-
3
-
-
21844452953
-
-
M. Choubassi, P. Moulin, A new sensitivity analysis attack, in: E. Delp III, P. Wong (Eds.), Security, Steganography, and Watermarking of Multimedia Contents, VII, in: Proceedings of SPIE-IS&T Electronic Imaging, SPIE vol. 5681, 2005, pp. 734-745.
-
-
-
-
6
-
-
35248901820
-
Detection of LSB steganography via sample pair analysis
-
Information-Hiding, Fifth International Workshop. Petitcolas F.A.P. (Ed), Springer-Verlag, New York
-
Dumitrescu S., Wu X., and Wang Z. Detection of LSB steganography via sample pair analysis. In: Petitcolas F.A.P. (Ed). Information-Hiding, Fifth International Workshop. Lecture Notes in Computer Science vol. 2578 (2002), Springer-Verlag, New York 355-372
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 355-372
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
7
-
-
0242408734
-
-
J. Fridrich, M. Goljan, Digital image steganography using stochastic modulation, in: E. Delp (Ed.), Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V 5020, 2003, pp. 191-202.
-
-
-
-
8
-
-
35248884299
-
Steganalysis of JPEG Images: breaking the F5 algorithm
-
Information-Hiding. Petitcolas F.A.P. (Ed), Springer-Verlag, New York
-
Fridrich J., Goljan M., and Hogea D. Steganalysis of JPEG Images: breaking the F5 algorithm. In: Petitcolas F.A.P. (Ed). Information-Hiding. Lecture Notes in Computer Science vol. 2578 (2002), Springer-Verlag, New York 310-323
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
9
-
-
1442360452
-
Quantitative steganalysis: estimating secret message length
-
(Special Issue on Multimedia Security)
-
Fridrich J., Goljan M., Hogea D., and Soukal D. Quantitative steganalysis: estimating secret message length. ACM Multimedia Systems Journal 9 3 (2003) 288-302 (Special Issue on Multimedia Security)
-
(2003)
ACM Multimedia Systems Journal
, vol.9
, Issue.3
, pp. 288-302
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
10
-
-
21844461602
-
-
J. Fridrich, D. Soukal, M. Goljan, Maximum likelihood estimation of length of secret message embedding using ±K steganography in spatial domain, security, steganography, and watermarking of multimedia contents, VII, in: Proceedings of SPIE-IS &T Electronic Imaging, SPIE vol. 5681, 2005, pp. 595-606.
-
-
-
-
11
-
-
0034164230
-
Additive logistic regression: a statistical view of boosting
-
Friedman J., Hastie T., and Tibshirani R. Additive logistic regression: a statistical view of boosting. The Annals of Statistics 38 2 (2000) 337-374
-
(2000)
The Annals of Statistics
, vol.38
, Issue.2
, pp. 337-374
-
-
Friedman, J.1
Hastie, T.2
Tibshirani, R.3
-
12
-
-
33644685216
-
A fragile watermarking scheme for detecting malicious modifications of database relations
-
Guo H., Li Y., Liu A., and Jajodia S. A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences 176 10 (2006) 1350-1378
-
(2006)
Information Sciences
, vol.176
, Issue.10
, pp. 1350-1378
-
-
Guo, H.1
Li, Y.2
Liu, A.3
Jajodia, S.4
-
13
-
-
33749679756
-
Chaining watermarks for detecting malicious modifications to streaming data
-
Guo H., Li Y., and Jajodia S. Chaining watermarks for detecting malicious modifications to streaming data. Information Sciences 177 1 (2007) 281-298
-
(2007)
Information Sciences
, vol.177
, Issue.1
, pp. 281-298
-
-
Guo, H.1
Li, Y.2
Jajodia, S.3
-
14
-
-
0036161259
-
Gene selection for cancer classification using support vector machines
-
Guyon I., Weston J., Barnhill S., and Vapnik V. Gene selection for cancer classification using support vector machines. Machine Learning 46 1-3 (2002) 389-422
-
(2002)
Machine Learning
, vol.46
, Issue.1-3
, pp. 389-422
-
-
Guyon, I.1
Weston, J.2
Barnhill, S.3
Vapnik, V.4
-
15
-
-
0242576328
-
-
J. Harmsen, W. Pearlman, Steganalysis of additive noise modelable information-hiding, in: E. Delp III, P. Wong (Eds.), Security, Steganography, and Watermarking of Multimedia Contents V, Proceedings of the SPIE, vol. 5020, 2003, pp. 131-142.
