-
1
-
-
0036034444
-
-
J. Fridrich, M. Goljan, Practical steganalysis of digital images-state of the art, in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, 2002, pp. 1-13.
-
J. Fridrich, M. Goljan, Practical steganalysis of digital images-state of the art, in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, 2002, pp. 1-13.
-
-
-
-
2
-
-
0034787093
-
-
J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in color and grayscale images, in: Proceedings of ACM Workshop Multimedia Security, 2001, pp. 27-30.
-
J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in color and grayscale images, in: Proceedings of ACM Workshop Multimedia Security, 2001, pp. 27-30.
-
-
-
-
3
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
Dumitrescu S., Wu X., and Wang Z. Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. 51 7 (2003) 1995-2007
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
4
-
-
0041821327
-
A new approach to reliable detection of LSB steganography in natural image
-
Zhang T., and Ping X.J. A new approach to reliable detection of LSB steganography in natural image. Signal Process. 83 10 (2003) 545-548
-
(2003)
Signal Process.
, vol.83
, Issue.10
, pp. 545-548
-
-
Zhang, T.1
Ping, X.J.2
-
5
-
-
35048859775
-
-
P.Z. Lu, X.Y. Luo, Q.Y. Tang, S. Li, An improved sample pairs method for detection of LSB embedding, in: Proceedings of 6th Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, 2004, pp. 116-127.
-
P.Z. Lu, X.Y. Luo, Q.Y. Tang, S. Li, An improved sample pairs method for detection of LSB embedding, in: Proceedings of 6th Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, 2004, pp. 116-127.
-
-
-
-
6
-
-
35048835739
-
-
J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in: Proceedings of sixth Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, 2004, pp. 67-81.
-
J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in: Proceedings of sixth Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, 2004, pp. 67-81.
-
-
-
-
7
-
-
33646167860
-
-
T. Pevny, J. Fridrich, Toward multi-class blind steganalyzer for JPEG images, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 3710, Springer, Berlin, 2005, pp. 39-53.
-
T. Pevny, J. Fridrich, Toward multi-class blind steganalyzer for JPEG images, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 3710, Springer, Berlin, 2005, pp. 39-53.
-
-
-
-
8
-
-
2642549992
-
-
J. Fridrich, M. Goljan, D. Hogea, Attacking the outguess, in: Proceedings of ACM Workshop Multimedia Security, 2002, pp. 3-6.
-
J. Fridrich, M. Goljan, D. Hogea, Attacking the outguess, in: Proceedings of ACM Workshop Multimedia Security, 2002, pp. 3-6.
-
-
-
-
9
-
-
35248884299
-
-
J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proceedings of fifth International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, 2002, pp. 310-323.
-
J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proceedings of fifth International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, 2002, pp. 310-323.
-
-
-
-
11
-
-
44649114122
-
-
PictureMarc Embed Watermark, v 1.00.45, Copyright 1996, Digimarc Corporation.
-
PictureMarc Embed Watermark, v 1.00.45, Copyright 1996, Digimarc Corporation.
-
-
-
-
12
-
-
44649093482
-
-
M. Kutter, F. Jordan, JK-PGS (Pretty Good Signature). 1998, [Online]. Available: 〈http://www.epfl.ch/~kutter/watermarking/JK_PGS.html〉.
-
M. Kutter, F. Jordan, JK-PGS (Pretty Good Signature). 1998, [Online]. Available: 〈http://www.epfl.ch/~kutter/watermarking/JK_PGS.html〉.
-
-
-
-
13
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I.J., Kilian J., Leighton T., and Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6 12 (1997) 1673-1687
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
14
-
-
44649099702
-
-
Steganos II Security Suite. [Online]. Available: 〈http://www.steganos.com/english/steganos/download.htm〉.
-
Steganos II Security Suite. [Online]. Available: 〈http://www.steganos.com/english/steganos/download.htm〉.
