on dirty paper
-
May
-
M. H. M. Costa, "Writing on dirty paper," IEEE Trans. Inform. Theory, vol. IT-29(3), pp. 439-441, May 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, Issue.3
, pp. 439-441
-
-
Costa, M.H.M.1
-
17
-
-
0020821981
-
On the capacity of computer memory with defects
-
C. Heegard and A. El-Gamal, "On the Capacity of Computer Memory with Defects," IEEE Trans. Inform. Theory, vol. IT-29, pp. 731-739, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.IT-29
, pp. 731-739
-
-
Heegard, C.1
El-Gamal, A.2
-
18
-
-
0036611624
-
Nested linear/lattice codes for structured multiterminal binning
-
R. Zamir, S. Shamai, U. Erez, "Nested Linear/Lattice Codes for Structured Multiterminal Binning", IEEE Trans. Inf. Th., vol. 48(6), pp. 1250-1276, 2002.
-
(2002)
IEEE Trans. Inf. Th.
, vol.48
, Issue.6
, pp. 1250-1276
-
-
Zamir, R.1
Shamai, S.2
Erez, U.3
-
19
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
March
-
P. Moulin and J. A. O'Sullivan, "Information-Theoretic Analysis of Information Hiding," IEEE Trans. on Inf. Th, vol. 49(3), pp. 563-593, March 2003.
-
(2003)
IEEE Trans. on Inf. Th
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
20
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. Wornell, Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding", IEEE Trans, on Inf. Th., vol. 47(4), May 2001.
-
(2001)
IEEE Trans, on Inf. Th.
, vol.47
, Issue.4
-
-
Chen, B.1
Wornell, G.2
-
21
-
-
38249018454
-
Applications of coding theory to communication combinatorial problems
-
G. Cohen, "Applications of coding theory to communication combinatorial problems. Discrete Math. 83 (2-3), pp. 237-248, 1990.
-
(1990)
Discrete Math.
, vol.83
, Issue.2-3
, pp. 237-248
-
-
Cohen, G.1
-
22
-
-
0038137157
-
Random krylov spaces over finite fields
-
R.P. Brent, S. Gao, A.G.B. Lauder, "Random Krylov Spaces Over Finite Fields", SIAMJ. Discrete Math. 16(2), pp. 276-287, 2003.
-
(2003)
SIAMJ. Discrete Math.
, vol.16
, Issue.2
, pp. 276-287
-
-
Brent, R.P.1
Gao, S.2
Lauder, A.G.B.3
-
23
-
-
84860098958
-
Writing on wet paper
-
preparation for Supplement on Secure Media II
-
J. Fridrich, M. Goljan, D. Soukal, and P. Lisoněk, "Writing on Wet Paper", in preparation for IEEE Trans. Sig. Proc., Supplement on Secure Media II, 2004.
-
(2004)
IEEE Trans. Sig. Proc.
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
Lisoněk, P.4
-
24
-
-
0034387168
-
On the rank of random matrices
-
C. Cooper, "On the Rank of Random Matrices", Random Structures and Algorithms 16(2), pp. 209-232, 2000.
-
(2000)
Random Structures and Algorithms
, vol.16
, Issue.2
, pp. 209-232
-
-
Cooper, C.1
-
25
-
-
84988216913
-
Solving large sparse linear systems over finite fields
-
Menezes, A.J., and Vanstone, S.A. (eds.): Advances in Cryptology - CRYPTO '90, Springer Verlag
-
B.A. LaMacchia and A.M. Odlyzko, "Solving Large Sparse Linear Systems over Finite Fields", In: Menezes, A.J., and Vanstone, S.A. (eds.): Advances in Cryptology - CRYPTO '90, Springer Verlag, Lecture Notes in Computer Science vol. 537, pp. 109-133, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 109-133
-
-
Lamacchia, B.A.1
Odlyzko, A.M.2
-
26
-
-
0022583143
-
Solving sparse linear equations over finite fields
-
D.H. Wiedemann, "Solving Sparse Linear Equations Over Finite Fields", IEEE Transactions on Information Theory, IT-32(1), pp. 54-62, 1986.
-
(1986)
IEEE Transactions on Information Theory
, vol.IT-32
, Issue.1
, pp. 54-62
-
-
Wiedemann, D.H.1
-
29
-
-
1442360452
-
Quantitative steganalysis: Estimating secret message length
-
Special issue on Multimedia Security
-
J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, "Quantitative Steganalysis: Estimating Secret Message Length", ACM Multimedia Systems Journal. Special issue on Multimedia Security, 9(3), 288-302, 2003.
-
(2003)
ACM Multimedia Systems Journal
, vol.9
, Issue.3
, pp. 288-302
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
30
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
th International Workshop. Springer-Verlag, Berlin Heidelberg New York
-
th International Workshop. Lecture Notes in Computer Science, Vol. 2578. Springer-Verlag, Berlin Heidelberg New York, pp. 340-354, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 340-354
-
-
Farid, H.1
Siwei, L.2
-
31
-
-
0003290690
-
Steganalysis using image quality metrics
-
Electronic Imaging, San Jose, CA, Jan.
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using Image Quality Metrics", SPIE Security and Watermarking of Multimedia Contents II, Electronic Imaging, San Jose, CA, Jan. 2001.
-
(2001)
SPIE Security and Watermarking of Multimedia Contents II
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
32
-
-
33847714243
-
Estimation of primary quantization matrix in double compressed JPEG images
-
Cleveland, OH, August 5-8
-
J. Lukáš and J. Fridrich, "Estimation of Primary Quantization Matrix in Double Compressed JPEG Images", Proc. of DFRWS 2003, Cleveland, OH, August 5-8, 2003.
-
(2003)
Proc. of DFRWS 2003
-
-
Lukáš, J.1
Fridrich, J.2
-
33
-
-
0033688392
-
Semi-fragile watermarking for authenticating JPEG visual content
-
Electronic Imaging 2000, San Jose, CA
-
Ching-Yung Lin and Shih-Fu Chang, "Semi-Fragile Watermarking for Authenticating JPEG Visual Content", SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, Electronic Imaging 2000, San Jose, CA, pp. 140-151, 2000.
-
(2000)
SPIE Security and Watermarking of Multimedia Contents II
, vol.3971
, pp. 140-151
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
34
-
-
35048819204
-
Model based steganography
-
T. Kalker, I.J. Cox, Yong Man Ro (Eds.), International Workshop on Digital Watermarking. Springer Verlag New York
-
P. Sallee, "Model Based Steganography", In: T. Kalker, I.J. Cox, Yong Man Ro (Eds.), International Workshop on Digital Watermarking, Lecture Notes in Computer Science, Vol. 2939. Springer Verlag New York, pp. 154-167, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
35
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington, DC
-
N. Provos, Defending Against Statistical Steganalysis, 10th USENIX Security Symposium. Washington, DC 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Provos, N.1
-
36
-
-
8844265283
-
Searching for the stego key
-
Electronic Imaging 2004, San Jose
-
J. Fridrich, M. Goljan, and D. Soukal, "Searching for the Stego Key", SPIE Security and Watermarking of Multimedia Contents VI, Electronic Imaging 2004, San Jose, 2004.
-
(2004)
SPIE Security and Watermarking of Multimedia Contents VI
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
|