-
1
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
IEEE Computer Society, Los Alamitos
-
Johnson, N.F., Jajodia, S.: Exploring steganography: Seeing the unseen. In: Computer, vol. 31, pp. 26-34. IEEE Computer Society, Los Alamitos (1998)
-
(1998)
Computer
, vol.31
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
4
-
-
0242413905
-
Steganographic system based on higher-order statistics
-
USA, 5020
-
Tzschoppe, R., Aauml, R.B.: Steganographic system based on higher-order statistics. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents V, USA, vol. 5020 (2003)
-
(2003)
Proceedings of SPIE, Security and Watermarking of Multimedia Contents
, vol.5
-
-
Tzschoppe, R.1
Aauml, R.B.2
-
5
-
-
0041308536
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Farid, H.: Detecting hidden messages using higher-order statistics and support vector machines. In: 5th International Workshop on Information Hiding (2002)
-
(2002)
5th International Workshop on Information Hiding
-
-
Farid, H.1
-
6
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
Harmsen, J.J., Pearlman, W.A.: Steganalysis of additive noise modelable information hiding. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, pp. 131-142 (2003)
-
(2003)
Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents
, vol.6
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
7
-
-
33645676686
-
New blind steganalysis and its implications
-
Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, pp. 1-13 (2006)
-
(2006)
Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents
, vol.6
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
10
-
-
25144471298
-
Score normalization in multimodal biométrie systems.
-
Jain, A.K.: Score normalization in multimodal biométrie systems. Pattern Recognition 38, 2270-2285 (2005)
-
(2005)
Pattern Recognition
, vol.38
, pp. 2270-2285
-
-
Jain, A.K.1
-
12
-
-
33645673689
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristics functions
-
Xuan, G., Shi, Y.Q.: Steganalysis based on multiple features formed by statistical moments of wavelet characteristics functions. In: Proc. Information Hiding Workshop, pp. 262-277 (2005)
-
(2005)
Proc. Information Hiding Workshop
, pp. 262-277
-
-
Xuan, G.1
Shi, Y.Q.2
-
13
-
-
33750555925
-
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
-
Shi, Y.Q., et al.: Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. In: ICME 2005, pp. 269-272 (2005)
-
(2005)
ICME 2005
, pp. 269-272
-
-
Shi, Y.Q.1
-
14
-
-
33744728031
-
Steganalysis for markov cover data with applications to images
-
Sullivan, K., et al.: Steganalysis for markov cover data with applications to images. IEEE Trans. Inf. Forensics Security 1, 275-287 (2006)
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, pp. 275-287
-
-
Sullivan, K.1
-
15
-
-
34147139894
-
Blind image steganalysis based on statistical analysis of empirical matrix
-
2006
-
Chen, X.C., Wang, Y.H., Guo, L., Tan, T.N.: Blind image steganalysis based on statistical analysis of empirical matrix. In: ICPR (3) 2006, pp. 1107-1110 (2006)
-
(2006)
ICPR
, vol.3
, pp. 1107-1110
-
-
Chen, X.C.1
Wang, Y.H.2
Guo, L.3
Tan, T.N.4
-
16
-
-
0003798642
-
-
Scholkopf, B, Burges, C, eds, MIT Press, Cambridge
-
Joachims, T.: Making large-scale svm learning practical, in adavances in kernel methods-support vector learning. In: Scholkopf, B., Burges, C. (eds.). MIT Press, Cambridge (1999)
-
(1999)
Making large-scale svm learning practical, in adavances in kernel methods-support vector learning
-
-
Joachims, T.1
-
17
-
-
0031362116
-
Secure spread spectru, watermarking for multimedia
-
Cox, I.J., Kilián, J., Leighton, F.T., Shamoon, T.: Secure spread spectru, watermarking for multimedia. IEEE Trans.Image Process 6(12), 1673-1687 (1997)
-
(1997)
IEEE Trans.Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilián, J.2
Leighton, F.T.3
Shamoon, T.4
-
18
-
-
0032051323
-
Adaptive image watermarking scheme based on visual masking
-
Huang, J., Shi, Y.Q.: Adaptive image watermarking scheme based on visual masking. Electron, Letter 34, 748-750 (1998)
-
(1998)
Electron, Letter
, vol.34
, pp. 748-750
-
-
Huang, J.1
Shi, Y.Q.2
-
19
-
-
0033309034
-
Data hiding in images with adaptive numbers of least significant bits based on human visual system
-
Lie, W.N., Chang, L.C.: Data hiding in images with adaptive numbers of least significant bits based on human visual system. In: Proc. IEEE Int. Conf. Image Processing, pp. 286-290 (1999)
-
(1999)
Proc. IEEE Int. Conf. Image Processing
, pp. 286-290
-
-
Lie, W.N.1
Chang, L.C.2
-
20
-
-
84952369138
-
Digital watermarking and information embedding using dither modulation
-
Chen, B., Wornell, G.W.: Digital watermarking and information embedding using dither modulation. In: Proceedings of IEEE MMSP, pp. 273-278 (1998)
-
(1998)
Proceedings of IEEE MMSP
, pp. 273-278
-
-
Chen, B.1
Wornell, G.W.2
-
21
-
-
0031354216
-
Dct-based watermark recovering without resorting to the uncorrupted original image
-
Piva, A., Barni, M., Bartolini, E., Cappellini, V.: Dct-based watermark recovering without resorting to the uncorrupted original image. In: Proc. ICIP 1997, vol. 1, p. 520 (1998)
-
(1997)
Proc. ICIP
, vol.1
, pp. 520
-
-
Piva, A.1
Barni, M.2
Bartolini, E.3
Cappellini, V.4
|