-
1
-
-
33645696636
-
Image steganalysis with binary similarity measures
-
I. Avcibas, M. Kharrazi, N. D. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," EURASIP J. Appl. Signal Process., vol. 17, pp. 2749-2757, 2005.
-
(2005)
EURASIP J. Appl. Signal Process
, vol.17
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazi, M.2
Memon, N.D.3
Sankur, B.4
-
2
-
-
0034775171
-
Steganalysis using image quality metrics
-
E. J. Delp and P. W. Wong, Eds, San Jose, CA, Jan. 22-25
-
I. Avcibas, N. D. Memon, and B. Sankur, "Steganalysis using image quality metrics," in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents III, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 22-25, 2001, vol. 4314, pp. 523-531.
-
(2001)
Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents III
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.D.2
Sankur, B.3
-
3
-
-
0036448130
-
Image steganalysis with binary similarity measures
-
Rochester, NY, Sep. 22-25
-
I. Avcibas, N. D. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, Sep. 22-25, 2002, vol. 3, pp. 645-648.
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, vol.3
, pp. 645-648
-
-
Avcibas, I.1
Memon, N.D.2
Sankur, B.3
-
4
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. J. C. Burges, "A tutorial on support vector machines for pattern recognition," Data Mining Knowl. Discovery, vol. 2, no. 2, pp. 121-167, 1998.
-
(1998)
Data Mining Knowl. Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
5
-
-
84957868624
-
-
C. Cachin, An information-theoretic model for steganography, in Proc. 2nd Int. Information Hiding, Workshop, ser. Lect. Notes Comput. Sci., D. Aucsmith, Ed. New York: Springer-Verlag, Apr. 14-17, 1998, 1525, pp. 306-318, Portland, OR.
-
C. Cachin, "An information-theoretic model for steganography," in Proc. 2nd Int. Information Hiding, Workshop, ser. Lect. Notes Comput. Sci., D. Aucsmith, Ed. New York: Springer-Verlag, Apr. 14-17, 1998, vol. 1525, pp. 306-318, Portland, OR.
-
-
-
-
6
-
-
35248846436
-
-
H. Farid and L. Siwei, Detecting hidden messages using higher-order statistics and support vector machines, in Proc. 5th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci, F. A. P. Petitcolas, Ed. New York: Springer-Verlag, Oct. 7-9, 2002, 2578, pp. 340-354, Noordwijkerhout, The Netherlands.
-
H. Farid and L. Siwei, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci, F. A. P. Petitcolas, Ed. New York: Springer-Verlag, Oct. 7-9, 2002, vol. 2578, pp. 340-354, Noordwijkerhout, The Netherlands.
-
-
-
-
7
-
-
35048835739
-
-
J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in Proc. 6th Int. Workshop Information Hiding, J. Fridrich, Ed., Toronto, ON, Canada, May 23-25, 2004, 3200, Lect. Notes Comput. Sci., pp. 67-81, Springer-Verlag, New York.
-
J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in Proc. 6th Int. Workshop Information Hiding, J. Fridrich, Ed., Toronto, ON, Canada, May 23-25, 2004, vol. 3200, Lect. Notes Comput. Sci., pp. 67-81, Springer-Verlag, New York.
-
-
-
-
8
-
-
35248884299
-
-
J. Fridrich, M. Goljan, and D. Hogea, Steganalysis of JPEG images: Breaking the F5 algorithm, in Proc. 5th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., F. A. P. Petitcolas, Ed. New York: Springer-Verlag, Oct. 7-9,2002, 2578, pp. 310-323, Noordwijkerhout, The Netherlands.
-
J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," in Proc. 5th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., F. A. P. Petitcolas, Ed. New York: Springer-Verlag, Oct. 7-9,2002, vol. 2578, pp. 310-323, Noordwijkerhout, The Netherlands.
-
-
-
-
9
-
-
34250355507
-
-
D. Fu, Y. Q. Shi, and Q. Su, A generalized Benford's law for JPEG coefficients and its applications in image forensics, in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1 2007, 6505, pp. 1L1-1L11, San Jose, CA.
