-
1
-
-
3042519430
-
An information-theoretic model for steganography
-
Cachin, C.: An information-theoretic model for steganography. Information and Computation 192(1), 41-56 (2004)
-
(2004)
Information and Computation
, vol.192
, Issue.1
, pp. 41-56
-
-
Cachin, C.1
-
2
-
-
45249103920
-
Perfectly secure steganography: Capacity, error exponents, and code constructions
-
Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory 54(6), 2706-2722 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2706-2722
-
-
Wang, Y.1
Moulin, P.2
-
3
-
-
34547881527
-
A capacity result for batch steganography
-
Ker, A.: A capacity result for batch steganography. IEEE Signal Processing Letters 14(8), 525-528 (2007)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.1
-
4
-
-
70350562893
-
-
Filler, T., Ker, A., Fridrich, J.: The square root law of steganographic capacity for Markov covers. In: Proc. SPIE, Media Forensics and Security XI, 7254, pp. 0801-0811 (2009)
-
Filler, T., Ker, A., Fridrich, J.: The square root law of steganographic capacity for Markov covers. In: Proc. SPIE, Media Forensics and Security XI, vol. 7254, pp. 0801-0811 (2009)
-
-
-
-
5
-
-
54349103517
-
A class of Renyi information estimators for multidimensional densities
-
Pronzato, L., Leonenko, N., Savani, V.: A class of Renyi information estimators for multidimensional densities. Annals of Statistics 36(5), 2153-2182 (2008)
-
(2008)
Annals of Statistics
, vol.36
, Issue.5
, pp. 2153-2182
-
-
Pronzato, L.1
Leonenko, N.2
Savani, V.3
-
9
-
-
56749160546
-
The square root law of steganographic capacity
-
Ker, A., Pevný, T., Kodovský, J., Fridrich, J.: The square root law of steganographic capacity. In: Proc. 10th ACM Workshop on Multimedia and Security, pp. 107-116 (2008)
-
(2008)
Proc. 10th ACM Workshop on Multimedia and Security
, pp. 107-116
-
-
Ker, A.1
Pevný, T.2
Kodovský, J.3
Fridrich, J.4
-
10
-
-
84892764719
-
-
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, 1768, pp. 61-76. Springer, Heidelberg (2000)
-
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61-76. Springer, Heidelberg (2000)
-
-
-
-
11
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. IEEE Transactions on Signal Processing 51(7), 1995-2007 (2003)
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
12
-
-
49949117942
-
-
Ker, A.: A fusion of maximum likelihood and structural steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, 4567, pp. 204-219. Springer, Heidelberg (2008)
-
Ker, A.: A fusion of maximum likelihood and structural steganalysis. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 204-219. Springer, Heidelberg (2008)
-
-
-
-
13
-
-
33746613626
-
-
Ker, A.: A general framework for the structural steganalysis of LSB replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, 3727, pp. 296-311. Springer, Heidelberg (2005)
-
Ker, A.: A general framework for the structural steganalysis of LSB replacement. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 296-311. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Proc. SPIE, Security, Steganography, andWatermarking of Multimedia Contents VI, vol. 5306, pp. 23-34 (2004)
-
(2004)
Proc. SPIE, Security, Steganography, andWatermarking of Multimedia Contents VI
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
15
-
-
42949088538
-
-
Ker, A., Böhme, R.: RevisitingWS steganalysis. In: Proc. SPIE, Security, Forensics, Steganography and Watermarking of Multimedia Contents X, 6819, pp. 0501-0517 (2008)
-
Ker, A., Böhme, R.: RevisitingWS steganalysis. In: Proc. SPIE, Security, Forensics, Steganography and Watermarking of Multimedia Contents X, vol. 6819, pp. 0501-0517 (2008)
-
-
-
-
16
-
-
0242576328
-
Higher-order statistical steganalysis of palette images
-
5020, pp
-
Harmsen, J., Pearlman, W.: Higher-order statistical steganalysis of palette images. In: Proc. SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020, pp. 131-142 (2003)
-
(2003)
Proc. SPIE, Security and Watermarking of Multimedia Contents
, vol.5
, pp. 131-142
-
-
Harmsen, J.1
Pearlman, W.2
-
17
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12(6), 441-444 (2005)
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.1
|