-
-
-
-
15
-
-
44649182944
-
-
A. Brown, S-tools version 4.0. [Online]. Available: 〈http://members.tripod.com/steganography/stego/s-tools4.html〉.
-
A. Brown, S-tools version 4.0. [Online]. Available: 〈http://members.tripod.com/steganography/stego/s-tools4.html〉.
-
-
-
-
16
-
-
44649192599
-
-
J. Korejwa, Jsteg shell 2.0. [Online]. Available: 〈http://www.tiac.net/users/korejwa/steg.htm〉.
-
J. Korejwa, Jsteg shell 2.0. [Online]. Available: 〈http://www.tiac.net/users/korejwa/steg.htm〉.
-
-
-
-
17
-
-
0034775171
-
-
I. Avcibas, N. Memon, B. Sankur, Steganalysis of watermarking techniques using image quality metrics, in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 4314, 2000, pp. 523-531.
-
I. Avcibas, N. Memon, B. Sankur, Steganalysis of watermarking techniques using image quality metrics, in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 4314, 2000, pp. 523-531.
-
-
-
-
18
-
-
0036530067
-
Statistical evaluation of image quality measures
-
Avcibas I., Sankur B., and Sayood K. Statistical evaluation of image quality measures. J. Electron. Imaging 11 2 (2002) 206-223
-
(2002)
J. Electron. Imaging
, vol.11
, Issue.2
, pp. 206-223
-
-
Avcibas, I.1
Sankur, B.2
Sayood, K.3
-
19
-
-
0035791440
-
-
I. Avcibas, N. Memon, B. Sankur, Steganalysis based on image quality metrics, in: Proceedings of the fourth IEEE Workshop on Multimedia Signal Processing, 2001, pp. 517-522.
-
I. Avcibas, N. Memon, B. Sankur, Steganalysis based on image quality metrics, in: Proceedings of the fourth IEEE Workshop on Multimedia Signal Processing, 2001, pp. 517-522.
-
-
-
-
20
-
-
44649188091
-
-
H. Farid, Detecting steganographic messages in digital images, Technical Report TR2001-412, Dartmouth College, Hanover, NH, 2001.
-
H. Farid, Detecting steganographic messages in digital images, Technical Report TR2001-412, Dartmouth College, Hanover, NH, 2001.
-
-
-
-
21
-
-
0036452586
-
-
H. Farid, Detecting hidden messages using higher-order statistical models, in: Proceedings of IEEE International Conference on Image processing, vol. 2, 2002, pp. 905-908.
-
H. Farid, Detecting hidden messages using higher-order statistical models, in: Proceedings of IEEE International Conference on Image processing, vol. 2, 2002, pp. 905-908.
-
-
-
-
22
-
-
35248846436
-
-
H. Farid, S. Lyu, Detecting hidden messages using higher-order statistics and support vector machines, in: Proceedings of fifth International Information Hiding Workshop. Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, 2002, pp. 340-354.
-
H. Farid, S. Lyu, Detecting hidden messages using higher-order statistics and support vector machines, in: Proceedings of fifth International Information Hiding Workshop. Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, 2002, pp. 340-354.
-
-
-
-
23
-
-
8844256156
-
-
S. Lyu, H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004, pp. 35-45.
-
S. Lyu, H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004, pp. 35-45.
-
-
-
-
24
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
Lyu S., and Farid H. Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forensics Secur. 1 1 (2006) 111-119
-
(2006)
IEEE Trans. Inf. Forensics Secur.
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
25
-
-
33646134392
-
-
T. Holotyak, J. Fridrich, S. Voloshynovskiy, Blind statistical steganalysis of additive steganography using wavelet higher order statistics, in: Proceedings of ninth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 2005, pp. 273-274.
-
T. Holotyak, J. Fridrich, S. Voloshynovskiy, Blind statistical steganalysis of additive steganography using wavelet higher order statistics, in: Proceedings of ninth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Lecture Notes in Computer Science, vol. 3677, Springer, Berlin, 2005, pp. 273-274.
