-
1
-
-
0041308536
-
Detecting hidden messages using higher-order statistics and support vector machines
-
H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in 5th International Workshop on Information Hiding, 2002.
-
(2002)
5th International Workshop on Information Hiding
-
-
Farid, H.1
-
2
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, 2003, pp. 131-142.
-
(2003)
Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
3
-
-
34147139894
-
Blind image steganalysis based on statistical analysis of empirical matrix
-
X. C. Chen, Y. H. Wang, L. Guo, and T. N. Tan, "Blind image steganalysis based on statistical analysis of empirical matrix," in Proc. ICPR, 2006, pp. 1107-1110.
-
(2006)
Proc. ICPR
, pp. 1107-1110
-
-
Chen, X.C.1
Wang, Y.H.2
Guo, L.3
Tan, T.N.4
-
4
-
-
0001416258
-
Texture analysis using gray level run lengths
-
M. M. Galloway, "Texture analysis using gray level run lengths," in Comput. Graph. Image Proc, 1975, vol. 4, pp. 171-179.
-
(1975)
Comput. Graph. Image Proc
, vol.4
, pp. 171-179
-
-
Galloway, M.M.1
-
6
-
-
33750555925
-
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, andneural network
-
Y. Q. Shi and et al, "Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, andneural network," in ICME 2005, 2005, pp. 269-272.
-
(2005)
ICME 2005
, pp. 269-272
-
-
Shi, Y.Q.1
and et, al.2
-
7
-
-
0031362116
-
Secure spread spectru, watermarking for multimedia
-
I. J. Cox, J. Kilian, F. T. Leighton, and T Shamoon, "Secure spread spectru, watermarking for multimedia," in IEEE Trans. Image Process, 1997 6(12), pp. 1673-1687.
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
8
-
-
0032051323
-
-
J. Huang and Y Q. Shi, Adaptive image watermarking scheme based on visual masking, in Electron, Letter, 1998, 34, pp. 748-750.
-
J. Huang and Y Q. Shi, "Adaptive image watermarking scheme based on visual masking," in Electron, Letter, 1998, vol. 34, pp. 748-750.
-
-
-
-
9
-
-
0033309034
-
Data hiding in images with adaptive numbers of least significant bits based on human visual system
-
W. N. Lie and L. C. Chang, "Data hiding in images with adaptive numbers of least significant bits based on human visual system," in Proc IEEE Int. Conf. Image Processing, 1999, pp. 286-290.
-
(1999)
Proc IEEE Int. Conf. Image Processing
, pp. 286-290
-
-
Lie, W.N.1
Chang, L.C.2
-
10
-
-
84952369138
-
Digital watermarking and information embedding using dither modulation
-
B. Chen and G. W. Wornell, "Digital watermarking and information embedding using dither modulation," in Proceedings of IEEE MMSP, 1998, pp. 273-278.
-
(1998)
Proceedings of IEEE MMSP
, pp. 273-278
-
-
Chen, B.1
Wornell, G.W.2
-
11
-
-
0031354216
-
Dctbased watermark recovering without resorting to the uncor-rupted original image
-
A. Piva, M. Barni, E. Bartolini, and V. Cappellini, "Dctbased watermark recovering without resorting to the uncor-rupted original image," in Proc ICIP97, 1998, vol. 1, p. 520.
-
(1998)
Proc ICIP97
, vol.1
, pp. 520
-
-
Piva, A.1
Barni, M.2
Bartolini, E.3
Cappellini, V.4
|