-
2
-
-
35248883259
-
Forensic examination of digital evidence: A guide for law enforcement
-
S. V. Hart, "Forensic examination of digital evidence: a guide for law enforcement," NIJ-US, 2004.
-
(2004)
NIJ-US
-
-
Hart, S.V.1
-
3
-
-
34247227824
-
The future of netcrime now (1) - threats and challenges
-
Home Office Crime and Policing Group, Tech. Rep. 62/04
-
S. Morris, "The future of netcrime now (1) - threats and challenges," Home Office Crime and Policing Group, Tech. Rep. 62/04, 2004.
-
(2004)
-
-
Morris, S.1
-
4
-
-
10044282865
-
The many colors of multimedia security
-
R. T. Mercuri, "The many colors of multimedia security," Communications of the ACM, vol. 47, pp. 25-29, 2004.
-
(2004)
Communications of the ACM
, vol.47
, pp. 25-29
-
-
Mercuri, R.T.1
-
6
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Springer-Verlag
-
N. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in Proc. of the 2nd Intl. Workshop on Information Hiding. Springer-Verlag, 1998, pp. 273-289.
-
(1998)
Proc. of the 2nd Intl. Workshop on Information Hiding
, pp. 273-289
-
-
Johnson, N.1
Jajodia, S.2
-
8
-
-
0032680807
-
Information hiding - A survey
-
F. Petitcolas, R. Anderson, and M. Kuhn, "Information hiding - A survey," Proc. of the IEEE, vol. 87, pp. 1062-1078, 1999.
-
(1999)
Proc. of the IEEE
, vol.87
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
9
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
N. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998.
-
(1998)
IEEE Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.1
Jajodia, S.2
-
11
-
-
0034509108
-
Steganalysis of LSB enconding in color images
-
Aug
-
J. Fridrich, R. Du, and M. Long, "Steganalysis of LSB enconding in color images," in ICME - Intl. Conf. Multimedia Expo, vol. 3, Aug. 2000, pp. 1279-1282.
-
(2000)
ICME - Intl. Conf. Multimedia Expo
, vol.3
, pp. 1279-1282
-
-
Fridrich, J.1
Du, R.2
Long, M.3
-
12
-
-
0034787093
-
Reliable detection of LSB steganography in color and grayscale images
-
J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in color and grayscale images," in Proc. of the ACM Workshop on Multimedia and Security, 2001, pp. 27-30.
-
(2001)
Proc. of the ACM Workshop on Multimedia and Security
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
13
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. of the 5th Intl. Workshop on Information Hiding, 2002, pp. 340-354.
-
(2002)
Proc. of the 5th Intl. Workshop on Information Hiding
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
-
14
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. of the 5th Intl. Conf on Image Processing, vol. 2, 2002, pp. 905-908.
-
(2002)
Proc. of the 5th Intl. Conf on Image Processing
, vol.2
, pp. 905-908
-
-
Farid, H.1
-
15
-
-
0023383122
-
Quadrature mirror filter banks, m-band extensions and perfect reconstruction techniques
-
jul
-
P. Vaidyanathan, "Quadrature mirror filter banks, m-band extensions and perfect reconstruction techniques," IEEE ASSP Magazine, pp. 4-20, jul 1987.
-
(1987)
IEEE ASSP Magazine
, pp. 4-20
-
-
Vaidyanathan, P.1
-
16
-
-
33750555925
-
Image Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
-
Jul
-
Y.Q. Shi et al., "Image Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network," in ICME - Intl. Conf. Multimedia Expo, Jul 2005, pp. 268-272.
-
(2005)
ICME - Intl. Conf. Multimedia Expo
, pp. 268-272
-
-
Shi, Y.Q.1
-
18
-
-
0026762153
-
A universal statistical test for random bit generators
-
U. Maurer, "A universal statistical test for random bit generators," Journal of Cryptology, vol. 5, pp. 89-105, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, pp. 89-105
-
-
Maurer, U.1
-
21
-
-
67349143305
-
An introduction to R: A programming environment for data analysis and graphics
-
W. N. Venables and D. M. Smith, An introduction to R: a programming environment for data analysis and graphics. R Development Core Team, 2005.
-
(2005)
R Development Core Team
-
-
Venables, W.N.1
Smith, D.M.2
|