-
1
-
-
49949101272
-
-
available at
-
Upham, D.: Jsteg (1993), Online available at http://munitions.vipul.net/ software/steganography/jpeg-jsteg-v4.diff.gz
-
(1993)
Online
-
-
Upham, D.1
Jsteg2
-
2
-
-
84892764719
-
-
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, 1768, pp. 61-76. Springer, Heidelberg (2000)
-
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61-76. Springer, Heidelberg (2000)
-
-
-
-
3
-
-
49949085316
-
-
available at
-
Provos, N.: Outguess (2001), Online available at http://www.outguess.org
-
(2001)
Online
-
-
Provos, N.1
Outguess2
-
4
-
-
84937814312
-
F5-a steganographic algorithm: High capacity despite better steganalysis
-
Moskowitz, I.S, ed, Information Hiding, Springer, Heidelberg
-
Westfeld, A.: F5-a steganographic algorithm: High capacity despite better steganalysis. In: Moskowitz, I.S. (ed.) Information Hiding. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
5
-
-
35048819204
-
-
Sallee, P.: Model-based steganography. In: Kalker, T., Ro, Y.M., Cox, I.J. (eds.) IWDW 2003. LNCS, 2939, pp. 154-167. Springer, Heidelberg (2004)
-
Sallee, P.: Model-based steganography. In: Kalker, T., Ro, Y.M., Cox, I.J. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154-167. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
Camenisch, J, Collberg, C, Johnson, N.F, Sallee, P, eds, Information Hiding 8th International Workshop, Berlin Heidelberg, Springer, Heidelberg
-
Shi, Y.Q., Chen, C., Chen, W.: A Markov process based approach to effective attacking JPEG steganography. In: Camenisch, J., Collberg, C., Johnson, N.F., Sallee, P. (eds.) Information Hiding (8th International Workshop), Berlin Heidelberg. LNCS, vol. 4437, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4437
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
7
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
Delp III, E.J, Wong, P.W, eds, San Jose, CA
-
Pevný, T., Fridrich, J.: Merging Markov and DCT features for multi-class JPEG steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents IX (Proc. of SPIE), San Jose, CA (2007)
-
(2007)
Security, Steganography and Watermarking of Multimedia Contents IX (Proc. of SPIE)
-
-
Pevný, T.1
Fridrich, J.2
-
8
-
-
0242665592
-
Higher-order statistical steganalysis of palette images
-
Delp III, E.J, Wong, P.W, eds, San Jose, CA, pp
-
Fridrich, J., Goljan, M., Soukal, D.: Higher-order statistical steganalysis of palette images. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents V (Proc. of SPIE), San Jose, CA, pp. 178-190 (2003)
-
(2003)
Security, Steganography and Watermarking of Multimedia Contents V (Proc. of SPIE)
, pp. 178-190
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
9
-
-
0035472155
-
Detecting LSB steganography in color and grayscale images
-
Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Multimedia 8(4), 22-28 (2001)
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
10
-
-
35248901820
-
-
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 355-372. Springer, Heidelberg (2003)
-
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 355-372. Springer, Heidelberg (2003)
-
-
-
-
11
-
-
21844474313
-
Space filling curves in steganalysis
-
Delp III, E.J, Wong, P.W, eds, San Jose, CA, pp
-
Westfeld, A.: Space filling curves in steganalysis. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia Contents VII (Proc. of SPIE), San Jose, CA, pp. 28-37 (2005)
-
(2005)
Security, Steganography and Watermarking of Multimedia Contents VII (Proc. of SPIE)
, pp. 28-37
-
-
Westfeld, A.1
-
12
-
-
35048859775
-
-
Lu, P., Luo, X., Tang, Q., Shen, L.: An improved sample pairs method for detection of LSB embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 116-127. Springer, Heidelberg (2004)
-
Lu, P., Luo, X., Tang, Q., Shen, L.: An improved sample pairs method for detection of LSB embedding. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 116-127. Springer, Heidelberg (2004)
-
-
-
-
13
-
-
10044282531
-
On estimation of secret message length in Jsteg-like steganography
-
Yu, X., Wang, Y., Tan, T.: On estimation of secret message length in Jsteg-like steganography. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), pp. 673-676 (2004)
-
(2004)
Proceedings of the 17th International Conference on Pattern Recognition (ICPR
, pp. 673-676
-
-
Yu, X.1
Wang, Y.2
Tan, T.3
-
14
-
-
0038675417
-
A fast and effective steganalytic technique against Jsteg-like algorithms
-
Melbourne, Florida, USA, March 9-12, ACM Press, New York
-
Zhang, T., Ping, X.: A fast and effective steganalytic technique against Jsteg-like algorithms. In: SAC 2003. Proceedings of the 2003 ACM Symposium on Applied Computing, Melbourne, Florida, USA, March 9-12, 2003, pp. 307-311. ACM Press, New York (2003)
-
(2003)
SAC 2003. Proceedings of the 2003 ACM Symposium on Applied Computing
, pp. 307-311
-
-
Zhang, T.1
Ping, X.2
-
15
-
-
33845385696
-
-
Lee, K., Westfeld, A., Lee, S.: Category Attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, 4283, pp. 35-48. Springer, Heidelberg (2006)
-
Lee, K., Westfeld, A., Lee, S.: Category Attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 35-48. Springer, Heidelberg (2006)
-
-
-
-
16
-
-
33845440793
-
-
Westfeld, A.: Steganalysis in the presence of weak cryptography and encoding. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, 4283, pp. 19-34. Springer, Heidelberg (2006)
-
Westfeld, A.: Steganalysis in the presence of weak cryptography and encoding. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 19-34. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
2542597929
-
-
University of Washington
-
University of Washington: CBIR image database (2004), http://www.cs.washington.edu/research/imagedatabase/groundtruth
-
(2004)
CBIR image database
-
-
-
18
-
-
49949090632
-
-
NRCS: Natural Resources Conservation Service
-
NRCS: Photo gallery of the USDA Natural Resources Conservation Service (2006), http://photogallery.nrcs.usda.gov/
-
(2006)
Photo gallery of the USDA
-
-
-
19
-
-
0029721670
-
Study of DCT coefficient distributions
-
San Jose, CA
-
Smoot, S.R., Rowe, L.A.: Study of DCT coefficient distributions. In: Proceedings of the SPIE Symposium on Electronic Imaging, San Jose, CA, vol. 2657, pp. 403-411 (1996)
-
(1996)
Proceedings of the SPIE Symposium on Electronic Imaging
, vol.2657
, pp. 403-411
-
-
Smoot, S.R.1
Rowe, L.A.2
-
20
-
-
35248884299
-
-
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 310-323. Springer, Heidelberg (2003)
-
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310-323. Springer, Heidelberg (2003)
-
-
-
-
22
-
-
35048835739
-
-
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 67-81. Springer, Heidelberg (2004)
-
Fridrich, J.: Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 67-81. Springer, Heidelberg (2004)
-
-
-
-
23
-
-
35048891531
-
-
Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, 3200, pp. 97-115. Springer, Heidelberg (2004)
-
Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97-115. Springer, Heidelberg (2004)
-
-
-
|