-
D. Fu, Y. Q. Shi, and Q. Su, "A generalized Benford's law for JPEG coefficients and its applications in image forensics," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1 2007, vol. 6505, pp. 1L1-1L11, San Jose, CA.
-
-
-
-
10
-
-
33645676686
-
New blind steganalysis and its implications
-
E. J. Delp and P. W. Wong, Eds, San Jose, CA, Jan. 16-19
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents VIII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19, 2006, vol. 6072, pp. 1-13.
-
(2006)
Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
11
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
E. J. Delp and P. W. Wong, Eds, Santa Clara, CA, Jan. 21-24
-
J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents V, E. J. Delp and P. W. Wong, Eds., Santa Clara, CA, Jan. 21-24, 2003, vol. 5020, pp. 131-142.
-
(2003)
Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents V
, vol.5020
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
12
-
-
33748062330
-
Capacity of steganalysis channels
-
A. M. Eskicioglu, J. Fridrich, and J. Dittmann, Eds, New York, Aug. 1-2
-
J. J. Harmsen and W. A. Pearlman, "Capacity of steganalysis channels," in Proc. 7th ACM Multimedia Security Workshop, A. M. Eskicioglu, J. Fridrich, and J. Dittmann, Eds., New York, Aug. 1-2, 2005, pp. 11-24.
-
(2005)
Proc. 7th ACM Multimedia Security Workshop
, pp. 11-24
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
13
-
-
33645695370
-
-
S. Hetzl and P. Mutzel, A graph-theoretic approach to steganography, in Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security, ser. Lect. Notes Comput. Sci., J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds. New York: Springer-Verlag, Sep. 19-21, 2005, 3677, pp. 119-128.
-
S. Hetzl and P. Mutzel, "A graph-theoretic approach to steganography," in Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security, ser. Lect. Notes Comput. Sci., J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds. New York: Springer-Verlag, Sep. 19-21, 2005, vol. 3677, pp. 119-128.
-
-
-
-
14
-
-
56749089544
-
-
C. Hsu and C. Lin, A comparison of methods for multi-class support vector machines, Dept. Comput. Sci. Inf. Eng., National Taiwan Univ., Taipei, Taiwan, 2001. [Online]. Available: http://citeseer.ist.psu.edu/ hsu01comparison.html, Tech. Rep.
-
C. Hsu and C. Lin, "A comparison of methods for multi-class support vector machines," Dept. Comput. Sci. Inf. Eng., National Taiwan Univ., Taipei, Taiwan, 2001. [Online]. Available: http://citeseer.ist.psu.edu/ hsu01comparison.html, Tech. Rep.
-
-
-
-
16
-
-
0036030621
-
Defining security in steganographic systems
-
E. J. Delp and P. W. Wong, Eds, San Jose, CA, Jan. 21-24
-
S. Katzenbeisser and F. A. P. Petitcolas, "Defining security in steganographic systems," in Proc. SPIE Photonic West, Electronic Imaging, Security, Steganography, Watermarking Multimedia Contents IV, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 21-24, 2002, vol. 4675, pp. 50-56.
-
(2002)
Proc. SPIE Photonic West, Electronic Imaging, Security, Steganography, Watermarking Multimedia Contents IV
, vol.4675
, pp. 50-56
-
-
Katzenbeisser, S.1
Petitcolas, F.A.P.2
-
17
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
E. J. Delp and P. W. Wong, Eds, San Jose, CA, Jan. 27-31
-
A. D. Ker and R. Böhme, "Revisiting weighted stego-image steganalysis," in Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, Watermarking of Multimedia Contents X, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 27-31, 2008, vol. 6819, pp. 5 1-5 17.
-
(2008)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, Watermarking of Multimedia Contents X
, vol.6819
-
-
Ker, A.D.1
Böhme, R.2
-
18
-
-
38149033612
-
-
Y. Kim, Z. Duric, and D. Richards, Modified matrix encoding technique for minimal distortion steganography, in Proc. 8th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. New York: Springer-Verlag, Jul. 10-12, 2006, 4437, pp. 314-327, Alexandria, VA.
-
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. New York: Springer-Verlag, Jul. 10-12, 2006, vol. 4437, pp. 314-327, Alexandria, VA.
