-
1
-
-
0001217738
-
The prisoners problem and the subliminal channel
-
G. Simmons, "The prisoners problem and the subliminal channel," CRYPTO, pp. 51-67, 1983.
-
(1983)
CRYPTO
, pp. 51-67
-
-
Simmons, G.1
-
2
-
-
0001931684
-
A survay of steganographic techniques
-
S. Katzenbeisser and F. Petitcolas (Eds.): Artech House, Norwood, MA
-
N. F. Johnson and S. Katzenbeisser, "A survay of steganographic techniques," in S. Katzenbeisser and F. Petitcolas (Eds.): Information Hiding, pp 43-78. Artech House, Norwood, MA., 2000.
-
(2000)
Information Hiding
, pp. 43-78
-
-
Johnson, N.F.1
Katzenbeisser, S.2
-
3
-
-
84957868624
-
An information-theoretic model for steganography
-
vol. LNCS 1525
-
C. Cachin, "An information-theoretic model for steganography," 2nd International Workshop Information Hiding, vol. LNCS 1525, pp. 306-318, 1998.
-
(1998)
2nd International Workshop Information Hiding
, pp. 306-318
-
-
Cachin, C.1
-
4
-
-
0000442741
-
Modeling the security of steganographic systems
-
April
-
J. Zollner, H. Federrath, H. Klimant, A. Pfitzman, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the security of steganographic systems," 2nd Information Hiding Workshop, pp. 345-355, April 1998.
-
(1998)
2nd Information Hiding Workshop
, pp. 345-355
-
-
Zollner, J.1
Federrath, H.2
Klimant, H.3
Pfitzman, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
6
-
-
1442360452
-
Quantitive steganalysis of digital images: Estimating the secret message lenght
-
J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, "Quantitive steganalysis of digital images: Estimating the secret message lenght," ACM Multimedia Systems Journal, Special issue on Multimedia Security, 2003.
-
(2003)
ACM Multimedia Systems Journal, Special Issue on Multimedia Security
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
8
-
-
0038188743
-
On sequential watermark detection
-
April
-
_, "On sequential watermark detection," IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 1034-1044, April 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 1034-1044
-
-
-
9
-
-
84870448988
-
-
F. Collin, "Encryptpic," http://www.winsite.com/bin/Info? 500000033023.
-
Encryptpic
-
-
Collin, F.1
-
10
-
-
84870404878
-
-
G. Pulcini, "Stegotif," http://www.geocities.com/Silicon Valley/9210/gfree.html.
-
Stegotif
-
-
Pulcini, G.1
-
13
-
-
0036450555
-
On steganalysis of random lsb embedding in continuous-tone images
-
September
-
S. Dumitrescu, X. Wu, and N. Memon, "On steganalysis of random lsb embedding in continuous-tone images," IEEE International Conference on Image Processing, ROchester, New York., September 2002.
-
(2002)
IEEE International Conference on Image Processing, Rochester, New York
-
-
Dumitrescu, S.1
Wu, X.2
Memon, N.3
-
14
-
-
0035472155
-
Detecting lsb steganography in color and grayscale images
-
October-November
-
J. Fridrich, M. Goljan, and R. Du, "Detecting lsb steganography in color and grayscale images," IEEE Multimedia Special Issue on Security, pp. 22-28, October-November 2001.
-
(2001)
IEEE Multimedia Special Issue on Security
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
15
-
-
0005004508
-
Steganalysis of lsb encoding in color images
-
J. Fridrich, R. Du, and L. Meng, "Steganalysis of lsb encoding in color images," ICME 2000, New York, NY, USA.
-
ICME 2000, New York, NY, USA
-
-
Fridrich, J.1
Du, R.2
Meng, L.3
-
18
-
-
34249307224
-
-
M. Kwan, "Gifshuffle," http://www.darkside.com.au/gifshuffle/.
-
Gifshuffle
-
-
Kwan, M.1
-
20
-
-
0001217283
-
Steganalysis of images created using current steganography software
-
David Aucsmith (Eds.)
-
N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in David Aucsmith (Eds.): Information Hiding, LNCS 1525, Springer-Verlag Berlin Heidelberg., pp. 32-47, 1998.
-
(1998)
Information Hiding, LNCS 1525, Springer-Verlag Berlin Heidelberg
, pp. 32-47
-
-
Johnson, N.F.1
Jajodia, S.2
-
22
-
-
84880360661
-
-
D. Upham, "Jpeg-jsteg," ftp://ftp.funet.fi/pub/crypt/ steganography/jpeg-jstegv4.diff.gz.
-
Jpeg-jsteg
-
-
Upham, D.1
-
23
-
-
84937814312
-
F5-a steganographic algorithm: High capacity despite better steganalysis
-
A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," Information Hiding. 4th International Workshop, p. 289-302, 2001.
-
(2001)
Information Hiding. 4th International Workshop
, pp. 289-302
-
-
Westfeld, A.1
-
24
-
-
0003290690
-
Steganalysis using image quality metrics
-
Feruary
-
I. Avcibas, N. Memon, and B. sankur, "Steganalysis using image quality metrics." Security and Watermarking of Multimedia Contents, San Jose, Ca., Feruary 2001.
-
(2001)
Security and Watermarking of Multimedia Contents, San Jose, Ca.
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
26
-
-
0038343416
-
Steganalysis using image quality metrics
-
January
-
_, "Steganalysis using image quality metrics." IEEE transactions on Image Processing, January 2003.
-
(2003)
IEEE Transactions on Image Processing
-
-
-
27
-
-
0041308536
-
Detecting hidden messages using higher-order statistics and support vector machines
-
H. Farid and S. Lyu, "Detecting hidden messages using higher-order statistics and support vector machines," 5th International Workshop on Information Hiding., 2002.
-
(2002)
5th International Workshop on Information Hiding
-
-
Farid, H.1
Lyu, S.2
-
29
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. Burges, "A tutorial on support vector machines for pattern recognition," Data Mining and Knowledge Discovery., pp. 2:121-167, 1998.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, pp. 121-167
-
-
Burges, C.1
|