-
-
-
-
26
-
-
33845525292
-
Blind steganography detection using a computational immune system: a work in progress
-
Jackson J.T., Gunsch G.H., Claypoole Jr. R.L., and Lamont G.B. Blind steganography detection using a computational immune system: a work in progress. Int. J. Digit. Evidence 4 1 (2003) 1-19
-
(2003)
Int. J. Digit. Evidence
, vol.4
, Issue.1
, pp. 1-19
-
-
Jackson, J.T.1
Gunsch, G.H.2
Claypoole Jr., R.L.3
Lamont, G.B.4
-
27
-
-
0141607645
-
-
J. T. Jackson, G. H. Gunsch, R. L. Claypoole, Jr., G. B. Lamont, Wavelet-based steganalysis using a computational immune system approach, in: Proceedings of the SPIE, Visual Communications and Image Processing, vol. 5150, 2003, pp. 1884-1894.
-
J. T. Jackson, G. H. Gunsch, R. L. Claypoole, Jr., G. B. Lamont, Wavelet-based steganalysis using a computational immune system approach, in: Proceedings of the SPIE, Visual Communications and Image Processing, vol. 5150, 2003, pp. 1884-1894.
-
-
-
-
28
-
-
14544299158
-
A new blind method for detecting novel steganography
-
McBride B.T., Peterson G.L., and Gustafson S.C. A new blind method for detecting novel steganography. Digit. Invest. 2 1 (2005) 50-70
-
(2005)
Digit. Invest.
, vol.2
, Issue.1
, pp. 50-70
-
-
McBride, B.T.1
Peterson, G.L.2
Gustafson, S.C.3
-
29
-
-
33645676686
-
-
M. Goljan, J. Fridrich, T. Holotyak. New blind steganalysis and its implications, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 1-13.
-
M. Goljan, J. Fridrich, T. Holotyak. New blind steganalysis and its implications, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 1-13.
-
-
-
-
30
-
-
36048970091
-
-
B.M. Rodriguez, G.L. Peterson, S.S. Agaian, Steganography anomaly detection using simple one-class classification, in: Proceedings of the SPIE, Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6579, 2007, pp. 65790E.1-65790E.9.
-
B.M. Rodriguez, G.L. Peterson, S.S. Agaian, Steganography anomaly detection using simple one-class classification, in: Proceedings of the SPIE, Mobile Multimedia/Image Processing for Military and Security Applications, vol. 6579, 2007, pp. 65790E.1-65790E.9.
-
-
-
-
31
-
-
0242576328
-
-
J.J. Harmsen, W.A. Pearlman, Steganalysis of additive noise modelable information hiding, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, 2003, pp. 131-142.
-
J.J. Harmsen, W.A. Pearlman, Steganalysis of additive noise modelable information hiding, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, 2003, pp. 131-142.
-
-
-
-
32
-
-
24744444102
-
-
Y.Q. Shi, G.R. Xuan, C.Y. Yang, J.J. Gao, Z.P. Zhang, P.Q. Chai, D.K. Zou, C.H. Chen, W. Chen, Effective steganalysis based on statistical moments of wavelet characteristic function, in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, 2005, pp. 768-773.
-
Y.Q. Shi, G.R. Xuan, C.Y. Yang, J.J. Gao, Z.P. Zhang, P.Q. Chai, D.K. Zou, C.H. Chen, W. Chen, Effective steganalysis based on statistical moments of wavelet characteristic function, in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, 2005, pp. 768-773.
-
-
-
-
33
-
-
42749106257
-
-
G.R. Xuan, J.J. Gao, Y.Q. Shi, D.K. Zou, Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain, in: Proceedings of IEEE International Workshop on Multimedia Signal Processing, 2005, pp. 1-4.
-
G.R. Xuan, J.J. Gao, Y.Q. Shi, D.K. Zou, Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain, in: Proceedings of IEEE International Workshop on Multimedia Signal Processing, 2005, pp. 1-4.
-
-
-
-
34
-
-
33746647772
-
-
G.R. Xuan, Y.Q. Shi, J.J. Gao, D.K. Zou, C.Y. Yang, Z.P. Zhang, P.Q. Chai, C.H. Chen, W. Chen, Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions, in: Proceedings of seventh International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3727, Springer, Berlin, 2005, pp. 262-277.
-
G.R. Xuan, Y.Q. Shi, J.J. Gao, D.K. Zou, C.Y. Yang, Z.P. Zhang, P.Q. Chai, C.H. Chen, W. Chen, Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions, in: Proceedings of seventh International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3727, Springer, Berlin, 2005, pp. 262-277.