-
-
-
-
19
-
-
35048849011
-
Estimation of primary quantization matrix in double compressed JPEG images
-
presented at the, Cleveland, OH, Aug. 5-8
-
J. Lukáš and J. Fridrich, "Estimation of primary quantization matrix in double compressed JPEG images," presented at the Digital Forensic Research Workshop, Cleveland, OH, Aug. 5-8, 2003.
-
(2003)
Digital Forensic Research Workshop
-
-
Lukáš, J.1
Fridrich, J.2
-
20
-
-
8844256156
-
Steganalysis using color wavelet statistics and one-class support vector machines
-
E. J. Delp and P. W. Wong, Eds, San Jose, CA, Jan. 19-22
-
S. Lyu and H. Farid, "Steganalysis using color wavelet statistics and one-class support vector machines," in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents VI, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 19-22, 2004, vol. 5306, pp. 35-45.
-
(2004)
Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents VI
, vol.5306
, pp. 35-45
-
-
Lyu, S.1
Farid, H.2
-
21
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
Mar
-
S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
23
-
-
33646167860
-
-
T. Pevný and J. Fridrich, Towards multi-class blind steganalyzer for JPEG images, in Proc. Int. Workshop on Digital Watermarking, ser. Lect. Notes Comput. Sci., M. Barni, I. J. Cox, T. Kalker, and H. J. Kim, Eds. Berlin, Germany: Springer-Verlag, Sep. 15-17, 2005, 3710, Siena, Italy.
-
T. Pevný and J. Fridrich, "Towards multi-class blind steganalyzer for JPEG images," in Proc. Int. Workshop on Digital Watermarking, ser. Lect. Notes Comput. Sci., M. Barni, I. J. Cox, T. Kalker, and H. J. Kim, Eds. Berlin, Germany: Springer-Verlag, Sep. 15-17, 2005, vol. 3710, Siena, Italy.
-
-
-
-
24
-
-
42949146877
-
Determining the stego algorithm for JPEG images
-
T. Pevný and J. Fridrich, "Determining the stego algorithm for JPEG images," Proc. Inst. Elect. Eng., Special Issue Information Security, vol. .153, no. 3, pp. 75-139, 2006.
-
(2006)
Proc. Inst. Elect. Eng., Special Issue Information Security
, vol.153
, Issue.3
, pp. 75-139
-
-
Pevný, T.1
Fridrich, J.2
-
25
-
-
33645660635
-
-
T. Pevný and J. Fridrich, Multiclass blind steganalysis for JPEG images, in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19, 2006, 6072, pp. O 1-O 13.
-
T. Pevný and J. Fridrich, "Multiclass blind steganalysis for JPEG images," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19, 2006, vol. 6072, pp. O 1-O 13.
-
-
-
-
26
-
-
34548232251
-
Merging Markov and DCT features for multiclass JPEG steganalysis
-
E. J. Delp and P. W. Wong, Eds, San Jose, CA, Jan. 29-Feb. 1
-
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multiclass JPEG steganalysis," in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1 2007, vol. 6505, pp. 3 1-3 14.
-
(2007)
Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents IX
, vol.6505
-
-
Pevný, T.1
Fridrich, J.2
-
27
-
-
44049087452
-
Detection of double-compression for applications in steganography
-
Jun
-
T. Pevný and J. Fridrich, "Detection of double-compression for applications in steganography," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 247-258, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevný, T.1
Fridrich, J.2
-
28
-
-
35048816032
-
-
A. C. Popescu and H. Farid, Statistical tools for digital forensic, in Proc. 6th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., J. Fridrich, Ed. Berlin, Germany: Springer-Verlag, May 23-25, 2004, 3200, pp. 128-147, Toronto, ON, Canada.
-
A. C. Popescu and H. Farid, "Statistical tools for digital forensic," in Proc. 6th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., J. Fridrich, Ed. Berlin, Germany: Springer-Verlag, May 23-25, 2004, vol. 3200, pp. 128-147, Toronto, ON, Canada.
-
-
-
-
29
-
-
85084160704
-
Defending against statistical steganalysis
-
Aug. 13-17
-
N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Security Symp., Aug. 13-17, 2001, pp. 323-335.