-
-
-
-
16
-
-
23444448568
-
-
John Wiley
-
Heijden F., Duin R., Ridder D., and Tax D. Classification, Parameter Estimation and State Estimation (2004), John Wiley
-
(2004)
Classification, Parameter Estimation and State Estimation
-
-
Heijden, F.1
Duin, R.2
Ridder, D.3
Tax, D.4
-
17
-
-
33646134392
-
-
T. Holotyak, J. Fridrich, S. Voloshynovskiy, Blind statistical steganalysis of additive steganography using wavelet higher order statistics, in: Proceedings of the Ninth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 2005, pp. 273-274.
-
-
-
-
18
-
-
0032681789
-
-
J. Huang, D. Mumford, Statistics of natural images and models, 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'99) - vol. 1, 1999, doi:10.1109/CVPR.1999.786990.
-
-
-
-
20
-
-
35048891531
-
Improved detection of LSB steganography in grayscale images
-
Information-Hiding. Fridrich (Ed), Springer-Verlag, New York
-
Ker A. Improved detection of LSB steganography in grayscale images. In: Fridrich (Ed). Information-Hiding. Sixth International Workshop, Lecture Notes in Computer Science vol. 3200 (2005), Springer-Verlag, New York 97-115
-
(2005)
Sixth International Workshop, Lecture Notes in Computer Science
, vol.3200
, pp. 97-115
-
-
Ker, A.1
-
21
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Ker A. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12 6 (2005) 441-444
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.1
-
22
-
-
85055811894
-
-
C. Kurak, J. McHugh, A cautionary note on image downgrading, in: Proceedings of the 8th Computer Security Application Conference, 1992, pp. 153-159.
-
-
-
-
23
-
-
40649108871
-
-
Q. Liu, A. Sung, Recursive feature addition for gene selection, in: Proceedings of 19th International Joint Conference on Neural Networks, 2006, pp. 2339-2346.
-
-
-
-
24
-
-
34047217902
-
-
Q. Liu, A. Sung, J. Xu, B.M. Ribeiro, Image complexity and feature extraction for steganalysis of LSB matching steganography, in: Proceedings of 18th International Conference on Pattern Recognition, vol. 2, 2006, pp. 267-270.
-
-
-
-
25
-
-
34047232478
-
-
Ribeiro B., et al. (Ed), Springer, Wien/NewYork
-
Liu Q., Sung A., and Ribeiro B. In: Ribeiro B., et al. (Ed). Statistical Correlations and Machine Learning for Steganalysis. Adaptive and Natural Computing Algorithms (2005), Springer, Wien/NewYork 437-440
-
(2005)
Adaptive and Natural Computing Algorithms
, pp. 437-440
-
-
Liu, Q.1
Sung, A.2
Ribeiro, B.3
-
26
-
-
34948828260
-
-
Q. Liu, A. Sung, J. Xu, V. Venkataramana, Detect JPEG steganography using polynomial fitting, in: Proceedings of the 16th artificial neural networks in engineering, 2006, pp. 547-556.
-
-
-
-
27
-
-
8844256156
-
-
S. Lyu, H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, in: SPIE Symposium on Electronic Imaging, San Jose, CA, 2004.
-
-
-
-
32
-
-
20444456703
-
-
P. Moulin, A. Briassouli, A stochastic QIM algorithm for robust, undetectable image watermarking, in: Proceedings of ICIP 2004, vol. 2, 2004, pp. 1173-1176.
-
-
-
-
33
-
-
0032662774
-
Analysis of multiresolution image denoising schemes using generalized Gaussian and complexity priors
-
Moulin P., and Liu J. Analysis of multiresolution image denoising schemes using generalized Gaussian and complexity priors. IEEE Transactions on Information Theory 45 (1999) 909-919
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, pp. 909-919
-
-
Moulin, P.1
Liu, J.2
-
34
-
-
33645660635
-
-
T. Pevny, J. Fridrich, Multiclass blind steganalysis for JPEG images, in: Proceedings of the SPIE Electronic Imaging Security, Steganography, and Watermarking of Multimedia Contents, vol. VIII, 2006, San Jose, CA, pp. 257-269.