-
-
-
-
35
-
-
42949152730
-
-
C.H. Chen, Y.Q. Shi, W. Chen, G.R. Xuan, Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function, in: Proceedings of IEEE International Conference on Image Processing, 2006, pp. 105-108.
-
C.H. Chen, Y.Q. Shi, W. Chen, G.R. Xuan, Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function, in: Proceedings of IEEE International Conference on Image Processing, 2006, pp. 105-108.
-
-
-
-
36
-
-
33750555925
-
-
Y.Q. Shi, G.R. Xuan, D.K. Zou, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, in: Proceedings of IEEE International Conference on Multimedia and Expo, 2005, pp. 269-272.
-
Y.Q. Shi, G.R. Xuan, D.K. Zou, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, in: Proceedings of IEEE International Conference on Multimedia and Expo, 2005, pp. 269-272.
-
-
-
-
37
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
Wang Y., and Moulin P. Optimized feature extraction for learning-based image steganalysis. IEEE Trans. Inf. Forensics Secur. 2 1 (2007) 31-45
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, Issue.1
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
38
-
-
34147139894
-
-
X.C. Chen, Y.H. Wang, T.N. Tan, L. Guo, Blind image steganalysis based on statistical analysis of empirical matrix, in: Proceedings of 18th International Conference on Pattern Recognition, vol. 3, 2006, pp. 1107-1110.
-
X.C. Chen, Y.H. Wang, T.N. Tan, L. Guo, Blind image steganalysis based on statistical analysis of empirical matrix, in: Proceedings of 18th International Conference on Pattern Recognition, vol. 3, 2006, pp. 1107-1110.
-
-
-
-
39
-
-
21844460833
-
-
K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath, Steganalysis of spread spectrum data hiding exploiting cover memory, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 2005, pp. 38-46.
-
K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath, Steganalysis of spread spectrum data hiding exploiting cover memory, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 2005, pp. 38-46.
-
-
-
-
40
-
-
33845426373
-
-
G.R. Xuan, Y.Q. Shi, C. Huang, D.D. Fu, X.M. Zhu, P.Q. Chai, J.J. Gao, Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA), in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 4283, Springer, Berlin, 2006, pp. 49-60.
-
G.R. Xuan, Y.Q. Shi, C. Huang, D.D. Fu, X.M. Zhu, P.Q. Chai, J.J. Gao, Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA), in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 4283, Springer, Berlin, 2006, pp. 49-60.
-
-
-
-
41
-
-
34250775433
-
-
D.D. Fu, Y.Q. Shi, D.K. Zou, G.R. Xuan, JPEG steganalysis using empirical transition matrix in block DCT domain, in: Proceedings of IEEE International Workshop on Multimedia Signal Processing, 2006, pp. 310-313.
-
D.D. Fu, Y.Q. Shi, D.K. Zou, G.R. Xuan, JPEG steganalysis using empirical transition matrix in block DCT domain, in: Proceedings of IEEE International Workshop on Multimedia Signal Processing, 2006, pp. 310-313.
-
-
-
-
42
-
-
29044433896
-
A feature-based classification technique for blind image steganalysis
-
Lie W.N., and Lin G.S. A feature-based classification technique for blind image steganalysis. IEEE Trans. Multimedia 7 6 (2005) 1007-1020
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.6
, pp. 1007-1020
-
-
Lie, W.N.1
Lin, G.S.2
-
43
-
-
11244311724
-
-
G.S. Lin, C.H. Yeh, C.C. Jay Kuo, Data hiding domain classification for blind image steganalysis, in: Proceedings of IEEE International Conference on Multimedia and Expo, 2004, pp. 907-910.
-
G.S. Lin, C.H. Yeh, C.C. Jay Kuo, Data hiding domain classification for blind image steganalysis, in: Proceedings of IEEE International Conference on Multimedia and Expo, 2004, pp. 907-910.
