-
1
-
-
33847692468
-
Image steganography and steganalysis: Concepts and practices
-
Proc. 2nd Int. Workshop on Digital Watermarking
-
R. Chandramouli, M. Kharrazi, and N. Memon, "Image steganography and steganalysis: Concepts and practices," in Proc. 2nd Int. Workshop on Digital Watermarking, LNCS 2939, pp. 35-49, 2003.
-
(2003)
LNCS
, vol.2939
, pp. 35-49
-
-
Chandramouli, R.1
Kharrazi, M.2
Memon, N.3
-
2
-
-
11844252006
-
Cyber warfare: Steganography vs. steganalysis
-
H. Wang and S. Wang, "Cyber warfare: Steganography vs. steganalysis," Communications of the ACM, 47(10), pp. 76-82, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.10
, pp. 76-82
-
-
Wang, H.1
Wang, S.2
-
4
-
-
0001849187
-
Attacks on steganographic systems
-
Proc. 3rd Int. Workshop on Information Hiding
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Proc. 3rd Int. Workshop on Information Hiding, LNCS1768, pp. 61-76, 1999.
-
(1999)
LNCS
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
5
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
Oct-Dec
-
J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images," IEEE Multimedia, 8(4), pp. 22-28, Oct-Dec. 2001.
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
6
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
Jul
-
S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. on Signal Processing, 51(7), pp. 1995-2007, Jul. 2003.
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
7
-
-
0003290690
-
Steganalysis using image quality metrics
-
San Jose, CA, Feb
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," in Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, Feb. 2001.
-
(2001)
Proc. SPIE, Security and Watermarking of Multimedia Contents
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
8
-
-
33645696636
-
Image steganalysis with binary similarity measures
-
I. Avcibas, M. Kharrazib, N. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," EURASIP Journal on Applied Signal Processing, no. 17, pp. 2749-2757, 2005.
-
(2005)
EURASIP Journal on Applied Signal Processing
, Issue.17
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazib, M.2
Memon, N.3
Sankur, B.4
-
9
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
New York, pp, Sep
-
H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. IEEE Int. Conf. on Image Processing, New York, pp. 905-908, Sep. 2002.
-
(2002)
Proc. IEEE Int. Conf. on Image Processing
, pp. 905-908
-
-
Farid, H.1
-
10
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Proc. 5th Int. Workshop on Information Hiding
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop on Information Hiding, LNCS 2578, pp. 240-254, 2003.
-
(2003)
LNCS
, vol.2578
, pp. 240-254
-
-
Lyu, S.1
Farid, H.2
-
11
-
-
33646134392
-
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
-
Salzburg, Austria, pp, Sep
-
T. Holotyak, J. Fridrich, and S. Voloshynovskiy, "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in Proc. 9th IFIP TC-6/TC-11 Conf. Communications and Multimedia Security, Salzburg, Austria, pp. 273-274, Sep. 2005.
-
(2005)
Proc. 9th IFIP TC-6/TC-11 Conf. Communications and Multimedia Security
, pp. 273-274
-
-
Holotyak, T.1
Fridrich, J.2
Voloshynovskiy, S.3
-
12
-
-
33645676686
-
New blind steganalysis and its implications
-
San Jose, CA, pp, Jan
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, pp. 1-13, Jan. 2006.
-
(2006)
Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
13
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
Proc. 7th Int. Workshop on Information Hiding, Jun
-
G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. 7th Int. Workshop on Information Hiding, LNCS 3727, pp. 262-277, Jun. 2005.
-
(2005)
LNCS
, vol.3727
, pp. 262-277
-
-
Xuan, G.1
Shi, Y.Q.2
Gao, J.3
Zou, D.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, C.8
Chen, W.9
-
14
-
-
33750555925
-
Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction error image, and neural network
-
Amsterdam, Netherlands
-
Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, and C. Chen, "Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction error image, and neural network", in Proc. IEEE Int. Conf. on Multimedia & Expo 2005, Amsterdam, Netherlands, 2005.
