-
1
-
-
1442357605
-
A mathematical framework for active steganalysis
-
R. Chandramouli, "A mathematical framework for active steganalysis," ACM Multimedia Syst. J., Special Issue Multimedia Watermarking, vol. 9, no. 3, pp. 303-311, 2003.
-
(2003)
ACM Multimedia Syst. J., Special Issue Multimedia Watermarking
, vol.9
, Issue.3
, pp. 303-311
-
-
Chandramouli, R.1
-
4
-
-
84860056965
-
-
Sep. [Online]
-
D. Lewis, Terrorists and Steganography Sep. 2001 [Online]. Available: http://www.linuxsecurity.com/content/view/110558/151/.
-
(2001)
Terrorists and Steganography
-
-
Lewis, D.1
-
5
-
-
84860046627
-
-
Sep. [Online]
-
B. Krebs, Danger of Image-Borne Viruses Looms Sep. 2004 [Online]. Available: http://www.washingtonpost.com/wp-dyn/articles/A45126-2004Sep23.html.
-
(2004)
Danger of Image-borne Viruses Looms
-
-
Krebs, B.1
-
6
-
-
0034509108
-
Steganalysis of LSB encoding in color images
-
presented at the, New York, Jul./Aug.
-
J. Fridrich, R. Du, and L. Meng, "Steganalysis of LSB encoding in color images," presented at the IEEE Conf. Multimedia Expo, New York, Jul./Aug. 2000.
-
(2000)
IEEE Conf. Multimedia Expo
-
-
Fridrich, J.1
Du, R.2
Meng, L.3
-
7
-
-
0035766166
-
Steganalysis based on JPEG compatibility
-
presented at the, Denver, CO, Aug.
-
J. Fridrich, M. Goljan, and R. Du, "Steganalysis based on JPEG compatibility," presented at the SPIE Multimedia Syst. Appl. IV, Denver, CO, Aug. 2001.
-
(2001)
SPIE Multimedia Syst. Appl. IV
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
8
-
-
0001849187
-
Attacks on steganographic systems
-
presented at the, Dresden, Germany, Sep./Oct.
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," presented at the 3rd Information Hiding Workshop, Dresden, Germany, Sep./Oct. 1999.
-
(1999)
3rd Information Hiding Workshop
-
-
Westfeld, A.1
Pfitzmann, A.2
-
9
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
Santa Clara, CA, Jan.
-
J. Harmsen and W. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. SPIE Security and Watermarking of Multimedia Contents V, Santa Clara, CA, Jan. 2003, vol. 5022.
-
(2003)
Proc. SPIE Security and Watermarking of Multimedia Contents V
, vol.5022
-
-
Harmsen, J.1
Pearlman, W.2
-
10
-
-
85084160704
-
Defending against statistical Steganalysis
-
presented at the, Dresden, Germany, Aug.
-
N. Provos, "Defending against statistical Steganalysis," presented at the 10th USENIX Security Symp., Dresden, Germany, Aug. 2001.
-
(2001)
10th USENIX Security Symp.
-
-
Provos, N.1
-
11
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
presented at the, Rochester, NY, Sep.
-
H. Farid, "Detecting hidden messages using higher-order statistical models," presented at the IEEE Int. Conf. Image Processing, Rochester, NY, Sep. 2002.
-
(2002)
IEEE Int. Conf. Image Processing
-
-
Farid, H.1
-
12
-
-
8844273575
-
Detecting hidden messages using higher-order statistics and support vector machines
-
presented at the, Noordwijkerhout, The Netherlands
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," presented at the 5th Int. Workshop Information Hiding, Noordwijkerhout, The Netherlands, 2002.
-
(2002)
5th Int. Workshop Information Hiding
-
-
Lyu, S.1
Farid, H.2
-
13
-
-
84954462362
-
Higher-order wavelet statistics and their application to digital forensics
-
presented at the, Madison, WI
-
H. Farid and S. Lyu, "Higher-order wavelet statistics and their application to digital forensics," presented at the IEEE Workshop on Statistical Analysis in Computer Vision, Madison, WI, 2003.
-
(2003)
IEEE Workshop on Statistical Analysis in Computer Vision
-
-
Farid, H.1
Lyu, S.2
-
14
-
-
8844256156
-
Steganalysis using color wavelet statistics and one-class support vector machines
-
presented at the, San Jose, CA
-
S. Lyu and H. Farid, "Steganalysis using color wavelet statistics and one-class support vector machines," presented at the SPIE Symp. Electronic Imaging, San Jose, CA, 2004.
-
(2004)
SPIE Symp. Electronic Imaging
-
-
Lyu, S.1
Farid, H.2
-
15
-
-
10044287017
-
Steganalysis based on image quality metrics - Differentiating between techniques
-
presented at the, Cannes, France, Oct.
-
I. Avcibas, B. Sankur, and N. Memon, "Steganalysis based on image quality metrics - Differentiating between techniques," presented at the IEEE Workshop on Multimedia, Cannes, France, Oct. 2001.
-
(2001)
IEEE Workshop on Multimedia
-
-
Avcibas, I.1
Sankur, B.2
Memon, N.3
-
16
-
-
0036448130
-
Image steganalysis with binary similarity measures
-
Rochester, NY, Jun.
-
I. Avcibas, B. Sankur, and K. Sayood, "Image Steganalysis with binary similarity measures," in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, Jun. 2002, vol. 3, pp. 645-648.
