-
1
-
-
0005105932
-
High capacity despite better steganalysis (F5-a steganographie algorithm)
-
Pittsburgh, Pennsylvania, USA, Apr
-
A. Westfeld. High capacity despite better steganalysis (F5-a steganographie algorithm). 4th International Workshop on Information Hiding, Pittsburgh, Pennsylvania, USA, Apr. 2001, pp. 289-302.
-
(2001)
4th International Workshop on Information Hiding
, pp. 289-302
-
-
Westfeld, A.1
-
2
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington D.C, USA
-
N. Provos. Defending against statistical steganalysis. 10th USENIX Security Symposium, Washington D.C., USA, 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Provos, N.1
-
3
-
-
33744753200
-
Model based methods for steganography and steganalysis
-
P. Sallee. Model based methods for steganography and steganalysis. Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
4
-
-
30744445178
-
Perturbed quantization steganography
-
J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography. ACM Multimedia and Security Journal, vol. 11, no. 2, pp. 98-107, 2005.
-
(2005)
ACM Multimedia and Security Journal
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
5
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Old Town Alexandria, Virginia, USA, Jul
-
Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. 8th International Workshop on Information Hiding, Old Town Alexandria, Virginia, USA, Jul. 2006, pp. 314-327.
-
(2006)
8th International Workshop on Information Hiding
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
6
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Noordwijkerhout, Netherlands, Oct
-
J. Fridrich, M. Goljan, and D. Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands, Oct. 2002, pp. 310-323.
-
(2002)
5th International Workshop on Information Hiding
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
7
-
-
2642549992
-
Attacking the Outguess
-
Juan-les-Pins, France, Dec
-
J. Fridrich, M. Goljan, and D. Hogea. Attacking the Outguess. ACM Workshop on Multimedia and Security, Juan-les-Pins, France, Dec. 2002, pp. 3-6
-
(2002)
ACM Workshop on Multimedia and Security
, pp. 3-6
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
8
-
-
33749598442
-
Breaking Cauchy model-based JPEG steganography with first order statistics
-
Sophia Antipolis, French Riviera, France, Sep
-
R. Bohme and A. Westfeld. Breaking Cauchy model-based JPEG steganography with first order statistics. 9th European Symposium on Research in Computer Security (ESORICS), Sophia Antipolis, French Riviera, France, Sep. 2004, pp. 125-140.
-
(2004)
9th European Symposium on Research in Computer Security (ESORICS)
, pp. 125-140
-
-
Bohme, R.1
Westfeld, A.2
-
9
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
Toronto, Ontario, Canada, May
-
J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. 6th International Workshop on Information Hiding, Toronto, Ontario, Canada, May 2004, pp. 67-81.
-
(2004)
6th International Workshop on Information Hiding
, pp. 67-81
-
-
Fridrich, J.1
-
10
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
Old Town Alexandria, Virginia, USA, Jul
-
Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. 8th International Workshop on Information Hiding, Old Town Alexandria, Virginia, USA, Jul. 2006, pp. 249-264.
-
(2006)
8th International Workshop on Information Hiding
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
11
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
San Jose, California, USA, Jan
-
T. Pevny and J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, SPIE, San Jose, California, USA, Jan. 2007, pp. 1-13.
-
(2007)
Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, SPIE
, pp. 1-13
-
-
Pevny, T.1
Fridrich, J.2
-
12
-
-
51749089283
-
JPEG image steganalysis utilizing both intrablock and interblock correlations
-
Seattle, Washington, USA, May
-
C. Chen and Y. Q. Shi. JPEG image steganalysis utilizing both intrablock and interblock correlations. IEEE International Symposium on Circuits and Systems, Seattle, Washington, USA, May 2008.
-
(2008)
IEEE International Symposium on Circuits and Systems
-
-
Chen, C.1
Shi, Y.Q.2
-
13
-
-
56749108321
-
-
K. Solanki, A. Sarkar, and B. S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. 9th International Workshop on Information Hiding, Saint Malo, France, Jun. 2007. Implementation code was available at: http://vision.ece.ucsb.edu/data-hiding/ resist-blind-steganalysis.shtml (2007)
-
K. Solanki, A. Sarkar, and B. S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. 9th International Workshop on Information Hiding, Saint Malo, France, Jun. 2007. Implementation code was available at: http://vision.ece.ucsb.edu/data-hiding/ resist-blind-steganalysis.shtml (2007)
-
-
-
-
14
-
-
42949124470
-
Influence of embedding strategies on security of steganographic methods in the JPEG domain
-
San Jose, California, Jan
-
J. Kodovský and J. Fridrich. Influence of embedding strategies on security of steganographic methods in the JPEG domain. Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. SPIE, San Jose, California, Jan. 2008.
-
(2008)
Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. SPIE
-
-
Kodovský, J.1
Fridrich, J.2
-
15
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory, vol. 47, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
16
-
-
0035246564
-
Factor graphs and the sum-product algorithm
-
Feb
-
F. R. Kschischang, B. J. Frey, and H. A. Loeliger. Factor graphs and the sum-product algorithm. IEEE Trans. Inform. Theory, vol. 47, pp. 498-519, Feb. 2001.
-
(2001)
IEEE Trans. Inform. Theory
, vol.47
, pp. 498-519
-
-
Kschischang, F.R.1
Frey, B.J.2
Loeliger, H.A.3
-
17
-
-
20444447558
-
Steganalysis of quantization index modulation data hiding
-
Singapore, Oct
-
K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, and B. Manjunath. Steganalysis of quantization index modulation data hiding. IEEE International Conference on Image Processing, Singapore, Oct. 2004, vol. 2, pp. 1165-1168.
-
(2004)
IEEE International Conference on Image Processing
, vol.2
, pp. 1165-1168
-
-
Sullivan, K.1
Bi, Z.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
18
-
-
38849105460
-
Nonparametric steganalysis of QIM-based data hiding using kernel density estimation
-
Dallas, Texas, Sep
-
H. Malik, K. P. Subbalakshmi, and R. Chandramouli. Nonparametric steganalysis of QIM-based data hiding using kernel density estimation. 9th ACM Workshop on Multimedia and Security, Dallas, Texas, Sep. 2007, pp. 149-160.
-
(2007)
9th ACM Workshop on Multimedia and Security
, pp. 149-160
-
-
Malik, H.1
Subbalakshmi, K.P.2
Chandramouli, R.3
-
20
-
-
42949166748
-
Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis
-
San Jose, California, USA, Jan
-
A. Sarkar, K. Solanki, and B. S. Manjunath. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. SPIE, San Jose, California, USA, Jan. 2008.
-
(2008)
Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. SPIE
-
-
Sarkar, A.1
Solanki, K.2
Manjunath, B.S.3
-
22
-
-
56749139018
-
-
Photos from Sun Yat-sen University
-
Photos from Sun Yat-sen University. http://ist.sysu.edu.cn/en/index-en. asp
-
-
-
|