-
1
-
-
85027119338
-
-
D. Upham, http://ftp.funet.fi/pub/crypt/cypherpunks/steganography/jsteg/
-
-
-
Upham, D.1
-
2
-
-
84937814312
-
F5 - A steganographic algorithm: High capacity despite better steganalysis
-
A. Westfeld, "F5 - A steganographic algorithm: High capacity despite better steganalysis," Lecture Notes in Computer Science, vol.2137, pp.289-302, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
3
-
-
85084160704
-
Defending against statistical steganalysis
-
N. Provos, "Defending against statistical steganalysis," 10th USENIX Security Symposium, pp.323-336, 2001.
-
(2001)
10th USENIX Security Symposium
, pp. 323-336
-
-
Provos, N.1
-
4
-
-
0036029074
-
A communications approach to image steganography
-
J.J. Eggers, R. Bauml, and B. Girod, "A communications approach to image steganography," Proc. SPIE, vol.4675, pp.26-37, 2002.
-
(2002)
Proc. SPIE
, vol.4675
, pp. 26-37
-
-
Eggers, J.J.1
Bauml, R.2
Girod, B.3
-
6
-
-
32644446054
-
High performance JPEG steganography using quantization index modulation in DCT domain
-
H. Noda, M. Niimi, and E. Kawaguchi, "High performance JPEG steganography using quantization index modulation in DCT domain," Pattern Recognit. Lett., vol.27, pp.455-461, 2006.
-
(2006)
Pattern Recognit. Lett
, vol.27
, pp. 455-461
-
-
Noda, H.1
Niimi, M.2
Kawaguchi, E.3
-
7
-
-
0242497150
-
New methodology for breaking steganographic techniques for JPEGs
-
J. Fridrich, M. Goljan, and D. Hogea, "New methodology for breaking steganographic techniques for JPEGs," Proc. SPIE, vol.5020, pp.143-155, 2003.
-
(2003)
Proc. SPIE
, vol.5020
, pp. 143-155
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
8
-
-
34247168385
-
A method for embedding binary data into JPEG2000 bit streams based on the layer structure
-
K. Ando, H. Kobayashi, and H. Kiya, "A method for embedding binary data into JPEG2000 bit streams based on the layer structure," Proc. 2002 EURASIP EUSIPCO, vol.3, pp.89-92, 2002.
-
(2002)
Proc. 2002 EURASIP EUSIPCO
, vol.3
, pp. 89-92
-
-
Ando, K.1
Kobayashi, H.2
Kiya, H.3
-
9
-
-
0036959092
-
Application of bit-plane decomposition steganography to JPEG2000 encoded images
-
H. Noda, J. Spaulding, M.N. Shirazi, and E. Kawaguchi, "Application of bit-plane decomposition steganography to JPEG2000 encoded images," IEEE Signal Process. Lett., vol.9, no.12, pp.410-413, 2002.
-
(2002)
IEEE Signal Process. Lett
, vol.9
, Issue.12
, pp. 410-413
-
-
Noda, H.1
Spaulding, J.2
Shirazi, M.N.3
Kawaguchi, E.4
-
10
-
-
1542648229
-
Steganography in JPEG2000 compressed images
-
P.C. Su and C.C.J. Kuo, "Steganography in JPEG2000 compressed images," IEEE Trans. Consum. Electron., vol.49, no.4, pp.824-832, 2003.
-
(2003)
IEEE Trans. Consum. Electron
, vol.49
, Issue.4
, pp. 824-832
-
-
Su, P.C.1
Kuo, C.C.J.2
-
11
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
B. Chen and G.W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol.47, no.4, pp.1423-1443, 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
12
-
-
0036132948
-
An overview of JPEG 2000 still image compression standard
-
M. Rabbani and R. Joshi, "An overview of JPEG 2000 still image compression standard," Signal Process., Image Commun., vol.17, pp.3-48, 2002.
-
(2002)
Signal Process., Image Commun
, vol.17
, pp. 3-48
-
-
Rabbani, M.1
Joshi, R.2
|