-
1
-
-
0032070303
-
On the limits of steganography
-
R.J. Anderson and F.A.P. Petitcolas, "On the Limits of Steganography," J. Selected Areas in Comm., vol. 16, no. 4, 1998, pp. 474-481.
-
(1998)
J. Selected Areas in Comm.
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
2
-
-
0032680807
-
Information hiding - A survey
-
F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, "Information Hiding - A Survey," Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062-1078.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
3
-
-
0036034444
-
Practical steganalysis - State of the art
-
SPIE Press
-
J. Fridrich and M. Goljan, "Practical Steganalysis - State of the Art," Proc. SPIE Photonics Imaging 2002, Security and Watermarking of Multimedia Contents, vol. 4675, SPIE Press, 2002, pp. 1-13.
-
(2002)
Proc. SPIE Photonics Imaging 2002, Security and Watermarking of Multimedia Contents
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
4
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
B. Chen and G.W. Wornell, "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Trans. Information Theory, vol. 47, no. 4, 2001, pp. 1423-1443.
-
(2001)
IEEE Trans. Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
5
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, 1998, pp. 26-34.
-
(1998)
Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
9
-
-
84904224992
-
Steganalysis of images created using current steganographic software
-
Springer-Verlag
-
N.F. Johnson and S. Jajodia, "Steganalysis of Images Created Using Current Steganographic Software," Proc. 2nd Int'l Workshop in Information Hiding, Springer-Verlag, 1998, pp. 273-289.
-
(1998)
Proc. 2nd Int'l Workshop in Information Hiding
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
10
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
IEEE Press
-
H. Farid, "Detecting Hidden Messages Using Higher-Order Statistical Models," Proc. Int'l Conf. Image Processing, IEEE Press, 2002.
-
(2002)
Proc. Int'l Conf. Image Processing
-
-
Farid, H.1
-
11
-
-
0041308536
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Springer-Verlag
-
S. Lyu and H. Farid, "Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines," Proc. 5th Int'l Workshop on Information Hiding, Springer-Verlag, 2002.
-
(2002)
Proc. 5th Int'l Workshop on Information Hiding
-
-
Lyu, S.1
Farid, H.2
-
12
-
-
85084160704
-
Defending against statistical steganalysis
-
Usenix Assoc.
-
N. Proves, "Defending Against Statistical Steganalysis," Proc. 10th Usenix Security Symp., Usenix Assoc., 2001, pp. 323-335.
-
(2001)
Proc. 10th Usenix Security Symp.
, pp. 323-335
-
-
Proves, N.1
-
13
-
-
0038675417
-
A fast and effective steganalytic technique against JSteg-like algorithms
-
ACM Press
-
T. Zhang and X. Ping, "A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms," Proc. 8th ACM Symp. Applied Computing, ACM Press, 2003.
-
(2003)
Proc. 8th ACM Symp. Applied Computing
-
-
Zhang, T.1
Ping, X.2
-
14
-
-
0003462953
-
-
Wiley Interscience
-
H.L.V. Trees, Detection, Estimation, and Modulation Theory, Part I: Detection, Estimation, and Linear Modulation Theory, Wiley Interscience, 2001.
-
(2001)
Detection, Estimation, and Modulation Theory, Part I: Detection, Estimation, and Linear Modulation Theory
-
-
Trees, H.L.V.1
-
16
-
-
2642549992
-
Attacking the outguess
-
ACM Press
-
J. Fridrich, M. Goljan, and D. Hogea, "Attacking the OutGuess," Proc, ACM Workshop Multimedia and Security 2002, ACM Press, 2002.
-
(2002)
Proc, ACM Workshop Multimedia and Security 2002
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
17
-
-
84937814312
-
F5 - A steganographic algorithm: High capacity despite better steganalysis
-
Springer-Verlag
-
A. Westfeld, "F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis," Proc. 4th Int'l Workshop Information Hiding, Springer-Verlag, 2001, pp. 289-302.
-
(2001)
Proc. 4th Int'l Workshop Information Hiding
, pp. 289-302
-
-
Westfeld, A.1
-
20
-
-
0039430385
-
Terror groups hide behind web encryption
-
Feb.
-
J. Kelley, "Terror Groups Hide Behind Web Encryption," USA Today, Feb. 2001, www.usatoday.com/life/cyber/tech/2001-02-05-binladen.htm.
-
(2001)
USA Today
-
-
Kelley, J.1
-
21
-
-
79955590156
-
Secret messages come in .wavs
-
Feb.
-
D. McCullagh, "Secret Messages Come in .Wavs," Wired News, Feb. 2001, www.wired.com/news/politics/0,1283,41861,00.html.
-
(2001)
Wired News
-
-
McCullagh, D.1
-
22
-
-
3042729016
-
Militants wire web with links to jihad
-
July
-
J. Kelley, "Militants Wire Web with Links to Jihad," USA Today, July 2002, www.usatoday.com/news/world/2002/07/10/web-terror-cover.htm.
-
(2002)
USA Today
-
-
Kelley, J.1
-
24
-
-
0001254670
-
Description of a new variable-length key, 64-bit block cipher (blowfish)
-
Springer-Verlag
-
B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," Fast Software Encryption, Cambridge Security Workshop Proc., Springer-Verlag, 1993, pp. 191-204.
-
(1993)
Fast Software Encryption, Cambridge Security Workshop Proc.
, pp. 191-204
-
-
Schneier, B.1
-
27
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
ACM Press
-
S. Axelsson, "The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection," Proc. 6th ACM Conf. Computer and Comm. Security, ACM Press, 1999, pp. 1-7.
-
(1999)
Proc. 6th ACM Conf. Computer and Comm. Security
, pp. 1-7
-
-
Axelsson, S.1
-
29
-
-
0040231044
-
Foiling the cracker: A survey of, and improvements to, password security
-
Usenix Assoc.
-
D. Klein, "Foiling the Cracker: A Survey of, and Improvements to, Password Security," Proc. 2nd Usenix Security Workshop, Usenix Assoc., 1990, pp. 5-14.
-
(1990)
Proc. 2nd Usenix Security Workshop
, pp. 5-14
-
-
Klein, D.1
|