-
(2005)
Proc. IEEE Int. Conf. on Multimedia & Expo 2005
-
-
Shi, Y.Q.1
Xuan, G.2
Zou, D.3
Gao, J.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, W.8
Chen, C.9
-
15
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
Mar
-
Y. Wang and P. Moulin, "Optimized feature extraction for learning-based image steganalysis," IEEE Trans. on Information Forensics and Security, 2(1), pp. 31-45, Mar. 2007.
-
(2007)
IEEE Trans. on Information Forensics and Security
, vol.2
, Issue.1
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
16
-
-
33744728031
-
Steganalysis for Markov cover data with applications to images
-
Jun
-
K. Sullivan, U. Madhow, S. Chandrasekaran, and B. Manjunath, "Steganalysis for Markov cover data with applications to images," IEEE Trans. on Information Forensics and Security, 1(2), pp. 275-287, Jun. 2006.
-
(2006)
IEEE Trans. on Information Forensics and Security
, vol.1
, Issue.2
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.4
-
17
-
-
0003922190
-
-
second edition, Wiley, New York
-
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern classification, second edition, Wiley, New York, 2001.
-
(2001)
Pattern classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
18
-
-
15844379524
-
Texture-based steganalysis: Results for color images
-
Denver, pp, Aug
-
P. Lafferty and F. Ahmed, "Texture-based steganalysis: Results for color images," in Proc. SPIE, Mathematics of Data/Image Coding, Compression, and Encryption VII, with Applications, Denver, pp. 145-151, Aug. 2004.
-
(2004)
Proc. SPIE, Mathematics of Data/Image Coding, Compression, and Encryption VII, with Applications
, pp. 145-151
-
-
Lafferty, P.1
Ahmed, F.2
-
19
-
-
0029669420
-
A Comparative study of texture measures with classification based on feature distributions
-
T. Ojala, M. Pietikainen, and K. Harwood, "A Comparative study of texture measures with classification based on feature distributions," Pattern Recognition, 29, pp. 51-59, 1996.
-
(1996)
Pattern Recognition
, vol.29
, pp. 51-59
-
-
Ojala, T.1
Pietikainen, M.2
Harwood, K.3
-
20
-
-
12844257186
-
A comparison study of tour texture synthesis algorithms on regular and near-regular textures,
-
Tech. report CMU-RI-TR-04-01, Robotics Institute, Carnegie Mellon University, Jan
-
W. Lin, J. H. Hays, C. Wu, V. Kwatra, and Y. Liu, "A comparison study of tour texture synthesis algorithms on regular and near-regular textures," Tech. report CMU-RI-TR-04-01, Robotics Institute, Carnegie Mellon University, Jan. 2004.
-
(2004)
-
-
Lin, W.1
Hays, J.H.2
Wu, C.3
Kwatra, V.4
Liu, Y.5
-
21
-
-
0032663328
-
-
T. Randen and J. H. Husoy, Filtering for texture classification: A comparative study, IEEE Tran, on Pattern Analysis and Machine Intelligence, 21(4), pp. 291-310, Apr. 1999.
-
T. Randen and J. H. Husoy, "Filtering for texture classification: A comparative study," IEEE Tran, on Pattern Analysis and Machine Intelligence, 21(4), pp. 291-310, Apr. 1999.
-
-
-
-
22
-
-
0022752517
-
Local linear transforms for texture measurements
-
Jul
-
M. Unser, "Local linear transforms for texture measurements," in Signal Processing, 11(1), pp. 61-79, Jul. 1986.
-
(1986)
Signal Processing
, vol.11
, Issue.1
, pp. 61-79
-
-
Unser, M.1
-
23
-
-
85016430295
-
-
I. Ng, T. Tan, and J. Kittler, On local linear transform and Gabor filter representation of texture, in Proc. 11th Int. Conf. on Pattern Recognition, Ill, pp. 627-631, 1992.
-
I. Ng, T. Tan, and J. Kittler, "On local linear transform and Gabor filter representation of texture," in Proc. 11th Int. Conf. on Pattern Recognition, vol. Ill, pp. 627-631, 1992.
