-
1
-
-
0038343416
-
Steganalysis using image quality metrics
-
Feb 2003
-
Avcibax I., N. Memon and B. Sankur, 2003."Steganalysis using image quality metrics" IEEE Transactions on Image Processing, vol. 12, no. 2, Feb 2003, pp. 221-230
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 221-230
-
-
Avcibax, I.1
Memon, N.2
Sankur, B.3
-
2
-
-
0242527439
-
Capacity is the wrong paradigm
-
Virginia Beach, Virginia
-
Ira S. Moskowitz, LiWu Chang, Richard E. Newman 2002. Capacity is the wrong paradigm. In Proceedings of the 2002 workshop on New security paradigms, pp.114-126, Virginia Beach, Virginia
-
(2002)
Proceedings of the 2002 Workshop on New Security Paradigms
, pp. 114-126
-
-
Moskowitz, I.S.1
Chang, L.2
Newman, R.E.3
-
3
-
-
20444372785
-
Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
Toronto, Canada, May 23-25, 2004
-
Fridrich, J., "Feature Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes" 2004. In Proc. 6th Information Hiding Workshop, Toronto, Canada, May 23-25, 2004.
-
(2004)
Proc. 6th Information Hiding Workshop
-
-
Fridrich, J.1
-
4
-
-
1442360452
-
Quantitative steganalysis of digital images: Estimating the secret message length
-
2003
-
Fridrich, J., Goljan, M., Hogea, D., Soukal, D., "Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length" 2003. In ACM Multimedia Systems Journal, Special issue on Multimedia Security, Vol. 9(3), 2003, pp. 288-302
-
(2003)
ACM Multimedia Systems Journal, Special Issue on Multimedia Security
, vol.9
, Issue.3
, pp. 288-302
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
5
-
-
2642549992
-
Attacking the outguess
-
Juan-les-Pins, France, December 6, 2002
-
Fridrich, J., Goljan, M., Hogea, D., 2002. "Attacking the Outguess", Proc. of the ACM Workshop on Multimedia and Security, Juan-les-Pins, France, December 6, 2002.
-
(2002)
Proc. of the ACM Workshop on Multimedia and Security
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
6
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Noordwijkerhout, The Netherlands, 7-9 October 2002
-
Fridrich, J., Goljan, M., Hogea, D., 2002. "Steganalysis of JPEG Images: Breaking the F5 Algorithm", 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, 7-9 October 2002, pp. 310-323.
-
(2002)
5th Information Hiding Workshop
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
7
-
-
0141624421
-
Steganalysis based on JPEG compatiblity steganalysis
-
Denver, CO, August 20-24, 2001
-
Fridrich, J., Goljan, M., Du R., 2000. "Steganalysis based on JPEG Compatiblity Steganalysis", Special session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001, pp. 275-280.
-
(2000)
Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
8
-
-
25844475939
-
-
Derek Upham
-
Derek Upham, 1999. "Jsteg Steganographic Algorithm" Available on the internet ftp://ftp.funet.fi/pub/crypt/steganography/
-
(1999)
Jsteg Steganographic Algorithm
-
-
-
9
-
-
84904224992
-
Steganalysis of images created using current Steganographic software
-
D. Aucsmith, ed. Springer
-
Johnson, N. F., Jajodia, S., 1998. Steganalysis of images created using current Steganographic software. In: D. Aucsmith, ed. 2nd International Workshop on Information Hiding April 14-17, 1998, Portland, Oregon, USA. Springer, 273-289.
-
(1998)
2nd International Workshop on Information Hiding April 14-17, 1998, Portland, Oregon, USA
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
10
-
-
33845289479
-
A prototype implementation of grey level modification steganography
-
IECON 04, Korea
-
Khan, M., Potdar V, Chang E., 'A prototype implementation of Grey Level Modification Steganography', in Proceedings of the 30th Annual Conference of the IEEE Industrial Electronics Society, IECON 04, Korea.
