-
1
-
-
0031996445
-
Exploring steganography: seeing the unseen
-
Johnson N.F., and Jajodia S. Exploring steganography: seeing the unseen. IEEE Computer 31 2 (1998) 26-34
-
(1998)
IEEE Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
3
-
-
3042742327
-
Hide and seek: an introduction to steganography
-
Provos N., and Honeyman P. Hide and seek: an introduction to steganography. IEEE Security and Privacy 1 3 (2003) 32-44
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
8
-
-
70350742466
-
Information noyée, information cach
-
〈www.apprendre-en-ligne.net/crypto/stegano/229_142_146.pdf〉 (in French).
-
Delahaye J.P. Information noyée, information cach. Pour la Science 229 (1996) 142-146. http://www.apprendre-en-ligne.net/crypto/stegano/229_142_146.pdf 〈www.apprendre-en-ligne.net/crypto/stegano/229_142_146.pdf〉 (in French).
-
(1996)
Pour la Science
, vol.229
, pp. 142-146
-
-
Delahaye, J.P.1
-
10
-
-
85055811894
-
A cautionary note on image downgrading
-
December
-
C. Kurak, J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IEEE 8th Annual Computer Security Applications Conference, 30 November-4 December, 1992, pp. 153-159.
-
(1992)
Proceedings of the IEEE 8th Annual Computer Security Applications Conference, 30 November-4
, pp. 153-159
-
-
Kurak, C.1
McHugh, J.2
-
11
-
-
70350739649
-
-
T.L. Thomas, Al qaeda and the internet: the danger of cyberplanning, parameters, US Army War College Quarterly-Spring 2003. Available from: 〈www.carlisle.army.mil/usawc/Parameters/03spring/thomas.pdf〉.
-
T.L. Thomas, Al qaeda and the internet: the danger of "cyberplanning", parameters, US Army War College Quarterly-Spring 2003. Available from: 〈www.carlisle.army.mil/usawc/Parameters/03spring/thomas.pdf〉.
-
-
-
-
15
-
-
0343867221
-
Applications for data hiding
-
Bender W., Butera W., Gruhl D., Hwang R., Paiz F.J., and Pogreb S. Applications for data hiding. IBM Systems Journal 39 3&4 (2000) 547-568
-
(2000)
IBM Systems Journal
, vol.39
, Issue.3-4
, pp. 547-568
-
-
Bender, W.1
Butera, W.2
Gruhl, D.3
Hwang, R.4
Paiz, F.J.5
Pogreb, S.6
-
17
-
-
0034441522
-
A secure data hiding technique with heterogeneous data-combining capability for electronic patient records
-
Chicago, USA, July 23-28
-
S. Miaou, C. Hsu, Y. Tsai, H. Chao, A secure data hiding technique with heterogeneous data-combining capability for electronic patient records, in: Proceedings of the IEEE 22nd Annual EMBS International Conference, Chicago, USA, July 23-28, 2000, pp. 280-283.
-
(2000)
Proceedings of the IEEE 22nd Annual EMBS International Conference
, pp. 280-283
-
-
Miaou, S.1
Hsu, C.2
Tsai, Y.3
Chao, H.4
-
18
-
-
0000525637
-
Watermarking medical images with patient information
-
Engineering in Medicine and Biology Society, Hong Kong, China, 29 October-1 November
-
U.C. Nirinjan, D. Anand, Watermarking medical images with patient information, in: Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Hong Kong, China, 29 October-1 November 1998, pp. 703-706.
-
(1998)
Proceedings of the 20th Annual International Conference of the IEEE
, pp. 703-706
-
-
Nirinjan, U.C.1
Anand, D.2
-
19
-
-
46749083866
-
Protection of mammograms using blind steganography and watermarking
-
Y. Li, C. Li, C. Wei, Protection of mammograms using blind steganography and watermarking, in: Proceedings of the IEEE International Symposium on Information Assurance and Security, 2007, pp. 496-499.
