-
1
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington DC, USA
-
Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA (2001)
-
(2001)
10th USENIX Security Symposium
-
-
Provos, N.1
-
2
-
-
33645695370
-
A graph theoretic approach to steganography
-
Salzburg, Austria
-
Hetzl, S., Mutzel, P.: A graph theoretic approach to steganography. In: 9th IFIP TC-6 TC-11 International Conference, Communications and Multimedia Security, Salzburg, Austria, vol. 3677, pp. 119-128 (2005)
-
(2005)
9th IFIP TC-6 TC-11 International Conference, Communications and Multimedia Security
, vol.3677
, pp. 119-128
-
-
Hetzl, S.1
Mutzel, P.2
-
3
-
-
35048819204
-
-
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, 2939, pp. 154-167. Springer, Heidelberg (2004)
-
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154-167. Springer, Heidelberg (2004)
-
-
-
-
4
-
-
49949105608
-
Writing on wet paper
-
Magdeburg, Germany
-
Fridrich, J., Goljan, M., Lisoněk, P., Soukal, D.: Writing on wet paper. In: ACM Workshop on Multimedia and security, Magdeburg, Germany (2004)
-
(2004)
ACM Workshop on Multimedia and security
-
-
Fridrich, J.1
Goljan, M.2
Lisoněk, P.3
Soukal, D.4
-
5
-
-
84937814312
-
High capacity despite better steganalysis (F5 - a steganographic algorithm)
-
Moskowitz, I.S, ed, Information Hiding, Springer, Heidelberg
-
Westfeld, A.: High capacity despite better steganalysis (F5 - a steganographic algorithm). In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
6
-
-
33749589438
-
Statistical restoration for robust and secure steganography
-
Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Statistical restoration for robust and secure steganography. In: Proc. ICIP, Genova, Italy, pp. II 1118-1121 (2005)
-
(2005)
Proc. ICIP, Genova, Italy, pp. II
, pp. 1118-1121
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
7
-
-
78649828992
-
Probably secure steganography: Achieving zero K-L divergence using statistical restoration
-
Atlanta, GA, USA, pp
-
Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Probably secure steganography: Achieving zero K-L divergence using statistical restoration. In: Proc. ICIP, Atlanta, GA, USA, pp. 125-128 (2006)
-
(2006)
Proc. ICIP
, pp. 125-128
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
8
-
-
84938696768
-
Steganalysis of block-DCT image steganography
-
IEEE Computer Society Press, Los Alamitos
-
Wang, Y., Moulin, P.: Steganalysis of block-DCT image steganography. In: IEEE workshop on Statistical Signal Processing, IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE workshop on Statistical Signal Processing
-
-
Wang, Y.1
Moulin, P.2
-
9
-
-
33645660635
-
Multi-class blind steganalysis for JPEG images
-
San Jose, CA
-
Pevny, T., Fridrich, J.: Multi-class blind steganalysis for JPEG images. In: Proc. of SPIE, San Jose, CA (2006)
-
(2006)
Proc. of SPIE
-
-
Pevny, T.1
Fridrich, J.2
-
10
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
San Jose, CA
-
Pevny, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. of SPIE, San Jose, CA (2007)
-
(2007)
Proc. of SPIE
-
-
Pevny, T.1
Fridrich, J.2
-
11
-
-
0036448130
-
Image steganalysis with binary similarity measures
-
Avcibas, I., Sankur, B., Memon, N.: Image steganalysis with binary similarity measures. In: Proc. ICIP, pp. 645-648 (2002)
-
(2002)
Proc. ICIP
, pp. 645-648
-
-
Avcibas, I.1
Sankur, B.2
Memon, N.3
-
12
-
-
49949086857
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Ershov, A.P, Nepomniaschy, V.A, eds, International Symposium on Theoretical Programming, Springer, Heidelberg
-
Lyu, S., Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: Ershov, A.P., Nepomniaschy, V.A. (eds.) International Symposium on Theoretical Programming. LNCS, vol. 5, Springer, Heidelberg (1974)
-
(1974)
LNCS
, vol.5
-
-
Lyu, S.1
Farid, H.2
-
13
-
-
49949117092
-
-
Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Yang, C., Zhang, Z., Chai, P., Chen, C., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Sohlender, B., Frielinghaus, W. (eds.) GI - 3. Fachtagung über Programmiersprachen. LNCS, 7th International Workshop on Information Hiding, Springer, Heidelberg (1974)
-
