-
2
-
-
84892764719
-
Attacks on steganographic systems
-
Proc. of Information Hiding, 3rd Int. Workshop, A. Pfitzmann, ed, pp, Springer
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Proc. of Information Hiding, 3rd Int. Workshop, A. Pfitzmann, ed., pp. 61-76, Springer, LNCS 1768, 2000.
-
(2000)
LNCS
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
3
-
-
84947277755
-
-
T. Sharp, An implementation of key-based digital signal steganography, in Proc. of Information Hiding, 4th Int. Workshop, I. S. Moskowitz, ed., pp. 13-U26, Springer, LNCS 2137, 2001.
-
T. Sharp, "An implementation of key-based digital signal steganography," in Proc. of Information Hiding, 4th Int. Workshop, I. S. Moskowitz, ed., pp. 13-U26, Springer, LNCS 2137, 2001.
-
-
-
-
4
-
-
0242408734
-
Digital image steganography using stochastic modulation
-
J. Fridrich and M. Goljan, "Digital image steganography using stochastic modulation," in Proc. of EI SPIE, Canada, pp. 191-202, 2003.
-
(2003)
Proc. of EI SPIE, Canada
, pp. 191-202
-
-
Fridrich, J.1
Goljan, M.2
-
5
-
-
35048819204
-
Model based steganography
-
International Workshop on Digital Watermarking, Y. M. R. e. T. Kalker, I.J. Cox, ed, pp, Springer
-
P. Sallee, "Model based steganography," in International Workshop on Digital Watermarking, Y. M. R. e. T. Kalker, I.J. Cox, ed., pp. 154-167, Springer, LNCS 2939, 2004.
-
(2004)
LNCS
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
6
-
-
33749598442
-
-
R. Böhme and A. Westfeld, Breaking cauchy model-based jpeg steganography with first order statistics, in ESORICS 2004, P. S. et al., ed., pp. 125-140, Springer, LNCS 3193, 2004.
-
R. Böhme and A. Westfeld, "Breaking cauchy model-based jpeg steganography with first order statistics," in ESORICS 2004, P. S. et al., ed., pp. 125-140, Springer, LNCS 3193, 2004.
-
-
-
-
7
-
-
33646169148
-
-
J. He, J. Huang, and G. Qiu, A new approach to estimating hidden message length in stochastic modulation steganography, in IWDW 2005, M. B. et al., ed., pp. 1-12, Springer, LNCS 3710, 2005.
-
J. He, J. Huang, and G. Qiu, "A new approach to estimating hidden message length in stochastic modulation steganography," in IWDW 2005, M. B. et al., ed., pp. 1-12, Springer, LNCS 3710, 2005.
-
-
-
-
9
-
-
33746629811
-
-
E. Franz and A. Schneidewind, Pre-processing for adding noise steganography, in Proc. of Information Hiding, 7th International Workshop, M. B. et al., ed., pp. 189-203, Springer, LNCS 3727, 2005.
-
E. Franz and A. Schneidewind, "Pre-processing for adding noise steganography," in Proc. of Information Hiding, 7th International Workshop, M. B. et al., ed., pp. 189-203, Springer, LNCS 3727, 2005.
-
-
-
-
10
-
-
14844321910
-
Perturbed quantization steganography with wet paper codes
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography with wet paper codes," in Proc. of the Multimedia and Security Workshop 2004, MM&Sec'04, pp. 4-15, 2004.
-
(2004)
Proc. of the Multimedia and Security Workshop 2004, MM&Sec'04
, pp. 4-15
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
11
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
6th Information Hiding Workshop, J. Fridrich, ed, Springer
-
J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in 6th Information Hiding Workshop, J. Fridrich, ed., Springer, LNCS 3200, 2004.
-
(2004)
LNCS
, vol.3200
-
-
Fridrich, J.1
-
12
-
-
34548232251
-
Merging markov and DCT features for multi-class jpeg steganalysis
-
P. W. W. Edward J. Delp, ed
-
T. Pevny and J. Fridrich, "Merging markov and DCT features for multi-class jpeg steganalysis," in Proc. of SPIE 2007, Security, Steganography, and Watermarking of Multimedia Contents IX, P. W. W. Edward J. Delp, ed., 2007.
-
(2007)
Proc. of SPIE 2007, Security, Steganography, and Watermarking of Multimedia Contents IX
-
-
Pevny, T.1
Fridrich, J.2
-
13
-
-
38049166461
-
-
Y. Q. Shi, C. Chen, and W. Chen, A markov process based approach to effective attacking JPEG steganography, in Proc. of Information Hiding, 8th Int. Workshop, N. J. et al., ed., pp. 249-264, Springer, 2006.
-
Y. Q. Shi, C. Chen, and W. Chen, "A markov process based approach to effective attacking JPEG steganography," in Proc. of Information Hiding, 8th Int. Workshop, N. J. et al., ed., pp. 249-264, Springer, 2006.
-
-
-
-
14
-
-
0004064292
-
Detecting steganographic messages in digital images,
-
Dartmouth College, Computer Science
-
H. Farid, "Detecting steganographic messages in digital images," tech. rep., Dartmouth College, Computer Science, 2001.
-
(2001)
tech. rep
-
-
Farid, H.1
|