-
1
-
-
44049093833
-
-
Online, Available
-
J. Hide&Seek. [Online]. Available: http://linux01.gwdg.de/~alatham/ stego.html.
-
J. Hide&Seek
-
-
-
2
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. J. C. Surges, "A tutorial on support vector machines for pattern recognition," Data Mining Knowl. Discovery, vol. 2, no. 2, pp. 121-167, 1998.
-
(1998)
Data Mining Knowl. Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Surges, C.J.C.1
-
3
-
-
0038005383
-
Identification of bitmap compression history: JPEG detection and quantizer estimation
-
Feb
-
Z. Fan and R. L. de Queiroz, "Identification of bitmap compression history: JPEG detection and quantizer estimation," IEEE Trans. Image Process., vol. 12, no. 2, pp. 30-235, Feb. 2003.
-
(2003)
IEEE Trans. Image Process
, vol.12
, Issue.2
, pp. 30-235
-
-
Fan, Z.1
de Queiroz, R.L.2
-
4
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
Proc. Information Hiding, 6th Int. Workshop
-
J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," Proc. Information Hiding, 6th Int. Workshop, ser. Lecture Notes Comput. Sci., vol. 3200, pp. 67-81, 2005.
-
(2005)
ser. Lecture Notes Comput. Sci
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
5
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Information Hiding, 5th Int. Workshop
-
J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," Information Hiding, 5th Int. Workshop, ser. Lecture Notes Comput. Sci., vol. 2578, pp. 310-323, 2002.
-
(2002)
ser. Lecture Notes Comput. Sci
, vol.2578
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
6
-
-
35048849011
-
Estimation of primary quantization matrix in double compressed JPEG images
-
presented at the, Cleveland, OH
-
J. Fridrich and J. Lukáš, "Estimation of primary quantization matrix in double compressed JPEG images," presented at the Digital Forensic Research Workshop, Cleveland, OH, 2003.
-
(2003)
Digital Forensic Research Workshop
-
-
Fridrich, J.1
Lukáš, J.2
-
7
-
-
34250355507
-
-
D. Fu, Y. Q. Shi, and Q. Su, A generalized Benford's law for JPEG coefficients and its applications in image forensics, in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents IX, 2007, 6505, pp. 1L1-1L11.
-
D. Fu, Y. Q. Shi, and Q. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents IX, 2007, vol. 6505, pp. 1L1-1L11.
-
-
-
-
8
-
-
33645695370
-
A graph-theoretic approach to steganography, Communications and Multimedia Security. 9th IFIP TC-6 TC-11 Int. Conf, ser
-
S. Hetzl and P. Mutzel, "A graph-theoretic approach to steganography," Communications and Multimedia Security. 9th IFIP TC-6 TC-11 Int. Conf, ser. Lecture Notes Comput. Sci., vol. 3677, pp. 119-128, 2005.
-
(2005)
Lecture Notes Comput. Sci
, vol.3677
, pp. 119-128
-
-
Hetzl, S.1
Mutzel, P.2
-
11
-
-
42949146877
-
Determining the stego algorithm for JPEG images
-
T. Pevný and J. Fridrich, "Determining the stego algorithm for JPEG images," Special Issue Proc. Inst. Elect. Eng, Inf. Security, vol. 153, pp. 75-139, 2006.
-
(2006)
Special Issue Proc. Inst. Elect. Eng, Inf. Security
, vol.153
, pp. 75-139
-
-
Pevný, T.1
Fridrich, J.2
-
12
-
-
27844572456
-
Statistical tools for digital image forensics,
-
Ph.D.dissertation, Dartmouth College, Hanover, NH, Dec
-
A. C. Popescu, "Statistical tools for digital image forensics," Ph.D.dissertation, Dartmouth College, Hanover, NH, Dec. 2004.
-
(2004)
-
-
Popescu, A.C.1
-
13
-
-
35048816032
-
Statistical tools for digital forensics
-
Information Hiding, 6th Int. Workshop
-
A. C. Popescu and H. Farid, "Statistical tools for digital forensics," Information Hiding, 6th Int. Workshop, ser. Lecture Notes Comput. Sci., vol. 3200, pp. 128-147.
-
ser. Lecture Notes Comput. Sci
, vol.3200
, pp. 128-147
-
-
Popescu, A.C.1
Farid, H.2
-
14
-
-
85084160704
-
Defending against statistical steganalysis
-
N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIXSecurity Symp., 2001, pp. 323-335.
-
(2001)
Proc. 10th USENIXSecurity Symp
, pp. 323-335
-
-
Provos, N.1
-
15
-
-
35048819204
-
Model based steganography., International Workshop on Digital Watermarking, ser
-
P. Sallee, "Model based steganography.," International Workshop on Digital Watermarking, ser. Lecture Notes Comput. Sci., vol. 2939, pp. 154-167, 2004.
-
(2004)
Lecture Notes Comput. Sci
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
16
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
P. Sallee, "Model-based methods for steganography and steganalysis," Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
17
-
-
33750927408
-
Exposing digital forgeries in video by detecting double MPEG compression
-
W. Wang and H. Farid, J. Dittmann and J. Fridrich, Eds, New York, pp
-
W. Wang and H. Farid, J. Dittmann and J. Fridrich, Eds., "Exposing digital forgeries in video by detecting double MPEG compression," in Proc. ACM Multimedia Security Workshop, New York, pp. 37-47.
-
Proc. ACM Multimedia Security Workshop
, pp. 37-47
-
-
-
18
-
-
84937814312
-
High capacity despite better steganalysis (F5 a steganographic algorithm
-
Information Hiding, 4th International Workshop
-
A. Westfeld, "High capacity despite better steganalysis (F5 a steganographic algorithm," Information Hiding, 4th International Workshop, ser. Lecture Notes Comput. Sci., vol. 2137, pp. 289-302, 2001.
-
(2001)
ser. Lecture Notes Comput. Sci
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
|