Xuan, G., Shi, Y.Q., Gao, J., Zou, D., Yang, C., Yang, C., Zhang, Z., Chai, P., Chen, C., Chen, W.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Sohlender, B., Frielinghaus, W. (eds.) GI - 3. Fachtagung über Programmiersprachen. LNCS, vol. 7th International Workshop on Information Hiding, Springer, Heidelberg (1974)
-
-
-
-
14
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. of SPIE, pp. 131-142 (2003)
-
(2003)
Proc. of SPIE
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
15
-
-
49949087221
-
A Markov process based approach to effective attacking JPEG steganography
-
Leilich, H.-O, ed, GI-NTG Fachtagung Struktur und Betrieb von Rechensystemen, Springer, Heidelberg
-
Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Leilich, H.-O. (ed.) GI-NTG Fachtagung Struktur und Betrieb von Rechensystemen. LNCS, Springer, Heidelberg (1974)
-
(1974)
LNCS
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
17
-
-
4744365298
-
Detection of hiding in the least significant bit
-
Supplement on Secure Media I
-
Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing, Supplement on Secure Media I 52, 3046-3058 (2004)
-
(2004)
IEEE Transactions on Signal Processing
, vol.52
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
18
-
-
9744279131
-
Robust image-adaptive data hiding based on erasure and error correction
-
Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B.S., Chandrasekaran, S.: Robust image-adaptive data hiding based on erasure and error correction. IEEE Trans. on Image Processing 13, 1627-1639 (2004)
-
(2004)
IEEE Trans. on Image Processing
, vol.13
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
20
-
-
42949152730
-
Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function
-
Atlanta, GA, USA, pp
-
Chen, C., Shi, Y.Q., Chen, W., Xuan, G.: Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function. In: Proc. ICIP, Atlanta, GA, USA, pp. 105-108 (2006)
-
(2006)
Proc. ICIP
, pp. 105-108
-
-
Chen, C.1
Shi, Y.Q.2
Chen, W.3
Xuan, G.4
-
21
-
-
84957868624
-
An information theoretic model for steganography
-
2nd Int'l Workshop on Info. Hiding
-
Cachin, C.: An information theoretic model for steganography. In: 2nd Int'l Workshop on Info. Hiding. LNCS, vol. 1525, pp. 306-318 (1998)
-
(1998)
LNCS
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
22
-
-
33744728031
-
Steganalysis for Markov cover data with applications to images
-
Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensics and Security 1, 275-287 (2006)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.4
-
23
-
-
34250775433
-
JPEG steganalysis using empirical transition matrix in block dct domain
-
Victoria, BC, Canada
-
Fu, D., Shi, Y.Q., Zou, D., Xuan, G.: JPEG steganalysis using empirical transition matrix in block dct domain. In: International Workshop on Multimedia Signal Processing, Victoria, BC, Canada (2006)
-
(2006)
International Workshop on Multimedia Signal Processing
-
-
Fu, D.1
Shi, Y.Q.2
Zou, D.3
Xuan, G.4
-
24
-
-
78649869719
-
Cover selection for steganographic embedding
-
Kharrazi, M., Sencar, H.T., Memon, N.: Cover selection for steganographic embedding. In: Proc. ICIP, pp. 117-120 (2006)
-
(2006)
Proc. ICIP
, pp. 117-120
-
-
Kharrazi, M.1
Sencar, H.T.2
Memon, N.3
-
25
-
-
0001585514
-
Coding theorems for turbo-like codes
-
Divsalar, D., Jin, H., McEliece, R.J.: Coding theorems for turbo-like codes. In: 36th Allerton Conf. on Communications, Control, and Computing, pp. 201-210 (1998)
-
(1998)
36th Allerton Conf. on Communications, Control, and Computing
, pp. 201-210
-
-
Divsalar, D.1
Jin, H.2
McEliece, R.J.3
-
26
-
-
0035246564
-
Factor graphs and the sum-product algorithm
-
Kschischang, F.R., Frey, B.J., Loeliger, H.A.: Factor graphs and the sum-product algorithm. IEEE Trans. on Info. Theory 47, 498-519 (2001)
-
(2001)
IEEE Trans. on Info. Theory
, vol.47
, pp. 498-519
-
-
Kschischang, F.R.1
Frey, B.J.2
Loeliger, H.A.3
-
27
-
-
33645666341
-
Matrix embedding for large payloads
-
Fridrich, J., Soukal, D.: Matrix embedding for large payloads. In: Proc. of SPIE, pp. 727-738 (2006)
-
(2006)
Proc. of SPIE
, pp. 727-738
-
-
Fridrich, J.1
Soukal, D.2
|