-
1
-
-
84955563192
-
Stretching the limits of steganography
-
R. Anderson, editor, Information Hiding 1996, Springer
-
R. Anderson. Stretching the limits of steganography. In R. Anderson, editor, Information Hiding 1996, volume LNCS 1174, pages 39-48. Springer, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 39-48
-
-
Anderson, R.1
-
4
-
-
0036029074
-
A communications approach to image steganography
-
San Jose, USA, Jan.
-
J. J. Eggers, R. Bäuml, and B. Girod. A communications approach to image steganography. In SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 26-37, San Jose, USA, Jan. 2002.
-
(2002)
SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 26-37
-
-
Eggers, J.J.1
Bäuml, R.2
Girod, B.3
-
6
-
-
0035766166
-
Steganalysis based on JPEG compatibility
-
A. Tescher, B. Vasudev, and Jr. V. M. Bove, editors, Denver, CO, 20-24 August
-
J. Fridrich, M. Goljan, and R. Du. Steganalysis based on JPEG compatibility. In A. Tescher, B. Vasudev, and Jr. V. M. Bove, editors, SPIE Vol. 4518, Special session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, pages 275-280, Denver, CO, 20-24 August 1998.
-
(1998)
SPIE Vol. 4518, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV
, vol.4518
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
7
-
-
0003482562
-
Information hiding: Steganography and watermarking - Attacks and countermeasures
-
Kluwer Academic Publishers
-
N. F. Johnson, Z. Duric, and S. Jajodia. Information hiding: Steganography and watermarking - attacks and countermeasures. In Advances in Information Security 1. Kluwer Academic Publishers, 2001.
-
(2001)
Advances in Information Security
, vol.1
-
-
Johnson, N.F.1
Duric, Z.2
Jajodia, S.3
-
8
-
-
0032634270
-
The principle and applications of bpcs-steganography
-
Boston, MA, November 2-4
-
E. Kawaguchi and R. O. Eason. The principle and applications of bpcs-steganography. In SPIE International Symposium on Voice, Video, and Data Communications: Multimedia Systems and Applications, pages 464-473, Boston, MA, November 2-4 1998.
-
(1998)
SPIE International Symposium on Voice, Video, and Data Communications: Multimedia Systems and Applications
, pp. 464-473
-
-
Kawaguchi, E.1
Eason, R.O.2
-
9
-
-
4544223199
-
Modeling digital image into informative and noise-like regions by complexity measure
-
IOS Press, April
-
E. Kawaguchi and M. Niimi. Modeling digital image into informative and noise-like regions by complexity measure. In Information Modeling and Knowledge Bases IX, pages 255-265. IOS Press, April 1998.
-
(1998)
Information Modeling and Knowledge Bases IX
, pp. 255-265
-
-
Kawaguchi, E.1
Niimi, M.2
-
11
-
-
0242697129
-
An adaptive image steganographic model based on minimum-error lsb replacement
-
Taichung, Taiwan, 14-15 May
-
Y. Lee and L. Chen. An adaptive image steganographic model based on minimum-error lsb replacement. In Ninth National Conference on Information Security, pages 8-15, Taichung, Taiwan, 14-15 May 1999.
-
(1999)
Ninth National Conference on Information Security
, pp. 8-15
-
-
Lee, Y.1
Chen, L.2
-
14
-
-
0033706181
-
Compression-compatible fragile and semi-fragile tamper detection
-
San Jose, CA
-
L. M. Marvel, G. W. Hartwig, and C. Boncelet. Compression-compatible fragile and semi-fragile tamper detection. In SPIE EI Photonics West, pages 131-139, San Jose, CA, 2000.
-
(2000)
SPIE EI Photonics West
, pp. 131-139
-
-
Marvel, L.M.1
Hartwig, G.W.2
Boncelet, C.3
-
15
-
-
0242527439
-
Capacity is the wrong paradigm
-
Virginia Beach, VA, USA, September
-
I. S. Moskowitz, L. Chang, and R. E. Newman. Capacity is the wrong paradigm. In New Security Paradigms Workshop, Virginia Beach, VA, USA, September 2002.
-
(2002)
New Security Paradigms Workshop
-
-
Moskowitz, I.S.1
Chang, L.2
Newman, R.E.3
-
16
-
-
0242528283
-
-
NRL Memorandum Report NRL/MR/5540-02-8635, Naval Research Laboratory, Code 5540, August 16
-
I. S. Moskowitz, N. F. Johnson, and M. Jacobs. A detection study of an NRL steganographic method. NRL Memorandum Report NRL/MR/5540-02-8635, Naval Research Laboratory, Code 5540, August 16 2002.
-
(2002)
A Detection Study of An NRL Steganographic Method
-
-
Moskowitz, I.S.1
Johnson, N.F.2
Jacobs, M.3
-
17
-
-
0034593277
-
A new paradigm hidden in Steganography
-
Ballycotton, County Cork, Ireland, Sept. ACM
-
I. S. Moskowitz, G. E. Longdon, and L. Chang. A new paradigm hidden in Steganography. In New Security Paradigms Workshop, pages 12-22, Ballycotton, County Cork, Ireland, Sept 2000. ACM
-
(2000)
New Security Paradigms Workshop
, pp. 12-22
-
-
Moskowitz, I.S.1
Longdon, G.E.2
Chang, L.3
-
18
-
-
85023816078
-
-
also appears in ed. R Herold, Auerbach Press
-
(also appears in "The Privacy Papers" ed. R Herold, Auerbach Press 2002).
-
(2002)
The Privacy Papers
-
-
-
19
-
-
0031339457
-
An image embedding in image by a complexity based region segmentation method
-
M. Niimi, H. Noda, and E. Kawaguchi. An image embedding in image by a complexity based region segmentation method. In ICIP, volume 3, pages 74-77, 1997.
-
(1997)
ICIP
, vol.3
, pp. 74-77
-
-
Niimi, M.1
Noda, H.2
Kawaguchi, E.3
-
21
-
-
0032680807
-
Information hiding - A survey
-
July
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Information hiding - a survey. Proceedings of the IEEE, 87(7):1062-1078, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
22
-
-
85084160704
-
Defending against statistical Steganalysis
-
August
-
N. Provos. Defending against statistical Steganalysis. In 10th USENIX Security Symposium, pages 323-335, August 2001.
-
(2001)
10th USENIX Security Symposium
, pp. 323-335
-
-
Provos, N.1
-
25
-
-
0000044932
-
The discrete cosine transform
-
G. Strang. The discrete cosine transform. SIAM Review, 41(1):135-147, 1999.
-
(1999)
SIAM Review
, vol.41
, Issue.1
, pp. 135-147
-
-
Strang, G.1
-
26
-
-
84937814312
-
F5 - A steganographic algorithm: High capacity despite better steganalysis
-
I. S. Moskowitz (Ed.) Information Hiding, IH 2001, Springer
-
A. Westfeld. F5 - a steganographic algorithm: High capacity despite better steganalysis. In I. S. Moskowitz (Ed.) Information Hiding, LNCS 2137, IH 2001, pages 289-302. Springer, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
|