-
(2007)
Proceedings of the IEEE International Symposium on Information Assurance and Security
, pp. 496-499
-
-
Li, Y.1
Li, C.2
Wei, C.3
-
20
-
-
34547866457
-
Steganography approaches, options, and implications
-
Frith D. Steganography approaches, options, and implications. Network Security 2007 8 (2007) 4-7
-
(2007)
Network Security
, vol.2007
, Issue.8
, pp. 4-7
-
-
Frith, D.1
-
21
-
-
85032768213
-
A survey of image forgery detection
-
Farid H. A survey of image forgery detection. IEEE Signal Processing Magazine 26 2 (2009) 16-25
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.2
, pp. 16-25
-
-
Farid, H.1
-
22
-
-
67651102858
-
A secure and improved self-embedding algorithm to combat digital document forgery
-
Cheddad A., Condell J., Curran K., and Mc Kevitt P. A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing 89 12 (2009) 2324-2332
-
(2009)
Signal Processing
, vol.89
, Issue.12
, pp. 2324-2332
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Mc Kevitt, P.4
-
23
-
-
0001931684
-
A survey of steganographic techniques
-
Katzenbeisser S., and Petitcolas F.A.P. (Eds), Artech House, Inc., Norwood
-
Johnson N.F., and Katzenbeisser S.C. A survey of steganographic techniques. In: Katzenbeisser S., and Petitcolas F.A.P. (Eds). Information Hiding Techniques for Steganography and Digital Watermarking (2000), Artech House, Inc., Norwood
-
(2000)
Information Hiding Techniques for Steganography and Digital Watermarking
-
-
Johnson, N.F.1
Katzenbeisser, S.C.2
-
24
-
-
33748511457
-
An evaluation of image based steganography methods
-
Bailey K., and Curran K. An evaluation of image based steganography methods. Multimedia Tools and Applications 30 1 (2006) 55-88
-
(2006)
Multimedia Tools and Applications
, vol.30
, Issue.1
, pp. 55-88
-
-
Bailey, K.1
Curran, K.2
-
25
-
-
70350715523
-
-
[Hide and Seek]: 〈ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/cypherpunks/steganography/hdsk41b.zip〉
-
[Hide and Seek]: 〈ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/cypherpunks/steganography/hdsk41b.zip〉
-
-
-
-
26
-
-
70350744161
-
-
[S-Tools]: 〈ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip〉
-
[S-Tools]: 〈ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/s-tools4.zip〉
-
-
-
-
27
-
-
70350739551
-
-
[Stella]: 〈http://wwwicg.informatik.uni-rostock.de/~sanction/stella/〉
-
-
-
-
28
-
-
70350737611
-
-
[Hide in Picture]: 〈http://sourceforge.net/projects/hide-in-picture/〉
-
Hide in Picture]
-
-
-
29
-
-
70350727697
-
-
[Revelation]: 〈http://revelation.atspace.biz/〉
-
-
-
-
30
-
-
70350739550
-
-
[Camouflage]: 〈http://camouflage.unfiction.com/〉
-
-
-
-
31
-
-
70350715522
-
-
[JpegX]: 〈http://www.freewarefiles.com/Jpegx_program_19392.html〉
-
-
-
-
32
-
-
70350735104
-
-
[Data Stash]: 〈http://www.skyjuicesoftware.com/software/ds_info.html〉
-
Data Stash]
-
-
-
33
-
-
70350703908
-
-
[Other Tools]: 〈http://www.jjtc.com/Security/stegtools.htm〉
-
Tools]
-
-
-
34
-
-
70350711434
-
-
F5
-
[F5]: 〈http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html〉
-
-
-
-
35
-
-
70350739648
-
-
[OutGuess]: 〈http://www.outguess.org/〉.
-
-
-
-
37
-
-
33845305770
-
Fingerprinted secret sharing steganography for robustness against image cropping attacks
-
INDIN, Perth, Australia, 10-12 August
-
V.M. Potdar, S. Han, E. Chang, Fingerprinted secret sharing steganography for robustness against image cropping attacks, in: Proceedings of IEEE Third International Conference on Industrial Informatics (INDIN), Perth, Australia, 10-12 August 2005, pp. 717-724.