-
-
-
-
44
-
-
0038667918
-
Features extraction based on the Bhattacharyya distance
-
Choi E., and Lee C. Features extraction based on the Bhattacharyya distance. Pattern Recogn. 36 8 (2003) 1703-1709
-
(2003)
Pattern Recogn.
, vol.36
, Issue.8
, pp. 1703-1709
-
-
Choi, E.1
Lee, C.2
-
45
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Burges C. A tutorial on support vector machines for pattern recognition. Data Mining Knowl. Disc 2 (1998) 121-167
-
(1998)
Data Mining Knowl. Disc
, vol.2
, pp. 121-167
-
-
Burges, C.1
-
46
-
-
44649122313
-
-
C.C. Chang, C.J. Lin, LIBSVM: A Library for Support Vector Machines, 2001 [Online]. Available: 〈http://www.csie.ntu.edu.tw/~cjlin/libsvm〉.
-
C.C. Chang, C.J. Lin, LIBSVM: A Library for Support Vector Machines, 2001 [Online]. Available: 〈http://www.csie.ntu.edu.tw/~cjlin/libsvm〉.
-
-
-
-
48
-
-
0023383122
-
-
P.P. Vaidyanathan, Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques, IEEE ASSP Mag. (1987) 4-20.
-
P.P. Vaidyanathan, Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques, IEEE ASSP Mag. (1987) 4-20.
-
-
-
-
49
-
-
44649199434
-
-
R. Machado, EZStego. [Online]. Available: 〈http://www.ezstego.com〉.
-
R. Machado, EZStego. [Online]. Available: 〈http://www.ezstego.com〉.
-
-
-
-
50
-
-
44649164055
-
-
N. Provos, Outguess. Software available at 〈www.outguess.org〉.
-
N. Provos, Outguess. Software available at 〈www.outguess.org〉.
-
-
-
-
51
-
-
0000764772
-
The use of multiple measures in taxonomic problems
-
Fisher R. The use of multiple measures in taxonomic problems. Ann. Eugenics 7 (1936) 179-188
-
(1936)
Ann. Eugenics
, vol.7
, pp. 179-188
-
-
Fisher, R.1
-
53
-
-
44649144059
-
-
A. Westfeld, F5. [Online]. Available: 〈http://www.wrn.inf.tu-dresden.de/westfeld/f5〉.
-
A. Westfeld, F5. [Online]. Available: 〈http://www.wrn.inf.tu-dresden.de/westfeld/f5〉.
-
-
-
-
55
-
-
0242581862
-
-
F. Alturki, R. Mersereau, A novel approach for increasing security and data embedding capacity in images for data hiding applications, in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, 1997, pp. 228-233.
-
F. Alturki, R. Mersereau, A novel approach for increasing security and data embedding capacity in images for data hiding applications, in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, 1997, pp. 228-233.
-
-
-
-
56
-
-
44649149778
-
-
CorelDraw Software. [Online]. Available: 〈http://www.corel.com〉.
-
CorelDraw Software. [Online]. Available: 〈http://www.corel.com〉.
-
-
-
-
57
-
-
0031354216
-
-
A. Piva, M. Barni, F. Bartolini, V. Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, in: Proceedings of IEEE International Conference on Image Processing, vol. 1, 1997, pp. 520.
-
A. Piva, M. Barni, F. Bartolini, V. Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, in: Proceedings of IEEE International Conference on Image Processing, vol. 1, 1997, pp. 520.
-
-
-
-
58
-
-
0032051323
-
An adaptive image watermarking scheme based on visual masking
-
Huang J.W., and Shi Y.Q. An adaptive image watermarking scheme based on visual masking. IEE Electron. Lett. 34 8 (1998) 748-750
-
(1998)
IEE Electron. Lett.
, vol.34
, Issue.8
, pp. 748-750
-
-
Huang, J.W.1
Shi, Y.Q.2
-
59
-
-
84952369138
-
-
B. Chen, G.W. Wornell. Digital watermarking and information embedding using dither modulation, in: Proceedings of IEEE international workshop on multimedia signal processing, 1998, pp. 273-278.
-
B. Chen, G.W. Wornell. Digital watermarking and information embedding using dither modulation, in: Proceedings of IEEE international workshop on multimedia signal processing, 1998, pp. 273-278.