-
-
-
-
35
-
-
3042742327
-
Hide and seek: an introduction to steganography
-
Provos N., and Honeyman P. Hide and seek: an introduction to steganography. IEEE Security & Privacy 1 3 (2003) 32-44
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
36
-
-
0033354560
-
-
M. Ramkumar, A. Akansu, A. Alatan, A. Robust, Data hiding scheme for digital images using DFT, in: Proceedings of IEEE ICIP, vol. II, 1999, pp. 211-215.
-
-
-
-
38
-
-
0033281701
-
Improved boosting algorithms using confidence-rated predictions
-
Schapire R., and Singer Y. Improved boosting algorithms using confidence-rated predictions. Machine Learning 37 3 (1999) 297-336
-
(1999)
Machine Learning
, vol.37
, Issue.3
, pp. 297-336
-
-
Schapire, R.1
Singer, Y.2
-
40
-
-
0029251559
-
Estimation of shape parameter for generalized gaussian distributions in subband decompositions of video
-
Sharifi K., and Leon-Garcia A. Estimation of shape parameter for generalized gaussian distributions in subband decompositions of video. IEEE Transactions Circuits on System and Video Technology 5 (1995) 52-56
-
(1995)
IEEE Transactions Circuits on System and Video Technology
, vol.5
, pp. 52-56
-
-
Sharifi, K.1
Leon-Garcia, A.2
-
41
-
-
84947277755
-
-
T. Sharp, An implementation of key-based digital signal steganography, in: I. Moskowitz (Ed.), Information-Hiding. Fourth International Workshop, Lecture Notes in Computer Science, vol. 2137, Springer-Verlag, New York, 2001, pp. 13-26.
-
-
-
-
42
-
-
0037277963
-
On advances in statistical modeling of natural images
-
Srivastava A., Lee A., P Simoncelli E., and Zhu S. On advances in statistical modeling of natural images. Journal of Mathematical Imaging and Vision 18 1 (2003) 17-33
-
(2003)
Journal of Mathematical Imaging and Vision
, vol.18
, Issue.1
, pp. 17-33
-
-
Srivastava, A.1
Lee, A.2
P Simoncelli, E.3
Zhu, S.4
-
43
-
-
33645157313
-
Gene selection algorithms for microarray data based on least square support vector machine
-
10.1186/1471-2105-7-95
-
Tang E.K., Suganthan P.N., and Yao X. Gene selection algorithms for microarray data based on least square support vector machine. BMC Bioinformatics 7 95 (2006) 10.1186/1471-2105-7-95
-
(2006)
BMC Bioinformatics
, vol.7
, Issue.95
-
-
Tang, E.K.1
Suganthan, P.N.2
Yao, X.3
-
46
-
-
84898965689
-
-
Solla S., Leen T., and Müller K. (Eds), MIT Press, Cambridge, MA
-
Wainwright M., and Simoncelli E. In: Solla S., Leen T., and Müller K. (Eds). Scale Mixtures of Gaussians and the Statistics of Natural Images vol. 12 (2000), MIT Press, Cambridge, MA 855-861
-
(2000)
Scale Mixtures of Gaussians and the Statistics of Natural Images
, vol.12
, pp. 855-861
-
-
Wainwright, M.1
Simoncelli, E.2
-
48
-
-
84937814312
-
-
A. Westfeld, High capacity despite better steganalysis (F5-A Steganographic Algorithm), in: Proceedings of the Fourth Information-Hiding Workshop, Lecture Notes in Computer Science, vol. 2137, 2001, pp. 289-302.
-
-
-
-
50
-
-
0032643166
-
Statistical texture characterization from discrete wavelet representations
-
Wouwer G., Scheunders P., and Dyck D. Statistical texture characterization from discrete wavelet representations. IEEE Transactions on Image Processing 8 4 (1999) 592-598
-
(1999)
IEEE Transactions on Image Processing
, vol.8
, Issue.4
, pp. 592-598
-
-
Wouwer, G.1
Scheunders, P.2
Dyck, D.3
-
51
-
-
3042547051
-
-
J. Xu, A. Sung, P. Shi, Q. Liu, JPEG compression immune steganography using wavelet transform, in: International Conference on Information Technology: Coding and Computing, 2004. Proceedings (ITCC 2004), vol. 2, 2004, pp. 704-708.
-
-
-
|