-
1
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141: 123-138
-
(2002)
Inf Sci
, vol.141
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
2
-
-
42449101136
-
Genetic watermarking for zerotree-based applications
-
(in press)
-
Chu SC, Huang HC, Shi Y, Wu SY, Shieh CS (2008) Genetic watermarking for zerotree-based applications. Circuits Syst Signal Process 27 (in press)
-
(2008)
Circuits Syst Signal Process
, vol.27
-
-
Chu, S.C.1
Huang, H.C.2
Shi, Y.3
Wu, S.Y.4
Shieh, C.S.5
-
4
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
In: Springer, New York
-
Fridrich J (2004) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In: Proceedings sixth information hiding workshop '04, LNCS 3200, Springer, New York, pp 67-81
-
(2004)
Proceedings Sixth Information Hiding Workshop '04, LNCS 3200
, pp. 67-81
-
-
Fridrich, J.1
-
5
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
In: Springer, New York
-
Fridrich J, Goljan M, Hogea D (2002a) Steganalysis of JPEG images: breaking the F5 algorithm. In: Proceedings fifth international workshop on information hiding '02, LNCS 2578, Springer, New York, pp 310-323
-
(2002)
Proceedings Fifth International Workshop on Information Hiding '02, LNCS 2578
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
7
-
-
0242497150
-
New methodology for breaking steganographic techniques for JPEGs
-
Fridrich J, Goljan M, Hogea D (2003) New methodology for breaking steganographic techniques for JPEGs. In: Proceedings SPIE, security and watermarking of multimedia contents V '03, vol 5020, pp~143-155
-
(2003)
Proceedings SPIE, Security and Watermarking of Multimedia Contents V '03
, vol.5020
, pp. 143-155
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
9
-
-
37549069962
-
Progressive watermarking techniques using genetic algorithms
-
Huang HC, Pan JS, Huang YH, Wang FH, Huang KC (2007) Progressive watermarking techniques using genetic algorithms. Circuits Syst Signal Process 26: 671-687
-
(2007)
Circuits Syst Signal Process
, vol.26
, pp. 671-687
-
-
Huang, H.C.1
Pan, J.S.2
Huang, Y.H.3
Wang, F.H.4
Huang, K.C.5
-
10
-
-
48149092132
-
Steganalysis of LSB greedy embedding algorithm for JPEG images using coefficients symmetry
-
In: San Antonio
-
Li B, Huang FJ, Huang JW (2007) Steganalysis of LSB greedy embedding algorithm for JPEG images using coefficients symmetry. In: Proceedings fourteenth IEEE international conference on image processing '07, San Antonio, vol 1, pp 413-416
-
(2007)
Proceedings Fourteenth IEEE International Conference on Image Processing '07
, vol.1
, pp. 413-416
-
-
Li, B.1
Huang, F.J.2
Huang, J.W.3
-
11
-
-
0003540748
-
Genetic algorithms + data structures = evolution programs
-
In: Springer, New York
-
Michalewicz Z (1994) Genetic algorithms + data structures = evolution programs. In: AI Series. Springer, New York
-
(1994)
AI Series
-
-
Michalewicz, Z.1
-
13
-
-
42449115005
-
-
Pan, JS, Huang, HC, Jain, LC, Fang, WC (eds) Springer, Berlin
-
Pan, JS, Huang, HC, Jain, LC, Fang, WC (eds) (2007) Intelligent multimedia data hiding: New directions. Springer, Berlin
-
(2007)
Intelligent Multimedia Data Hiding: New Directions
-
-
-
15
-
-
85084160704
-
Defending against statistical steganalysis
-
In: Washington DC
-
Provos N (2001) Defending against statistical steganalysis. In: Proceedings tenth USENIX security symposium '01, Washington DC, pp~323-335
-
(2001)
Proceedings Tenth USENIX Security Symposium '01
, pp. 323-335
-
-
Provos, N.1
-
17
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph 5: 167-189
-
(2005)
Int J Image Graph
, vol.5
, pp. 167-189
-
-
Sallee, P.1
-
18
-
-
55549084961
-
Advanced steganographic and steganalytic methods in the spatial domain
-
Soukal D (2006) Advanced steganographic and steganalytic methods in the spatial domain. Diss Abstr Int 67-03(Sect B):1532-1704
-
(2006)
Diss Abstr Int 67-03(Sect B)
, pp. 1532-1704
-
-
Soukal, D.1
-
20
-
-
84892764719
-
Attacks on steganographic systems
-
In: Springer, New York
-
Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. In: Proceedings third international workshop on information hiding '00, LNCS 1768, Springer, New York, pp 61-76
-
(2000)
Proceedings Third International Workshop on Information Hiding '00, LNCS 1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
21
-
-
28744452166
-
Secure steganographic algorithm in JPEG images (In Chinese)
-
Zhang XP, Wang SZ (2005) Secure steganographic algorithm in JPEG images (In Chinese). J Electron Inf Technol 27: 1813-1817
-
(2005)
J Electron Inf Technol
, vol.27
, pp. 1813-1817
-
-
Zhang, X.P.1
Wang, S.Z.2
|