-
1
-
-
78649838656
-
Batch steganography and pooled steganalysis
-
To appear in
-
A. Ker, "Batch steganography and pooled steganalysis," To appear in Proc. 8th Information Hiding Workshop, 2006.
-
(2006)
Proc. 8th Information Hiding Workshop
-
-
Ker, A.1
-
2
-
-
0034787093
-
Reliable detection of LSB steganography in color and grayscale images
-
J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in color and grayscale images," Proc. ACM Workshop on Multimedia and Security, pp. 27-30, 2001.
-
(2001)
Proc. ACM Workshop on Multimedia and Security
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
3
-
-
35248901820
-
Detection of LSB steganography via sample pair analysis
-
Proc. 5th Information Hiding Workshop
-
S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," in Proc. 5th Information Hiding Workshop, Springer LNCS 2578, pp. 355-372, 2002.
-
(2002)
Springer LNCS
, vol.2578
, pp. 355-372
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
4
-
-
35048859775
-
An improved sample pairs method for detection of LSB embedding
-
Proc. 6th Information Hiding Workshop
-
P. Lu, X. Luo, Q. Tang, and L. Shen, "An improved sample pairs method for detection of LSB embedding," in Proc. 6th Information Hiding Workshop, Springer LNCS 3200, pp. 116-127, 2004.
-
(2004)
Springer LNCS
, vol.3200
, pp. 116-127
-
-
Lu, P.1
Luo, X.2
Tang, Q.3
Shen, L.4
-
5
-
-
33746613626
-
A general framework for the structural steganalysis of LSB replacement
-
Proc. 7th Information Hiding Workshop
-
A. Ker, "A general framework for the structural steganalysis of LSB replacement," in Proc. 7th Information Hiding Workshop, Springer LNCS 3727, pp. 296-311, 2005.
-
(2005)
Springer LNCS
, vol.3727
, pp. 296-311
-
-
Ker, A.1
-
6
-
-
33645652933
-
Fourth-order structural steganalysis and analysis of cover assumptions
-
E. J. Delp III and P. W. Wong, eds, Proc. SPIE
-
A. Ker, "Fourth-order structural steganalysis and analysis of cover assumptions," in Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp III and P. W. Wong, eds., Proc. SPIE 6072, pp. 25-38, 2006.
-
(2006)
Security, Steganography and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 25-38
-
-
Ker, A.1
-
8
-
-
34547881527
-
A capacity result for batch steganography
-
To appear in
-
A. Ker, "A capacity result for batch steganography." To appear in IEEE Signal Processing Letters, 2007.
-
(2007)
IEEE Signal Processing Letters
-
-
Ker, A.1
-
12
-
-
33645666341
-
Matrix embedding for large payloads
-
E. J. Delp III and P. W. Wong, eds, Proc. SPIE
-
J. Fridrich and D. Soukal, "Matrix embedding for large payloads," in Security, Steganography and Watermarking of Multimedia Contents VIII, E. J. Delp III and P. W. Wong, eds., Proc. SPIE 6072, 2006.
-
(2006)
Security, Steganography and Watermarking of Multimedia Contents VIII
, vol.6072
-
-
Fridrich, J.1
Soukal, D.2
|