-
1
-
-
38049156045
-
-
Simmons, G.J: The prisoners' problem and the subliminal channel. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology, pp. 51-67.Plenum Press, NewYork (1999)
-
Simmons, G.J: The prisoners' problem and the subliminal channel. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology, pp. 51-67.Plenum Press, NewYork (1999)
-
-
-
-
2
-
-
84957868624
-
An information-theoretic model for steganography
-
Aucsmith, D, ed, IH, Springer, Heidelberg
-
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306-318. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
3
-
-
84937814312
-
High capacity despite better steganalysis F5 - a steganographic algorithm
-
Moskowitz, I.S, ed, Information Hiding, Springer, Heidelberg
-
Westfeld, A.: High capacity despite better steganalysis F5 - a steganographic algorithm. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
4
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image Graphics 5, 167-190 (2005)
-
(2005)
International Journal of Image Graphics
, vol.5
, pp. 167-190
-
-
Sallee, P.1
-
5
-
-
84962115510
-
Steganography via codes for memory with defective cells
-
September 28-30
-
Fridrich, J., Goljan, M., Soukal, D.: Steganography via codes for memory with defective cells. In: 43rd Conference on Coding, Communication, and Control, September 28-30, 2005 (2005)
-
(2005)
43rd Conference on Coding, Communication, and Control
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
6
-
-
14844285173
-
Some notes on steganography
-
available from
-
Crandall, R.: Some notes on steganography. Steganography Mailing List (1998) available from http://os.inf.tu-dresden.de/~westfeld/crandall.pdf
-
(1998)
Steganography Mailing List
-
-
Crandall, R.1
-
8
-
-
0242640249
-
Embedding information in grayscale images
-
Enschede, The Netherlands, May 15-16
-
van Dijk, M., Willems, F.: Embedding information in grayscale images. In: Proceedings of the 22nd Symposium on Information and Communication Theory in the Benelux, Enschede, The Netherlands, May 15-16, 2001, pp. 147-154 (2001)
-
(2001)
Proceedings of the 22nd Symposium on Information and Communication Theory in the Benelux
, pp. 147-154
-
-
van Dijk, M.1
Willems, F.2
-
9
-
-
84939147125
-
Information hiding by coverings
-
Paris, France, 2003
-
Galand, F., Kabatiansky, G.: Information hiding by coverings. In: Proceedings ITW 2003, Paris, France, 2003, pp. 151-154 (2003)
-
(2003)
Proceedings ITW
, pp. 151-154
-
-
Galand, F.1
Kabatiansky, G.2
-
10
-
-
33645015900
-
Wet paper codes with improved embedding efficiency
-
Fridrich, J., Goljan, M., Soukal, D.: Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Security and Forensics 1, 102-110 (2006)
-
(2006)
IEEE Transactions on Information Security and Forensics
, vol.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
12
-
-
38049129236
-
-
On crandall's problem. Personal Communication (1998) available from http://www.ws.binghamton.edu/f ridr ich/covcodes.pdf
-
Bierbrauer, J.: On crandall's problem. Personal Communication (1998) available from http://www.ws.binghamton.edu/f ridr ich/covcodes.pdf
-
-
-
Bierbrauer, J.1
-
13
-
-
33645666341
-
Matrix embedding for large payloads
-
Delp, E, Wong, P.W, eds, San Jose, CA
-
Fridrich, J., Soukal, D.: Matrix embedding for large payloads. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, 2006, pp. W1-W15 (2006)
-
(2006)
Proceedings SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents
, vol.8
-
-
Fridrich, J.1
Soukal, D.2
-
14
-
-
0003327865
-
Covering Codes. Elsevier
-
Cohen, G.D., Honkala, I., Litsyn, S., Lobstein, A.: Covering Codes. Elsevier, North-Holland Mathematical Library, vol. 54 (1997)
-
(1997)
North-Holland Mathematical Library
, vol.54
-
-
Cohen, G.D.1
Honkala, I.2
Litsyn, S.3
Lobstein, A.4
-
15
-
-
38049174525
-
-
Khatirinejad, M., Lisoněk, P.: Linear codes for high payload steganography. In: AAECC-16, Las Vegas, Nevada, February 20-24, 2006 (2006)