-
(2005)
Proceedings of IEEE Third International Conference on Industrial Informatics
, pp. 717-724
-
-
Potdar, V.M.1
Han, S.2
Chang, E.3
-
39
-
-
1542363259
-
A review of data hiding in digital images
-
the Society for Imaging Science and Technology
-
E.T. Lin, E.J. Delp, A review of data hiding in digital images, in: Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference, PICS'99, the Society for Imaging Science and Technology, 1999, pp. 274-278.
-
(1999)
Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference, PICS'99
, pp. 274-278
-
-
Lin, E.T.1
Delp, E.J.2
-
40
-
-
33747782523
-
New image steganographic methods using run-length approach
-
Chang C.C., Lin C.Y., and Wang Y.Z. New image steganographic methods using run-length approach. Information Sciences 176 22 (2006) 3393-3408
-
(2006)
Information Sciences
, vol.176
, Issue.22
, pp. 3393-3408
-
-
Chang, C.C.1
Lin, C.Y.2
Wang, Y.Z.3
-
41
-
-
84958756763
-
Lossy compression tolerant steganography
-
Proceedings of the First International Conference on The Human Society and the Internet-Internet Related Socio-Economic Issues
-
R.J. Hwang, K.T. Shih, C.H. Kao, T.M. Chang, Lossy compression tolerant steganography, in: Proceedings of the First International Conference on The Human Society and the Internet-Internet Related Socio-Economic Issues, Lecture Notes in Computer Science, 2001, vol. 2105, pp. 427-435.
-
(2001)
Lecture Notes in Computer Science
, vol.2105
, pp. 427-435
-
-
Hwang, R.J.1
Shih, K.T.2
Kao, C.H.3
Chang, T.M.4
-
42
-
-
34147191586
-
Steganalysis of palette images: Attack optimal parity assignment algorithm
-
December
-
X. Kong, Z. Wang, X. You, Steganalysis of palette images: attack optimal parity assignment algorithm, in: Proceedings of Fifth IEEE International Conference on Information, Communications and Signal Processing, 06-09 December 2005, pp. 860-864.
-
(2005)
Proceedings of Fifth IEEE International Conference on Information, Communications and Signal Processing, 06-09
, pp. 860-864
-
-
Kong, X.1
Wang, Z.2
You, X.3
-
43
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Proceedings of Information Hiding: Fifth International Workshop, IH Noordwijkerhout, The Netherlands, Springer, October 7-9
-
J. Fridrich, M. Goljan, D. Hogeg, Steganalysis of JPEG images: breaking the F5 algorithm, in: Proceedings of Information Hiding: Fifth International Workshop, IH 2002 Noordwijkerhout, The Netherlands, Lecture Notes in Computer Science, Springer, October 7-9, 2002, 2578/2003, pp. 310-323.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, Issue.2003
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogeg, D.3
-
44
-
-
55749098975
-
Data hiding method using image interpolation
-
Jung K.H., and Yoo K.Y. Data hiding method using image interpolation. Computer Standards and Interfaces 31 2 (2009) 465-470
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.2
, pp. 465-470
-
-
Jung, K.H.1
Yoo, K.Y.2
-
45
-
-
65949115512
-
Lossless data hiding scheme based on adjacent pixel difference
-
Z. Li, X. Chen, X. Pan, X. Zeng, Lossless data hiding scheme based on adjacent pixel difference, in: Proceedings of the International Conference on Computer Engineering and Technology, 2009, pp. 588-592.
-
(2009)
Proceedings of the International Conference on Computer Engineering and Technology
, pp. 588-592
-
-
Li, Z.1
Chen, X.2
Pan, X.3
Zeng, X.4
-
46
-
-
60749112009
-
Reversible image hiding scheme using predictive coding and histogram shifting
-
Tsai P., Hu Y.C., and Yeh H.L. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 89 6 (2009) 1129-1143
-
(2009)
Signal Processing
, vol.89
, Issue.6
, pp. 1129-1143
-
-
Tsai, P.1
Hu, Y.C.2
Yeh, H.L.3
-
47
-
-
58049131290
-
A comparative study of ±1 steganalyzers
-
October
-
G. Cancelli, G.J. Doërr, M. Barni, I.J. Cox, A comparative study of ±1 steganalyzers, in: Proceedings of IEEE 10th Workshop on Multimedia Signal Processing, MMSP'08, 8-10 October 2008, pp. 791-796.
