-
1
-
-
0032072279
-
Image-adaptive watermarking using visual models
-
Christone, I, Podilchuk, and Wenjun Zeng : Image-Adaptive Watermarking Using Visual Models. IEEE Journal Select. Areas Commun, vol.16, pp.525-539, 1998.
-
(1998)
IEEE Journal Select. Areas Commun
, vol.16
, pp. 525-539
-
-
Christone, I.1
Podilchuk2
Zeng, W.3
-
2
-
-
0001849187
-
Attack on steganographic systems
-
Proc. Information Hiding Workshop
-
A. Westfield, A. Pfitzmann: Attack on steganographic systems. In: Proc. Information Hiding Workshop. Volume 1768 of Springer LNCS. (1999) 61-76.
-
(1999)
Springer LNCS
, vol.1768
, pp. 61-76
-
-
Westfield, A.1
Pfitzmann, A.2
-
3
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Proc. Information Hiding Workshop
-
N.F. Johnson, S. Jajodia: Steganalysis of Images Created Using Current Steganography Software. In: Proc. Information Hiding Workshop. Volume 1525 of Springer LNCS. (1998) 32-47.
-
(1998)
Springer LNCS
, vol.1525
, pp. 32-47
-
-
Johnson, N.F.1
Jajodia, S.2
-
4
-
-
0005004508
-
Steganalysis of LSB encoding in color images
-
NYC,july 31-Aug. 2,USA
-
J. Fridrich, R. Du, M. Long: Steganalysis of LSB Encoding in Color Images. Proc.of ICME 2000,NYC,july 31-Aug. 2,USA. 355.
-
Proc.of ICME 2000
, pp. 355
-
-
Fridrich, J.1
Du, R.2
Long, M.3
-
5
-
-
0034787093
-
Reliable dectection of LSB steganography in color and grayscale images
-
Ottawa,Oct.5
-
J. Fridrich, M. Goljan, R. Du: Reliable Dectection of LSB Steganography in Color and Grayscale Images. Pro. of ACM Workshop on Multimedia and Security, Ottawa,Oct.5, (2001) 27-30.
-
(2001)
Pro. of ACM Workshop on Multimedia and Security
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
6
-
-
0242665592
-
High-order statistical steganalysis of palette images
-
Proc. Security and Watermarking of Multimedia Contents V
-
J. Fridrich, M. Goljan, D. Soukal: High-order Statistical Steganalysis of Palette Images. Proc. Security and Watermarking of Multimedia Contents V. Vol. 5020 of SPIE. (2003) 178-190
-
(2003)
SPIE
, vol.5020
, pp. 178-190
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
7
-
-
0035766166
-
Steganalysis based on JPEG compatibility
-
Proc. Multimedia Systems and Applications IV
-
J. Fridrich, M. Goljan, R. Du: Steganalysis Based on JPEG Compatibility. Proc. Multimedia Systems and Applications IV. Vol. 4518 of SPIE. (2002) 275-280
-
(2002)
SPIE
, vol.4518
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
8
-
-
0034769448
-
Intensity histogram steganalysis in BPCS steganography
-
Proc. Security and Watermarking of Multimedia Contents
-
M. Niimi, R.O. Eason, H. Noda, E. Kwaguchi: Intensity histogram steganalysis in BPCS steganography. Proc. Security and Watermarking of Multimedia Contents. Volume 4314 of SPIE. (2001) 555-564
-
(2001)
SPIE
, vol.4314
, pp. 555-564
-
-
Niimi, M.1
Eason, R.O.2
Noda, H.3
Kwaguchi, E.4
-
9
-
-
26444615215
-
Kernal fisher disriminant for steganlysis of JPEG hiding
-
Proc. Security, Steganography and Watermarking of Multimedia Contents VI
-
J.J. Harmsen, W.A. Pearlman: Kernal Fisher Disriminant for steganlysis of JPEG Hiding. Proc. Security, Steganography and Watermarking of Multimedia Contents VI. Vol. 5306 of SPIE. (2004)
-
(2004)
SPIE
, vol.5306
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
10
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5
-
Proc. Information Hiding Workshop
-
J. Fridrich, M. Goljan, D. Hogea: Steganalysis of JPEG Images: Breaking the F5. In: Proc. Information Hiding Workshop. Volume 2578 of Springer LNCS. (2003)
-
(2003)
Springer LNCS
, vol.2578
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
11
-
-
0242576337
-
Active steganalysis of sequential steganography
-
Proc. Security and Watermarking of Multimedia Contents V
-
S.Trivedi, R. Chandramouli: Active Steganalysis of Sequential Steganography. Proc. Security and Watermarking of Multimedia Contents V. Vol. 5020 of SPIE. (2003) 123-130
-
(2003)
SPIE
, vol.5020
, pp. 123-130
-
-
Trivedi, S.1
Chandramouli, R.2
-
13
-
-
0004064292
-
Detecting steganographic message in digital images
-
Dartmouth College
-
H. Fraid: Detecting Steganographic Message in Digital Images. Technical Report, TR2001-412, Dartmouth College, (2001)
-
(2001)
Technical Report
, vol.TR2001-412
-
-
Fraid, H.1
-
14
-
-
26444569034
-
Detecting hidden message using higher-order statistics and support vector machines
-
Rochester,NY
-
H. Fraid: Detecting Hidden Message using higher-order statistics and Support vector machines. Pro. of IEEE Int. on Image Processing, Rochester,NY, (2002)
-
(2002)
Pro. of IEEE Int. on Image Processing
-
-
Fraid, H.1
-
15
-
-
0038343416
-
Steganalysis using image quality metrics
-
I. Avcibas: Steganalysis Using Image Quality Metrics. In: IEEE Transactions on Image Processing. Vol. 12. No. 2. (2003) 231-239
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 231-239
-
-
Avcibas, I.1
-
16
-
-
70449625357
-
-
JPEG-Jsteg-V4. http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4. diff.gz
-
JPEG-Jsteg-V4
-
-
-
17
-
-
0020766544
-
Distribution of the two-dimensional DCT coefficients for images
-
June
-
R.C. Reininger, J.D. Gibson: Distribution of the Two-Dimensional DCT Coefficients for Images. In: IEEE Transaction On Communicatins. Vol. Com-31,No.6.June 1983
-
(1983)
IEEE Transaction on Communicatins
, vol.COM-31
, Issue.6
-
-
Reininger, R.C.1
Gibson, J.D.2
-
18
-
-
0027681636
-
Distribution shape of two-dimensional DCT coefficients of nature images
-
Oct
-
F. Müller: Distribution Shape of Two-Dimensional DCT Coefficients of Nature Images. In: Electron. Letter. Vol. 29, Oct, (1993) 1935-1936
-
(1993)
Electron. Letter
, vol.29
, pp. 1935-1936
-
-
Müller, F.1
-
19
-
-
0034298708
-
A mathematical analysis of the DCT coefficient distributions for images
-
E.Y. Lam, J.W. Goodman: A Mathematical Analysis of the DCT Coefficient Distributions for Images. In: IEEE Transactions on Image Processing. Vol. 9, No. 10. (2000)
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.10
-
-
Lam, E.Y.1
Goodman, J.W.2
-
21
-
-
26444522070
-
-
Wu Yi: Applied Statistics. Publishing Company of National University of Defence Technology, Chang Sha, 1995
-
(1995)
Applied Statistics
-
-
Yi, W.1
|