-
Khatirinejad, M., Lisoněk, P.: Linear codes for high payload steganography. In: AAECC-16, Las Vegas, Nevada, February 20-24, 2006 (2006)
-
-
-
-
16
-
-
33746613626
-
-
Ker, A.: A general framework for structural analysis of LSB replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, 3727, pp. 296-311. Springer, Heidelberg (2005)
-
Ker, A.: A general framework for structural analysis of LSB replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 296-311. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
21844461602
-
Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain
-
Delp, E, Wong, P.W, eds, San Jose, CA, January 16-20, 5681, pp
-
Soukal, D., Fridrich, J., Goljan, M.: Maximum likelihood estimation of secret message length embedded using PMK steganography in spatial domain. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16-20, 2005, vol. 5681, pp. 595-606 (2005)
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents
, vol.7
, pp. 595-606
-
-
Soukal, D.1
Fridrich, J.2
Goljan, M.3
-
18
-
-
21844463576
-
On steganalysis of plus-minus one embedding in continuous-tone images
-
Delp, E, Wong, P.W, eds, San Jose, CA, January 16-20, 5681, pp
-
Wong, P.W., Chen, H., Tang, Z.: On steganalysis of plus-minus one embedding in continuous-tone images. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16-20, 2005, vol. 5681, pp. 643-652 (2005)
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents
, vol.7
, pp. 643-652
-
-
Wong, P.W.1
Chen, H.2
Tang, Z.3
-
19
-
-
21844456066
-
Resampling and the detection of LSB matching in color bitmaps
-
Delp, E, Wong, P.W, eds, San Jose, CA, January 16-20, 5681, pp
-
Ker, A.: Resampling and the detection of LSB matching in color bitmaps. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, January 16-20, 2005, vol. 5681, pp. 1-15 (2005)
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents
, vol.7
, pp. 1-15
-
-
Ker, A.1
-
20
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12, 441-444 (2005)
-
(2005)
IEEE Signal Processing Letters
, vol.12
, pp. 441-444
-
-
Ker, A.D.1
-
21
-
-
33645676686
-
New blind steganalysis and its implications
-
Delp, E, Wong, P.W, eds, San Jose, CA, January 16-19, 6072, pp
-
Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Delp, E., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, January 16-19, 2006, vol. 6072, pp. 1-13 (2006)
-
(2006)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents
, vol.8
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
22
-
-
0035766166
-
Steganalysis based on JPEG compatibility
-
Tescher, A.G, ed, Denver, CO, August 20-24
-
Fridrich, J., Goljan, M., Du, R.: Steganalysis based on JPEG compatibility. In: Tescher, A.G. (ed.) Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001, vol. 4518, pp. 275-280 (2001)
-
(2001)
Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV
, vol.4518
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
23
-
-
14844321910
-
Perturbed quantization steganography using wet paper codes
-
Dittman, J, Fridrich, J, eds, Magdeburg, Germany, September 20-21, ACM Press, New York
-
Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography using wet paper codes. In: Dittman, J., Fridrich, J. (eds.) Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004, pp. 4-15. ACM Press, New York (2004)
-
(2004)
Proceedings ACM Multimedia and Security Workshop
, pp. 4-15
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
24
-
-
33749453642
-
Lossy source encoding via message-passing and decimation over generalized codewords of LDGM codes
-
Adelaide, Australia
-
Wainwright, M.J., Maneva, E.: Lossy source encoding via message-passing and decimation over generalized codewords of LDGM codes. In: Proceedings of the International Symposium on Information Theory, Adelaide, Australia 2005 (2005)
-
(2005)
Proceedings of the International Symposium on Information Theory
-
-
Wainwright, M.J.1
Maneva, E.2
|