-
1
-
-
34548286379
-
-
JP Hide&Seek. http://linux01.gwdg.de/~alatham/stego.html.
-
JP Hide&Seek
-
-
-
2
-
-
85086953243
-
-
Outguess ver. 0.2
-
Outguess ver. 0.2. http:\\www.outguess.org.
-
-
-
-
3
-
-
33645696636
-
Image steganalysis with binary similarity measures
-
I. Avcibas, M. Kharrazi, N. Memon, and B. Sankur. Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing, 17:2749-2757, 2005.
-
(2005)
EURASIP Journal on Applied Signal Processing
, vol.17
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazi, M.2
Memon, N.3
Sankur, B.4
-
4
-
-
0035791440
-
-
I. Avcibas, N. Memon, and B. Sankur. Steganalysis using image quality metrics. In E. Delp and P. W. Wong, editors, Proceeedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents III, 4314, pages 523-531, 2001.
-
I. Avcibas, N. Memon, and B. Sankur. Steganalysis using image quality metrics. In E. Delp and P. W. Wong, editors, Proceeedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, pages 523-531, 2001.
-
-
-
-
5
-
-
0036448130
-
Image steganalysis with binary similarity measures
-
I. Avcibas, B. Sankur, and N. Memon. Image steganalysis with binary similarity measures. In Proceedings of International Conference on Image Processing, volume 3, pages 645-648, 2002.
-
(2002)
Proceedings of International Conference on Image Processing
, vol.3
, pp. 645-648
-
-
Avcibas, I.1
Sankur, B.2
Memon, N.3
-
6
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Christopher J. C. Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2(2):121-167, 1998.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
7
-
-
84957868624
-
An information-theoretic model for steganography
-
D. Aucsmith, editor, Information Hiding, 2nd International Workshop, of
-
C. Cachin. An information-theoretic model for steganography. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 306-318, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
9
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
F.A.P. Petitcolas, editor, Information Hiding, 5th International Workshop, of
-
H. Farid and L. Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F.A.P. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 340-354, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 340-354
-
-
Farid, H.1
Siwei, L.2
-
10
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
J. Fridrich, editor, Information Hiding, 6th International Workshop, of
-
J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J. Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67-81, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
11
-
-
33646167860
-
Towards multi-class blind steganalyzer for JPEG images
-
M. Barni, I. Cox, T. Kalker, and H. J. Kim, editors, 4th International Data Hiding Workshop, of
-
J. Fridrich and T. Pevný. Towards multi-class blind steganalyzer for JPEG images. In M. Barni, I. Cox, T. Kalker, and H. J. Kim, editors, 4th International Data Hiding Workshop, volume 3710 of Lecture Notes in Computer Science, pages 39-53, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3710
, pp. 39-53
-
-
Fridrich, J.1
Pevný, T.2
-
12
-
-
33645660635
-
Multi-class blind steganalysis for JPEG images
-
E. Delp and P. W. Wong, editors
-
J. Fridrich and T. Pevný. Multi-class blind steganalysis for JPEG images. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006.
-
(2006)
Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII
-
-
Fridrich, J.1
Pevný, T.2
-
13
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
Santa Clara, CA
-
J.J. Harmsen and W.A. Pearlman. Steganalysis of additive noise modelable information hiding. In Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, pages 131-142, Santa Clara, CA, 2003.
-
(2003)
Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
14
-
-
33645695370
-
A graph-theoretic approach to steganography
-
J. Dittmann et al, editor, Communications and Multimedia Security. 9th IFIP TC-6 TC-11 International Conference, of
-
S. Hetzl and P. Mutzel. A graph-theoretic approach to steganography. In J. Dittmann et al., editor, Communications and Multimedia Security. 9th IFIP TC-6 TC-11 International Conference, volume 3677 of Lecture Notes in Computer Science, pages 119-128, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3677
, pp. 119-128
-
-
Hetzl, S.1
Mutzel, P.2
-
15
-
-
0013109655
-
A comparison of methods for multi-class support vector machines
-
Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan
-
C. Hsu and C. Lin. A comparison of methods for multi-class support vector machines. Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan, 2001. http://citeseer.ist.psu.edu/hsu01comparison.html.
-
(2001)
-
-
Hsu, C.1
Lin, C.2
-
16
-
-
8844256156
-
-
S. Lyu and H. Farid. Steganalysis using color wavelet statistics and one-class support vector machines. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, 5306, pages 35-45, 2004.
-
S. Lyu and H. Farid. Steganalysis using color wavelet statistics and one-class support vector machines. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 35-45, 2004.
-
-
-
-
17
-
-
33645693950
-
-
P. Moulin and Y. Wang. Statistical modeling and steganalysis of DFT-based image steganography. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, 6072, pages 607202-1-607202-11, 2006.
-
P. Moulin and Y. Wang. Statistical modeling and steganalysis of DFT-based image steganography. In E. Delp and P. W. Wong, editors, Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 607202-1-607202-11, 2006.
-
-
-
-
19
-
-
35048819204
-
Model based steganography
-
Kalker, I.J. Cox, and Yong Man Ro, editors, International Workshop on Digital Watermarking, of
-
P. Sallee. Model based steganography. In Kalker, I.J. Cox, and Yong Man Ro, editors, International Workshop on Digital Watermarking, volume 2939 of Lecture Notes in Computer Science, pages 154-167, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
20
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
Phil Sallee. Model-based methods for steganography and steganalysis. Int. J. Image Graphics, 5(1):167-190, 2005.
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
22
-
-
84937814312
-
High capacity despite better steganalysis (F5 a steganographic algorithm)
-
I.S. Moskowitz, editor, Information Hiding, 4th International Workshop, of
-
A. Westfeld. High capacity despite better steganalysis (F5 a steganographic algorithm). In I.S. Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 289-302, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
23
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic function
-
M. Barni, editor, Information Hiding. 7th International Workshop, of
-
G. Xuan, Y.Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic function. In M. Barni, editor, Information Hiding. 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 262-277, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3727
, pp. 262-277
-
-
Xuan, G.1
Shi, Y.Q.2
Gao, J.3
Zou, D.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, C.8
Chen, W.9
|