-
(2001)
Proc. 10th USENIX Security Symp
, pp. 323-335
-
-
Provos, N.1
-
30
-
-
35048819204
-
-
P. Sallee, Model-based steganography, in Proc. 2nd Int. Workshop Digital Watermarking, ser. Lect. Notes Comput. Sci., T. Kalker, I. J. Cox, and Y. Man Ro, Eds. New York: Springer-Verlag, Oct. 20-22, 2003, 2939, pp. .154-167, Seoul, Korea.
-
P. Sallee, "Model-based steganography," in Proc. 2nd Int. Workshop Digital Watermarking, ser. Lect. Notes Comput. Sci., T. Kalker, I. J. Cox, and Y. Man Ro, Eds. New York: Springer-Verlag, Oct. 20-22, 2003, vol. 2939, pp. .154-167, Seoul, Korea.
-
-
-
-
31
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
P. Sallee, "Model-based methods for steganography and steganalysis," Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
32
-
-
38049166461
-
-
Y. Q. Shi, C. Chen, and W. Chen, A Markov process based approach to effective attacking JPEG steganography, in Proc. 8th Int. Workshop Inf. Hiding, ser. Lect. Notes Comput. Sci., J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. New York: Springer-Verlag, Jul. 10-12, 2006, 4437, pp. 249-264, Alexandria, VA.
-
Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int. Workshop Inf. Hiding, ser. Lect. Notes Comput. Sci., J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. New York: Springer-Verlag, Jul. 10-12, 2006, vol. 4437, pp. 249-264, Alexandria, VA.
-
-
-
-
33
-
-
33645693950
-
Statistical modelling and steganalysis of DFT-based image steganography
-
E. J. Delp and P. W. Wong, Eds, San Jose, CA, Jan. 16-19
-
Y. Wang and P. Moulin, "Statistical modelling and steganalysis of DFT-based image steganography," in Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents VIII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19, 2006, vol. 6072, pp. 2 1-2 11.
-
(2006)
Proc. SPIE, Electronic Imaging, Security, Steganography, Watermarking of Multimedia Contents VIII
, vol.6072
-
-
Wang, Y.1
Moulin, P.2
-
34
-
-
84937814312
-
-
A. Westfeld, High capacity despite better steganalysis (F5 - A steganographic algorithm), in Proc. Information Hiding, 4th Int. Workshop, ser. Lect. Notes Comput. Sci., I. S. Moskowitz, Ed. New York: Springer-Verlag, Apr. 25-27, 2001, 2137, pp. 289-302.
-
A. Westfeld, "High capacity despite better steganalysis (F5 - A steganographic algorithm)," in Proc. Information Hiding, 4th Int. Workshop, ser. Lect. Notes Comput. Sci., I. S. Moskowitz, Ed. New York: Springer-Verlag, Apr. 25-27, 2001, vol. 2137, pp. 289-302.
-
-
-
-
35
-
-
33746647772
-
-
G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Z. P. Chai, C. Chen, and W. Chen, Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions, in Proc. 7th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez-González, Eds. Berlin, Germany: Springer-Verlag, Jun. 6-8, 2005, 3727, pp. 262-277.
-
G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Z. P. Chai, C. Chen, and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. 7th Int. Workshop Information Hiding, ser. Lect. Notes Comput. Sci., M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez-González, Eds. Berlin, Germany: Springer-Verlag, Jun. 6-8, 2005, vol. 3727, pp. 262-277.
-
-
-
-
36
-
-
84957886335
-
-
J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, Modeling the security of steganographic systems, in Proc. Information Hiding, 2nd Int. Workshop, ser. Lect. Notes Comput. Sci., D. Aucsmith, Ed. New York: Springer-Verlag, Apr. 14-17, 1998, 1525, pp. 344-354.
-
J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the security of steganographic systems," in Proc. Information Hiding, 2nd Int. Workshop, ser. Lect. Notes Comput. Sci., D. Aucsmith, Ed. New York: Springer-Verlag, Apr. 14-17, 1998, vol. 1525, pp. 344-354.
-
-
-
|