-
-
-
-
26
-
-
8844280843
-
UCID-An uncompressed color image database
-
San Jose, CA, pp, Jan
-
G. Schaefer and M. Stich, "UCID-An uncompressed color image database," in Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, CA, pp. 472-480, Jan. 2004.
-
(2004)
Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia
, pp. 472-480
-
-
Schaefer, G.1
Stich, M.2
-
28
-
-
42949164875
-
-
United States Department of Agriculture National Resource Conservation Service Photo Gallery
-
United States Department of Agriculture National Resource Conservation Service Photo Gallery. http://photogallerv.nrcs.usda.gov/.
-
-
-
-
29
-
-
84947277755
-
An implementation of key-based digital signal steganography
-
Proc. 4th Int. Workshop on Information Hiding
-
T. Sharp, "An implementation of key-based digital signal steganography," in Proc. 4th Int. Workshop on Information Hiding, LNCS 2137, pp. 13-26, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 13-26
-
-
Sharp, T.1
-
30
-
-
0242408734
-
Digital image steganography using stochastic modulation
-
San Jose, CA, pp, Jan
-
J. Fridrich and M. Goljan, "Digital image steganography using stochastic modulation," in Proc. SPIE, Security and Watermarking of Multimedia Contents V, San Jose, CA, pp. 191-202, Jan. 2003.
-
(2003)
Proc. SPIE, Security and Watermarking of Multimedia Contents V
, pp. 191-202
-
-
Fridrich, J.1
Goljan, M.2
-
31
-
-
0347355319
-
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security
-
Feb
-
X. Zhang and S. Wang, "Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security," Pattern Recognition Letters, 25(3), pp. 331-339, Feb. 2004.
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.3
, pp. 331-339
-
-
Zhang, X.1
Wang, S.2
-
32
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Jun
-
D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition Letters, 24(9-10), pp. 1613-1626, Jun. 2003
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
33
-
-
11844253853
-
Steganography using multiple-base notational system and human vision sensitivity
-
Dec
-
X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, 12(1), pp. 67-70, Dec. 2005.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.1
, pp. 67-70
-
-
Zhang, X.1
Wang, S.2
-
34
-
-
33845456177
-
Multi bit plane image steganography
-
Proc. 5th Int. Workshop on Digital Watermarking
-
B. C. Nguyen, S. M. Yoon, and H. K. Lee, "Multi bit plane image steganography," in Proc. 5th Int. Workshop on Digital Watermarking, LNCS 2939, pp. 61-70, 2006.
-
(2006)
LNCS
, vol.2939
, pp. 61-70
-
-
Nguyen, B.C.1
Yoon, S.M.2
Lee, H.K.3
-
35
-
-
35048819204
-
Model-based steganography
-
Proc. 2nd Int. Workshop on Digital Watermarking
-
P. Sallee, "Model-based steganography," in Proc. 2nd Int. Workshop on Digital Watermarking, LNCS 4283, pp. 154-167, 2004.
-
(2004)
LNCS
, vol.4283
, pp. 154-167
-
-
Sallee, P.1
-
36
-
-
21144443873
-
Bit-plane decomposition steganography combined with JPEG2000 compression
-
Proc. 5th Int. Workshop on Information Hiding
-
H. Noda and J. Spaulding, "Bit-plane decomposition steganography combined with JPEG2000 compression," in Proc. 5th Int. Workshop on Information Hiding, LNCS 2578, pp. 295-309, 2002.
-
(2002)
LNCS
, vol.2578
, pp. 295-309
-
-
Noda, H.1
Spaulding, J.2
-
38
-
-
0001903053
-
Bounds on the area under the ROC curve
-
Jan
-
J. H. Shapiro, "Bounds on the area under the ROC curve," Journal of the Optical Society of America, 16(1), pp. 53-57, Jan. 1999.
-
(1999)
Journal of the Optical Society of America
, vol.16
, Issue.1
, pp. 53-57
-
-
Shapiro, J.H.1
|