-
(2008)
Proceedings of IEEE 10th Workshop on Multimedia Signal Processing, MMSP'08, 8-10
, pp. 791-796
-
-
Cancelli, G.1
Doërr, G.J.2
Barni, M.3
Cox, I.J.4
-
48
-
-
70350737610
-
-
A.C. Popescu, Statistical tools for digital image forensics, Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, 2005. Available from: 〈http://www.cs.dartmouth.edu/~farid/publications/apthesis05.html〉, on 16-05-07 at 12:20.
-
A.C. Popescu, Statistical tools for digital image forensics, Ph.D. Dissertation, Department of Computer Science, Dartmouth College, USA, 2005. Available from: 〈http://www.cs.dartmouth.edu/~farid/publications/apthesis05.html〉, on 16-05-07 at 12:20.
-
-
-
-
49
-
-
34248160605
-
A steganographic method based upon JPEG and particle swarm optimization algorithm
-
Li X., and Wang J. A steganographic method based upon JPEG and particle swarm optimization algorithm. Information Sciences 177 15 (2007) 3099-31091
-
(2007)
Information Sciences
, vol.177
, Issue.15
, pp. 3099-31091
-
-
Li, X.1
Wang, J.2
-
50
-
-
0036497685
-
A steganographic method based upon JPEG and quantization table modification
-
Chang C.C., Chen T.S., and Chung L.Z. A steganographic method based upon JPEG and quantization table modification. Information Sciences 141 1-2 (2002) 123-138
-
(2002)
Information Sciences
, vol.141
, Issue.1-2
, pp. 123-138
-
-
Chang, C.C.1
Chen, T.S.2
Chung, L.Z.3
-
51
-
-
40849120015
-
A new genetic algorithm approach for secure JPEG steganography
-
22-23 April
-
A.M. Fard, M. Akbarzadeh-T, F. Varasteh-A, A new genetic algorithm approach for secure JPEG steganography, in: Proceedings of IEEE International Conference on Engineering of Intelligent Systems, 22-23 April 2006, pp. 1-6.
-
(2006)
Proceedings of IEEE International Conference on Engineering of Intelligent Systems
, pp. 1-6
-
-
Fard, A.M.1
Akbarzadeh-T, M.2
Varasteh-A, F.3
-
52
-
-
33847704195
-
A robust steganography technique using discrete cosine transform insertion
-
Enabling Technologies for the New Knowledge Society, 5-6 December
-
A.I. Hashad, A.S. Madani, A.E.M.A. Wahdan, A robust steganography technique using discrete cosine transform insertion, in: Proceedings of IEEE/ITI Third International Conference on Information and Communications Technology, Enabling Technologies for the New Knowledge Society, 5-6 December 2005, pp. 255-264.
-
(2005)
Proceedings of IEEE/ITI Third International Conference on Information and Communications Technology
, pp. 255-264
-
-
Hashad, A.I.1
Madani, A.S.2
Wahdan, A.E.M.A.3
-
53
-
-
84928174250
-
A secure image steganography using LSB, DCT and compression techniques on raw images
-
December
-
K.B. Raja, C.R. Chowdary, K.R. Venugopal, L.M. Patnaik, A secure image steganography using LSB, DCT and compression techniques on raw images, in: Proceedings of IEEE 3rd International Conference on Intelligent Sensing and Information Processing, ICISIP'05, Bangalore, India, 14-17 December 2005, pp. 170-176.
