-
1
-
-
45249103920
-
-
Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security (June 2008)
-
Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security (June 2008)
-
-
-
-
2
-
-
56749157567
-
On the capacity of stegosystems
-
Dittmann, J, Fridrich, J, eds, Dallas, TX, September 20-21, pp
-
Comesana, P., Pérez-Gonzáles, F.: On the capacity of stegosystems. In: Dittmann, J., Fridrich, J. (eds.) Proceedings of the 9th ACM Multimedia & Security Workshop, Dallas, TX, September 20-21, pp. 3-14 (2007)
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Comesana, P.1
Pérez-Gonzáles, F.2
-
4
-
-
70350562893
-
The square root law of steganographic capacity for Markov covers
-
Delp, E.J, Wong, P.W, Memon, N, Dittmann, J, eds, San Jose, CA, January 18-21
-
Filler, T., Fridrich, J., Ker, A.D.: The square root law of steganographic capacity for Markov covers. In: Delp, E.J., Wong, P.W., Memon, N., Dittmann, J. (eds.) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, San Jose, CA, January 18-21 (2009)
-
(2009)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia
, vol.11
-
-
Filler, T.1
Fridrich, J.2
Ker, A.D.3
-
5
-
-
56749160546
-
The square root law of steganographic capacity
-
Ker, A, Dittmann, J, Fridrich, J, eds, Oxford, UK, September 22-23, pp
-
Ker, A.D., Pevný, T., Kodovský, J., Fridrich, J.: The square root law of steganographic capacity. In: Ker, A., Dittmann, J., Fridrich, J. (eds.) Proceedings of the 10th ACM Multimedia & Security Workshop, Oxford, UK, September 22-23, pp. 107-116 (2008)
-
(2008)
Proceedings of the 10th ACM Multimedia & Security Workshop
, pp. 107-116
-
-
Ker, A.D.1
Pevný, T.2
Kodovský, J.3
Fridrich, J.4
-
6
-
-
34547881527
-
A capacity result for batch steganography
-
Ker, A.D.: A capacity result for batch steganography. IEEE Signal Processing Letters 14(8), 525-528 (2007)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
7
-
-
70349213393
-
Complete characterization of perfectly secure stego-systems with mutually independent embedding operation
-
Taipei, Taiwan, April 19-24
-
Filler, T., Fridrich, J.: Complete characterization of perfectly secure stego-systems with mutually independent embedding operation. In: Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, Taipei, Taiwan, April 19-24 (2009)
-
(2009)
Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing
-
-
Filler, T.1
Fridrich, J.2
-
8
-
-
70350440358
-
-
Ker, A.D.: Estimating steganographic Fisher information in real images. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, 5806, pp. 73-88. Springer, Heidelberg (2009)
-
Ker, A.D.: Estimating steganographic Fisher information in real images. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 73-88. Springer, Heidelberg (2009)
-
-
-
-
9
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
Dittmann, J, Fridrich, J, eds, Dallas, TX, September 20-21, pp
-
Kodovský, J., Fridrich, J., Pevný, T.: Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In: Dittmann, J., Fridrich, J. (eds.) Proceedings of the 9th ACM Multimedia & Security Workshop, Dallas, TX, September 20-21, pp. 3-14 (2007)
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Kodovský, J.1
Fridrich, J.2
Pevný, T.3
-
11
-
-
33744728031
-
Steganalysis for Markov cover data with applications to images
-
Sullivan, K., Madhow, U., Manjunath, B., Chandrasekaran, S.: Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensics and Security 1(2), 275-287 (2006)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Manjunath, B.3
Chandrasekaran, S.4
-
12
-
-
14844333237
-
Hidden Markov models and steganalysis
-
Dittmann, J, Fridrich, J, eds, Magdeburg, Germany, September 20-21, pp
-
Sidorov, M.: Hidden Markov models and steganalysis. In: Dittmann, J., Fridrich, J. (eds.) Proceedings of the 6th ACM Multimedia & Security Workshop, Magdeburg, Germany, September 20-21, pp. 63-67 (2004)
-
(2004)
Proceedings of the 6th ACM Multimedia & Security Workshop
, pp. 63-67
-
-
Sidorov, M.1
-
13
-
-
84957868624
-
-
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, 1525, pp. 306-318. Springer, Heidelberg (1998)
-
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306-318. Springer, Heidelberg (1998)
-
-
-
-
14
-
-
38849116275
-
The ultimate steganalysis benchmark?
-
Dittmann, J, Fridrich, J, eds, Dallas, TX, September 20-21, pp
-
Ker, A.D.: The ultimate steganalysis benchmark? In: Dittmann, J., Fridrich, J. (eds.) Proceedings of the 9th ACM Multimedia & Security Workshop, Dallas, TX, September 20-21, pp. 141-148 (2007)
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 141-148
-
-
Ker, A.D.1
-
16
-
-
70350495315
-
Important properties of normalized KL-divergence under HMC model. Technical report, DDE Lab, SUNY Binghamton
-
Filler, T.: Important properties of normalized KL-divergence under HMC model. Technical report, DDE Lab, SUNY Binghamton (2008), http://dde.binghamton. edu/filler/kl-divergence-hmc.pdf
-
-
-
Filler, T.1
-
17
-
-
0242408734
-
Digital image steganography using stochastic modulation
-
Delp, E.J, Wong, P.W, eds, Santa Clara, CA, January 21-24, 5020, pp
-
Fridrich, J., Goljan, M.: Digital image steganography using stochastic modulation. In: Delp, E.J., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, January 21-24, vol. 5020, pp. 191-202 (2003)
-
(2003)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents
, vol.5
, pp. 191-202
-
-
Fridrich, J.1
Goljan, M.2
-
18
-
-
33645676686
-
New blind steganalysis and its implications
-
Delp, E.J, Wong, P.W, eds, San Jose, CA, January 16-19, 6072, pp
-
Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Delp, E.J., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, January 16-19, vol. 6072, pp. 1-13 (2006)
-
(2006)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents
, vol.8
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
19
-
-
70350513199
-
Fisher information determines capacity of ε-secure steganography - proofs. Technical report, SUNY Binghamton
-
Filler, T.: Fisher information determines capacity of ε-secure steganography - proofs. Technical report, SUNY Binghamton (2009), http://dde.binghamton.edu/filler/pdf/Fill09ihwproofs.pdf
-
-
-
Filler, T.1
|