-
1
-
-
0032680807
-
Information Hiding - A Survey
-
Petitcolas, F.A.P., Anderson, R.J., and Kuhn, M.G.: "Information Hiding - A Survey," Proc. IEEE, 87 (1999) 1062-1078
-
(1999)
Proc. IEEE
, vol.87
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
2
-
-
0036034444
-
Practical Steganalysis of Digital Images - State of the Art
-
San Jose, USA, Jan.
-
Fridrich, J., and Goljan, M.: "Practical Steganalysis of Digital Images - State of the Art," Proceedings of SPIE, Vol. 4675, San Jose, USA, Jan. 2002, 1-13
-
(2002)
Proceedings of SPIE
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
3
-
-
11844252006
-
Cyber Warfare - Steganography vs. Steganalysis
-
in press
-
Wang, H., and Wang, S.: "Cyber Warfare - Steganography vs. Steganalysis," Communication of the ACM (in press)
-
Communication of the ACM
-
-
Wang, H.1
Wang, S.2
-
6
-
-
0035472155
-
Detecting LSB Steganography in Color and Gray-Scale Images
-
Security, Oct.-Dec. issue
-
Fridrich, J., Goljan, M., and Du, R.: "Detecting LSB Steganography in Color and Gray-Scale Images," Magazine of IEEE Multimedia, Special Issue on Security, Oct.-Dec. issue (2001) 22-28
-
(2001)
Magazine of IEEE Multimedia
, Issue.SPEC. ISSUE
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
7
-
-
0034509108
-
Steganalysis of LSB Encoding in Color Images
-
Fridrich, J., Du, R., and Long, M.: "Steganalysis of LSB Encoding in Color Images," in 2000 IEEE Int. Conf. on Multimedia and Expo, vol. 3 (2000) 1279-1282
-
(2000)
2000 IEEE Int. Conf. on Multimedia and Expo
, vol.3
, pp. 1279-1282
-
-
Fridrich, J.1
Du, R.2
Long, M.3
-
8
-
-
0035766166
-
Steganalysis Based on JPEG Compatibility
-
Fridrich, J., Goljan, M., and Du, R.: Steganalysis Based on JPEG Compatibility. Proceedings of SPIE, Vol. 4518 (2001) 275-280
-
(2001)
Proceedings of SPIE
, vol.4518
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
9
-
-
2642549992
-
Attacking the OutGuess
-
Juan-les-Pins, France, December 6
-
Fridrich, J., Goljan, M., and Hogea, D.: Attacking the OutGuess. in Proc. of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6, 2002
-
(2002)
Proc. of the ACM Workshop on Multimedia and Security 2002
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
10
-
-
0347390531
-
Steganalysis of JPEG Image: Breaking the F5 Algorithm
-
Noordwijkerhout, Netherlands, Oct.
-
Fridrich, J., Goljan, M., and Hogea, D.: "Steganalysis of JPEG Image: Breaking the F5 Algorithm," in 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands, Oct. 2002
-
(2002)
5th International Workshop on Information Hiding
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
11
-
-
84937814312
-
F5 - A Steganographic Algorithm
-
Westfeld, A.: F5 - A Steganographic Algorithm. Lecture Notes in Computer Science, vol. 2137 (2001) 289-302
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
12
-
-
8844273575
-
Detecting Hidden Message Using Higher-Order Statistics and Support Vector Machines
-
Noordwijkerhout, The Netherlands, 7-9 October
-
Lyu, S., and Fand, H.: Detecting Hidden Message Using Higher-Order Statistics and Support Vector Machines. In 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 7-9 October 2002
-
(2002)
5th International Workshop on Information Hiding
-
-
Lyu, S.1
Fand, H.2
-
13
-
-
84957886834
-
Steganalysis and Game Equilibria
-
Ettinger, J.: Steganalysis and Game Equilibria. Lecture Notes in Computer Science, vol. 1525 (1998) 319-328
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 319-328
-
-
Ettinger, J.1
-
14
-
-
85084160704
-
Defending against Statistical Steganalysis
-
Washington, DC
-
Provos, N.: Defending against Statistical Steganalysis. In 10th USENIX Security Symposium, Washington, DC (2001)
-
(2001)
10th USENIX Security Symposium
-
-
Provos, N.1
-
15
-
-
11444265136
-
Steganographic Technique Capable of Withstanding RQP Analysis
-
Wang, S., Zhang, X., and Zhang, K.: Steganographic Technique Capable of Withstanding RQP Analysis. Journal of Shanghai University, 6 (2002) 273-277
-
(2002)
Journal of Shanghai University
, vol.6
, pp. 273-277
-
-
Wang, S.1
Zhang, X.2
Zhang, K.3
|