-
(2005)
Proceedings of IEEE 3rd International Conference on Intelligent Sensing and Information Processing, ICISIP'05, Bangalore, India, 14-17
, pp. 170-176
-
-
Raja, K.B.1
Chowdary, C.R.2
Venugopal, K.R.3
Patnaik, L.M.4
-
56
-
-
61649119545
-
Detection of block DCT-based steganography in gray-scale images
-
December
-
C. Manikopoulos, S. Yun-Qing, S. Sui, Z. Zheng, N. Zhicheng, Z. Dekun, Detection of block DCT-based steganography in gray-scale images, in: Proceedings of the IEEE Workshop on Multimedia Signal Processing, 9-11 December 2002, pp. 355-358.
-
(2002)
Proceedings of the IEEE Workshop on Multimedia Signal Processing, 9-11
, pp. 355-358
-
-
Manikopoulos, C.1
Yun-Qing, S.2
Sui, S.3
Zheng, Z.4
Zhicheng, N.5
Dekun, Z.6
-
57
-
-
0011994605
-
Defending against statistical steganalysis, Center for Information Technology Integration, University of Michigan
-
Technical report, February
-
N. Provos, Defending against statistical steganalysis, Center for Information Technology Integration, University of Michigan, Technical report, February 2001.
-
(2001)
-
-
Provos, N.1
-
58
-
-
0011994605
-
Detecting steganographic content on the Internet, Center for Information Technology Integration, University of Michigan
-
Technical report, August 31
-
N. Provos, P. Honeyman, Detecting steganographic content on the Internet, Center for Information Technology Integration, University of Michigan, Technical report, August 31, 2001.
-
(2001)
-
-
Provos, N.1
Honeyman, P.2
-
59
-
-
84937814312
-
F5-A steganographic algorithm: High capacity despite better steganalysis
-
Proceedings of Fourth International Workshop on Information Hiding, Pittsburgh, USA, April
-
A. Westfeld, F5-A steganographic algorithm: high capacity despite better steganalysis, in: Proceedings of Fourth International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2137, Pittsburgh, USA, April 2001, pp. 289-302.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
60
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
Dallas, Texas, USA, September 20-21
-
J. Fridrich, T. Pevny, J. Kodovsky, Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities, in: Proceedings of the ACM Ninth Workshop on Multimedia & Security, Dallas, Texas, USA, September 20-21, 2007, pp. 3-14.
-
(2007)
Proceedings of the ACM Ninth Workshop on Multimedia & Security
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
-
62
-
-
33846993721
-
Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation
-
Chen W.Y. Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Applied Mathematics and Computation 185 1 (2007) 432-448
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.1
, pp. 432-448
-
-
Chen, W.Y.1
-
63
-
-
33845285852
-
A survey of digital image watermarking techniques
-
INDIN, Perth, Australia, 10-12 August
-
V.M. Potdar, S. Han, E. Chang, A survey of digital image watermarking techniques, in: Proceedings of the IEEE Third International Conference on Industrial Informatics (INDIN), Perth, Australia, 10-12 August 2005, pp. 709-716.
-
(2005)
Proceedings of the IEEE Third International Conference on Industrial Informatics
, pp. 709-716
-
-
Potdar, V.M.1
Han, S.2
Chang, E.3
-
64
-
-
70350711192
-
Watermarking image databases: A review
-
Karnataka, India, 22-23 December
-
B. Verma, S. Jain, D.P. Agarwal, Watermarking image databases: a review, in: Proceedings of the International Conference on Cognition and Recognition, Mandya, Karnataka, India, 22-23 December 2005, pp. 171-179.
-
(2005)
Proceedings of the International Conference on Cognition and Recognition, Mandya
, pp. 171-179
-
-
Verma, B.1
Jain, S.2
Agarwal, D.P.3
-
65
-
-
54549122578
-
Robust data hiding for images
-
21-25 August
-
N.K. Abdulaziz, K.K. Pang, Robust data hiding for images, in: Proceedings of IEEE International Conference on Communication Technology, WCC-ICCT'02, vol. 1, 21-25 August 2000, pp. 380-383.