-
Proceedings of the 30th Annual Conference of the IEEE Industrial Electronics Society
-
-
Khan, M.1
Potdar, V.2
Chang, E.3
-
11
-
-
0033716537
-
High capacity image steganographic model
-
Lee, Y. K. & Chen, L. H., 2000. High Capacity Image Steganographic Model. In IEE Proceedings Vision, Image and Signal Processing, vol. 147 no. 3, pp. 288-294.
-
(2000)
IEE Proceedings Vision, Image and Signal Processing
, vol.147
, Issue.3
, pp. 288-294
-
-
Lee, Y.K.1
Chen, L.H.2
-
12
-
-
35248875661
-
A steganographic embedding undetectable by JPEG compatibility steganalysis
-
Petitcolas (Ed.): Noordwijkerhout, The Netherlands, October 7-9, 2002 LNCS Springer Verlag
-
Newman, R. E., Moskowitz, I. S., Chang, L., Brahmadesam M. M., 2002 "A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis". In: Petitcolas (Ed.): Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002 LNCS Springer Verlag 258-277.
-
(2002)
Information Hiding, 5th International Workshop, IH 2002
, pp. 258-277
-
-
Newman, R.E.1
Moskowitz, I.S.2
Chang, L.3
Brahmadesam, M.M.4
-
13
-
-
33845311892
-
Covering encrypted information using images
-
Tunis, Tunisia, July 25-27
-
Potdar V, Chang E. 'Covering Encrypted Information using Images', European and Mediterranean Conference on Information Systems (EMICS2004), Tunis, Tunisia, July 25-27, 2004
-
(2004)
European and Mediterranean Conference on Information Systems (EMICS2004)
-
-
Potdar, V.1
Chang, E.2
-
15
-
-
20544460998
-
Grey level modification steganography for secret communication
-
Berlin, Germany, June 24-26
-
Potdar V, Chang E. 'Grey Level Modification Steganography for Secret Communication', 2nd IEEE International Conference on Industrial Informatics (INDIN2004), Berlin, Germany, June 24-26, 2004
-
(2004)
2nd IEEE International Conference on Industrial Informatics (INDIN2004)
-
-
Potdar, V.1
Chang, E.2
-
18
-
-
0001217738
-
The prisoner's problem and the subliminal channel
-
D. Chaum, ed., Plenum Press, 1984
-
Simmons, G. J., 1984. "The prisoner's problem and the subliminal channel" In Advances in Cryptology - CRYPTO '83", D. Chaum, ed., Plenum Press, 1984, 51-67.
-
(1984)
Advances in Cryptology - CRYPTO '83
, pp. 51-67
-
-
Simmons, G.J.1
-
19
-
-
0141527376
-
Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images
-
Soo-Chang, P, Jing-Ming, G., 2003. Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images. In IEEE Transactions on Circuits and Systems for Video Technology. 13(8), 867-884.
-
(2003)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.13
, Issue.8
, pp. 867-884
-
-
Soo-Chang, P.1
Jing-Ming, G.2
-
20
-
-
84937814312
-
High capacity despite better steganalysis (F5-A steganographic algorithm)
-
Moskowitz, I.S. (eds.): LNCS, Vol. 2137. Springer-Verlag, New York, 2001
-
Westfeld, A., 2001. "High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm)", In: Moskowitz, I.S. (eds.): 4th International Workshop on Information Hiding, LNCS, Vol. 2137. Springer-Verlag, New York, pp. 289-302, 2001.
-
(2001)
4th International Workshop on Information Hiding
, pp. 289-302
-
-
Westfeld, A.1
-
21
-
-
84892764719
-
Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - And Some Lessons Learned
-
Springer-Verlag, Berlin, 2000, pp.
-
Westfeld, A., Pfitzmann A., 2000. "Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools - and Some Lessons Learned". Lecture Notes in Computer Science, vol.1768, Springer-Verlag, Berlin, 2000, pp.
-
(2000)
Lecture Notes in Computer Science
, vol.1768
-
-
Westfeld, A.1
Pfitzmann, A.2
-
22
-
-
0037410595
-
A Steganographic method for images by pixel-value differencing
-
Wu, D.C. and Tsai, W.H., 2003. A Steganographic method for images by pixel-value differencing. In Pattern Recognition Letters. 24(9-10), pp. 1613-1626.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
|