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 645-648
-
-
Avcibas, I.1
Sankur, B.2
Sayood, K.3
-
17
-
-
0036530067
-
Statistical evaluation of image quality measures
-
Apr.
-
_, "Statistical evaluation of image quality measures," J. Electron. Imaging, vol. 11, no. 2, pp. 206-223, Apr. 2002.
-
(2002)
J. Electron. Imaging
, vol.11
, Issue.2
, pp. 206-223
-
-
-
18
-
-
3042694369
-
Steganalysis of data hiding techniques in wavelet domain
-
Las Vegas, NV, Apr.
-
S. Liu, H. Yao, and W. Gao, "Steganalysis of data hiding techniques in wavelet domain," in Proc. Int. Conf. Information Technology: Coding Computing, Las Vegas, NV, Apr. 2004, vol. 1, pp. 751-754.
-
(2004)
Proc. Int. Conf. Information Technology: Coding Computing
, vol.1
, pp. 751-754
-
-
Liu, S.1
Yao, H.2
Gao, W.3
-
19
-
-
33845662489
-
Steganalysis based on wavelet texture analysis and neural network
-
presented at the, Shanghai, China, Oct.
-
S. Liu, H. Yao, and W. Gao, "Steganalysis based on wavelet texture analysis and neural network," presented at the 9th China Conf. Machine Learning, Shanghai, China, Oct. 2004.
-
(2004)
9th China Conf. Machine Learning
-
-
Liu, S.1
Yao, H.2
Gao, W.3
-
20
-
-
10044236714
-
Video steganalysis using collusion sensitivity
-
E. M. Carapezza, Ed., Orlando, FL, Apr.
-
U. Budhia and D. Kundur, "Video Steganalysis using collusion sensitivity," in Proc. SPIE: Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense, E. M. Carapezza, Ed., Orlando, FL, Apr. 2004, vol. 5403, pp. 210-221.
-
(2004)
Proc. SPIE: Sensors, Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense
, vol.5403
, pp. 210-221
-
-
Budhia, U.1
Kundur, D.2
-
21
-
-
1942425715
-
-
Norwood, MA: Artech House
-
G. Mohay, A. Anderson, B. Collie, O. de Vel, and R. McKemmish, Computer and Intmsion Forensics. Norwood, MA: Artech House, 2003.
-
(2003)
Computer and Intmsion Forensics
-
-
Mohay, G.1
Anderson, A.2
Collie, B.3
De Vel, O.4
McKemmish, R.5
-
22
-
-
13144275283
-
Statistical invisibility for collusion-resistant digital video watermarking
-
Feb.
-
K. Su, D. Kundur, and D. Hatzinakos, "Statistical invisibility for collusion-resistant digital video watermarking," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 43-51
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
23
-
-
13144281779
-
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance
-
Feb.
-
_, "Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 52-66, Feb. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 52-66
-
-
-
24
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.3
Shamoon, T.4
-
25
-
-
0032682054
-
Spread spectrum image Steganography
-
Aug.
-
L. Marvel, C. B. Jr., and C. Retter, "Spread spectrum image Steganography," IEEE Trans. Image Process., vol. 8, no. 8, pp. 1075-1083, Aug. 1999.
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.8
, pp. 1075-1083
-
-
Marvel, L.1
B. Jr., C.2
Retter, C.3
-
27
-
-
0037796443
-
-
Comput. Sci. Dept., Princeton Univ., Princeton, NJ, Tech. Rep. TR-585-98, Jul.
-
J. Kilian, F. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, Resistance of digital watermarks to collusive attacks Comput. Sci. Dept., Princeton Univ., Princeton, NJ, Tech. Rep. TR-585-98, Jul. 1998.
-
(1998)
Resistance of Digital Watermarks to Collusive Attacks
-
-
Kilian, J.1
Leighton, F.2
Matheson, L.3
Shamoon, T.4
Tarjan, R.5
Zane, F.6
-
28
-
-
0038527384
-
Anti-collusion finger-printing for multimedia
-
Apr.
-
W. Trappe, M. Wu, Z. Wang, and K. J. R. Liu, "Anti-collusion finger-printing for multimedia," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.3
Liu, K.J.R.4
-
29
-
-
20444373301
-
Collusion resistance of multimedia fingerprinting using orthogonal modulation
-
Jun.
-
Z. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Collusion resistance of multimedia fingerprinting using orthogonal modulation," IEEE Trans. Image Process., vol. 14, no. 6, pp. 804-821, Jun. 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.1
Wu, M.2
Zhao, H.3
Trappe, W.4
Liu, K.J.R.5
-
33
-
-
0032070303
-
On the limits of steganography
-
May, (Special Issue on Copyright and Privacy Protection)
-
R. Anderson and F. Petitcolas, "On the limits of steganography," IEEE J. Sel. Areas Commun., vol. 16, no. 2, pp. 474-481, May 1998, (Special Issue on Copyright and Privacy Protection).
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.2
, pp. 474-481
-
-
Anderson, R.1
Petitcolas, F.2
-
35
-
-
0242438899
-
A distributed detection framework for steganalysis
-
Los Angeles, CA, Nov.
-
R. Chandramouli and N. Memon, "A distributed detection framework for Steganalysis," in Proc. ACM Workshop on Multimedia Security, Los Angeles, CA, Nov. 2000, pp. 123-126.
-
(2000)
Proc. ACM Workshop on Multimedia Security
, pp. 123-126
-
-
Chandramouli, R.1
Memon, N.2
|