-
-
-
-
60
-
-
35048819204
-
-
P. Sallee, Model-based steganography, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 2939, Springer, Berlin, 2003, pp. 154-167.
-
P. Sallee, Model-based steganography, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 2939, Springer, Berlin, 2003, pp. 154-167.
-
-
-
-
61
-
-
0031078007
-
Feature selection: evaluation, application, and small sample performance
-
Jain A., and Zongker D. Feature selection: evaluation, application, and small sample performance. IEEE Trans. Pattern Anal. Mach. Intell. 19 2 (1997) 153-158
-
(1997)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.19
, Issue.2
, pp. 153-158
-
-
Jain, A.1
Zongker, D.2
-
62
-
-
44649152513
-
-
A. Latham, JPEG Hide-and-Seek. [Online]. Available: 〈linux01.gwdg.de/alatham/stego〉.
-
A. Latham, JPEG Hide-and-Seek. [Online]. Available: 〈linux01.gwdg.de/alatham/stego〉.
-
-
-
-
63
-
-
44649125615
-
-
S. Hetzl, Steghide. [Online]. Available: 〈steghide.sourceforge.net〉.
-
S. Hetzl, Steghide. [Online]. Available: 〈steghide.sourceforge.net〉.
-
-
-
-
64
-
-
0141489940
-
-
T. Ogihara, D. Nakamura, N. Yokoya, Data embedding into pictorial with less distortion using discrete cosine transform, in: Proceedings of International Conference on Pattern Recognition, 1996, pp. 675-679.
-
T. Ogihara, D. Nakamura, N. Yokoya, Data embedding into pictorial with less distortion using discrete cosine transform, in: Proceedings of International Conference on Pattern Recognition, 1996, pp. 675-679.
-
-
-
-
65
-
-
0033698176
-
-
W.N. Lie, G.S. Lin, C.L. Wu, Robust image watermarking on the DCT domain, in: Proceedings of IEEE International Symposium on Circuits and Systems, 2000, pp. 1228-1231.
-
W.N. Lie, G.S. Lin, C.L. Wu, Robust image watermarking on the DCT domain, in: Proceedings of IEEE International Symposium on Circuits and Systems, 2000, pp. 1228-1231.
-
-
-
-
66
-
-
0032075445
-
Robust image watermarking in the spatial domain
-
Nikolaidis N., and Pitas I. Robust image watermarking in the spatial domain. Signal Process. 66 3 (1998) 385-403
-
(1998)
Signal Process.
, vol.66
, Issue.3
, pp. 385-403
-
-
Nikolaidis, N.1
Pitas, I.2
-
67
-
-
0033309034
-
-
W. Lie, L. Chang, Data hiding in images with adaptive numbers of least significant bits based on human visual system, in: Proceedings of IEEE International Conference on Image Processing, 1999, pp. 286-290.
-
W. Lie, L. Chang, Data hiding in images with adaptive numbers of least significant bits based on human visual system, in: Proceedings of IEEE International Conference on Image Processing, 1999, pp. 286-290.
-
-
-
-
68
-
-
0030384775
-
Techniques for data hiding
-
Bender W., Gruhl D., Morimot N., and Lu A. Techniques for data hiding. IBM Syst. J. 35 3 (1996) 313-336
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimot, N.3
Lu, A.4
-
69
-
-
0033099591
-
Wavelet based watermarking method for digital images using the human visual system
-
Kim Y.S., Kwon O.H., and Park R.H. Wavelet based watermarking method for digital images using the human visual system. Electron. Lett. 35 6 (1999) 466-468
-
(1999)
Electron. Lett.
, vol.35
, Issue.6
, pp. 466-468
-
-
Kim, Y.S.1
Kwon, O.H.2
Park, R.H.3
-
71
-
-
0033686310
-
-
C. Wong, C. Chen, S. Yeh, K-means-based fuzzy classifier design, in: Proceedings of ninth IEEE International Conference on Fuzzy Systems, vol.1, 2000, pp. 48-52.
