-
1
-
-
21844447330
-
-
Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, Singapore
-
M. Kharrazi, H. T. Sencar, and N. Memon, Image Steganography: Concepts and Practice, Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, Singapore (2004).
-
(2004)
Image Steganography: Concepts and Practice
-
-
Kharrazi, M.1
Sencar, H.T.2
Memon, N.3
-
2
-
-
33645696636
-
"Image steganalysis with binary similarity measures"
-
I. Avcibas, M. Kharrazi, N. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," EURASIP J. Appl. Signal Process. 2005(17), 2749-2757 (2005).
-
(2005)
EURASIP J. Appl. Signal Process.
, vol.2005
, Issue.17
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazi, M.2
Memon, N.3
Sankur, B.4
-
3
-
-
0041308536
-
"Detecting hidden messages using higher-order statistics and support vector machines"
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop on Information Hiding (2002).
-
(2002)
Proc. 5th Int. Workshop on Information Hiding
-
-
Lyu, S.1
Farid, H.2
-
4
-
-
8844256156
-
"Steganalysis using color wavelet statistics and one-class support vector machines"
-
S. Lyu and H. Farid, "Steganalysis using color wavelet statistics and one-class support vector machines," Proc. SPIE 5306, 35-45 (2004).
-
(2004)
Proc. SPIE
, vol.5306
, pp. 35-45
-
-
Lyu, S.1
Farid, H.2
-
5
-
-
20444372785
-
"Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes"
-
in Toronto
-
J. Fridrich, "Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes," in Proc. 6th Information Hiding Workshop, Toronto (2004).
-
(2004)
Proc. 6th Information Hiding Workshop
-
-
Fridrich, J.1
-
6
-
-
33644999904
-
"Steganalysis using higher order image statistics"
-
S. Lyu and H. Farid, "Steganalysis using higher order image statistics," IEEE Trans. Inf. Forens. Secur 1(1), 111-119 (2006).
-
(2006)
IEEE Trans. Inf. Forens. Secur.
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
7
-
-
33847607712
-
"Digital image forensics for identifying computer generated and digital camera images"
-
S. Dehnie, H. T. Sencar, and N. Memon, "Digital image forensics for identifying computer generated and digital camera images," in Proc. Int. Conf. on Image Processing (2006).
-
(2006)
Proc. Int. Conf. on Image Processing
-
-
Dehnie, S.1
Sencar, H.T.2
Memon, N.3
-
8
-
-
13244253845
-
"How realistic is photorealistic?"
-
S. Lyu and H. Farid, "How realistic is photorealistic?" IEEE Trans. Signal Process. 53(2), 845-850 (2005).
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 845-850
-
-
Lyu, S.1
Farid, H.2
-
9
-
-
84875599869
-
-
http://www.programmersheaven.com/zone10/cat453/15260.htm.
-
-
-
-
10
-
-
0003290690
-
"Steganalysis using image quality metrics"
-
in San Jose, CA
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," in Proc. Security and Watermarking of Multimedia Contents, San Jose, CA (2001).
-
(2001)
Proc. Security and Watermarking of Multimedia Contents
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
11
-
-
0003710380
-
"LIBSVM: A library for support vector machines"
-
Software available at
-
C.-C. Chang and C.-J. Lin, "LIBSVM: a library for support vector machines," (2001). Software available at http://www.csie.ntu.edu.tw/ ~cjlin/libsvm.
-
(2001)
-
-
Chang, C.-C.1
Lin, C.-J.2
-
12
-
-
0345438685
-
"Roc graphs: Notes and practical considerations for researchers"
-
T. Fawcett, "Roc graphs: notes and practical considerations for researchers," http://www.hpl.hp.com/personal/Tom_Fawcett/papers/ ROC101.pdf.
-
-
-
Fawcett, T.1
-
14
-
-
0005105932
-
"F5-a steganographic algorithm: High capacity despite better steganalysis"
-
A. Westfeld, "F5-a steganographic algorithm: high capacity despite better steganalysis," in Proc. 4th Int. Workshop on Information Hiding (2001).
-
(2001)
Proc. 4th Int. Workshop on Information Hiding
-
-
Westfeld, A.1
-
16
-
-
14844321910
-
"Perturbed quantization steganography with wet paper codes"
-
in Magdeburg, Germany
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography with wet paper codes," in Proc. ACM Multimedia Workshop, Magdeburg, Germany (2004).
-
(2004)
Proc. ACM Multimedia Workshop
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
17
-
-
0003405432
-
-
2nd ed., Prentice Hall, Englewood Cliffs, NJ
-
B. W. Kernighan and D. M. Ritchie, The C programming language, 2nd ed., Prentice Hall, Englewood Cliffs, NJ (1988).
-
(1988)
The C Programming Language
-
-
Kernighan, B.W.1
Ritchie, D.M.2
-
18
-
-
84875580675
-
-
Encryptpic
-
F. Collin, Encryptpic, http://www.winsite.com/bin/Info?500000033023.
-
-
-
Collin, F.1
-
19
-
-
84875580410
-
-
Stegotif
-
G. Pulcini, Stegotif, http://www.geocities.com/SiliconValley/9210/ gfree.html.
-
-
-
Pulcini, G.1
-
20
-
-
84875602991
-
-
"Hide 2.1"
-
Toby Sharp, "Hide 2.1," http://www.sharpthoughts.org (2001).
-
(2001)
-
-
Sharp, T.1
-
21
-
-
1542648229
-
"Steganography in JPEG 2000 compressed images"
-
P.-C. Su and C.-C. J. Kuo, "Steganography in JPEG 2000 compressed images," IEEE Trans. Consum. Electron. 49(4), 824-832 (2003).
-
(2003)
IEEE Trans. Consum. Electron.
, vol.49
, Issue.4
, pp. 824-832
-
-
Su, P.-C.1
Kuo, C.-C.J.2
|