-
C. Wong, C. Chen, S. Yeh, K-means-based fuzzy classifier design, in: Proceedings of ninth IEEE International Conference on Fuzzy Systems, vol.1, 2000, pp. 48-52.
-
-
-
-
72
-
-
0024700097
-
A theory for multiresolution signal decomposition: the wavelet representation
-
Mallat S. A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11 7 (1989) 674-693
-
(1989)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.11
, Issue.7
, pp. 674-693
-
-
Mallat, S.1
-
74
-
-
8844264523
-
-
S. S. Agaian, B. M. Rodriguez, G. Dietrich, Steganalysis using modified pixel comparison and complexity, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004, pp. 46-57.
-
S. S. Agaian, B. M. Rodriguez, G. Dietrich, Steganalysis using modified pixel comparison and complexity, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, 2004, pp. 46-57.
-
-
-
-
75
-
-
21844461602
-
-
J. Fridrich, D. Soukal, M. Goljan, Maximum likelihood estimation of length of secret message embedded using +-K steganography in spatial domain, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 2005, pp. 595-606.
-
J. Fridrich, D. Soukal, M. Goljan, Maximum likelihood estimation of length of secret message embedded using +-K steganography in spatial domain, in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, 2005, pp. 595-606.
-
-
-
-
76
-
-
33847697308
-
Steganalysis of embedding in two least-significant bits
-
Ker A.D. Steganalysis of embedding in two least-significant bits. IEEE Trans. Inf. Forensics Secur. 2 1 (2007) 46-54
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, Issue.1
, pp. 46-54
-
-
Ker, A.D.1
-
77
-
-
39149108495
-
-
X.Y. Luo, C.F. Yang, D.S. Wang, F.L. Liu, LTSB steganalysis based on quartic equation, LNCS Trans. Data Hid. Multimedia Secur. (II) (2007) 68-90.
-
X.Y. Luo, C.F. Yang, D.S. Wang, F.L. Liu, LTSB steganalysis based on quartic equation, LNCS Trans. Data Hid. Multimedia Secur. (II) (2007) 68-90.
-
-
-
-
78
-
-
33646167860
-
-
T. Pevny, J. Fridrich, Towards multi-class blind steganalyzer for JPEG images, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 3710, Springer, Berlin, 2005, pp. 39-53.
-
T. Pevny, J. Fridrich, Towards multi-class blind steganalyzer for JPEG images, in: Proceedings of International Workshop on Digital Watermarking, Lecture Notes in Computer Science, vol. 3710, Springer, Berlin, 2005, pp. 39-53.
-
-
-
-
79
-
-
33645660635
-
-
T. Pevny, J. Fridrich, Multi-class blind steganalysis for JPEG images, in: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 60720O.1-60720O.13.
-
T. Pevny, J. Fridrich, Multi-class blind steganalysis for JPEG images, in: Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, 2006, pp. 60720O.1-60720O.13.
-
-
-
-
80
-
-
47249154012
-
-
B. M. Rodriguez, G. L. Peterson, S. S. Agaian, Multi-class classification averaging fusion for detecting steganography, in: Proceedings of IEEE International Conference on System of Systems Engineering, 2007, pp. 1-5.
-
B. M. Rodriguez, G. L. Peterson, S. S. Agaian, Multi-class classification averaging fusion for detecting steganography, in: Proceedings of IEEE International Conference on System of Systems Engineering, 2007, pp. 1-5.
-
-
-
-
81
-
-
44649115383
-
-
NRCS Photo Gallery. [Online]. Available: 〈http://photogallery.nrcs.usda.gov〉
-
NRCS Photo Gallery. [Online]. Available: 〈http://photogallery.nrcs.usda.gov〉
-
-
-
-
82
-
-
49949091527
-
-
K. Solanki, A. Sarkar, B.S. Manjunath, YASS: Yet another steganographic scheme that resists blind steganalysis, in: Proceedings of 9th International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 4567, 2007, pp. 16-31.
-
K. Solanki, A. Sarkar, B.S. Manjunath, YASS: Yet another steganographic scheme that resists blind steganalysis, in: Proceedings of 9th International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 4567, 2007, pp. 16-31.
-
-
-
|