-
(2000)
Proceedings of IEEE International Conference on Communication Technology, WCC-ICCT'02
, vol.1
, pp. 380-383
-
-
Abdulaziz, N.K.1
Pang, K.K.2
-
66
-
-
33747799627
-
New system fights steganography, News Briefs
-
Paulson L.D. New system fights steganography, News Briefs. IEEE Computer Society 39 8 (2006) 25-27
-
(2006)
IEEE Computer Society
, vol.39
, Issue.8
, pp. 25-27
-
-
Paulson, L.D.1
-
67
-
-
50649119706
-
A discrete wavelet transform based technique for image data hiding
-
Egypt, March 18-20
-
A.A. Abdelwahab, L.A. Hassan, A discrete wavelet transform based technique for image data hiding, in: Proceedings of 25th National Radio Science Conference, NRSC 2008, Egypt, March 18-20, 2008, pp. 1-9.
-
(2008)
Proceedings of 25th National Radio Science Conference, NRSC
, pp. 1-9
-
-
Abdelwahab, A.A.1
Hassan, L.A.2
-
68
-
-
35048819204
-
Model-based steganography
-
Proceedings of the Second International Workshop on Digital Watermarking, Seoul, Korea, October 20-22
-
P. Sallee, Model-based steganography, in: Proceedings of the Second International Workshop on Digital Watermarking, Seoul, Korea, October 20-22, 2003, Lecture Notes in Computer Science, vol. 2939, pp. 254-260.
-
(2003)
Lecture Notes in Computer Science
, vol.2939
, pp. 254-260
-
-
Sallee, P.1
-
69
-
-
33847679624
-
Performance study of common image steganography and steganalysis techniques
-
Kharrazi M., Sencar H.T., and Memon N. Performance study of common image steganography and steganalysis techniques. Journal of Electrical Imaging 15 4 (2006) 1-16
-
(2006)
Journal of Electrical Imaging
, vol.15
, Issue.4
, pp. 1-16
-
-
Kharrazi, M.1
Sencar, H.T.2
Memon, N.3
-
70
-
-
0242413905
-
Steganographic system based on higher-order statistics
-
Santa Clara, California, USA, 5020, pp
-
R. Tzschoppe, R. Baum, J. Huber, A. Kaup, Steganographic system based on higher-order statistics, in: Proceedings of SPIE, Security and Watermarking of Multimedia Contents V. Santa Clara, California, USA 2003, vol. 5020, pp. 156-166.
-
(2003)
Proceedings of SPIE, Security and Watermarking of Multimedia Contents
, vol.5
, pp. 156-166
-
-
Tzschoppe, R.1
Baum, R.2
Huber, J.3
Kaup, A.4
-
71
-
-
4544351078
-
A steganographic method for digital images using side match
-
Chang C.C., and Tseng H.W. A steganographic method for digital images using side match. Pattern Recognition Letters 25 12 (2004) 1431-1437
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.12
, pp. 1431-1437
-
-
Chang, C.C.1
Tseng, H.W.2
-
72
-
-
14844331754
-
Adaptive steganography based on dithering
-
September 20-21, Magdeburg, Germany, pp
-
E. Franz, A. Schneidewind, Adaptive steganography based on dithering, in: Proceedings of the ACM Workshop on Multimedia and Security, September 20-21, 2004, Magdeburg, Germany, pp. 56-62.
-
(2004)
Proceedings of the ACM Workshop on Multimedia and Security
, pp. 56-62
-
-
Franz, E.1
Schneidewind, A.2
-
73
-
-
33749598442
-
Breaking cauchy model-based JPEG steganography with first order statistics
-
Proceedings of the European Symposium on Research in Computer Security, ESORICS, Valbonne, France, 13th September
-
R. Böhme, A. Westfeld, Breaking cauchy model-based JPEG steganography with first order statistics, in: Proceedings of the European Symposium on Research in Computer Security, ESORICS 2004, Valbonne, France, 13th September 2004, Lecture Notes in Computer Science, vol. 3193, pp. 125-140.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 125-140
-
-
Böhme, R.1
Westfeld, A.2
-
74
-
-
55549107155
-
PM1 steganography in JPEG images using genetic algorithm
-
Yu L., Zhao Y., Ni R., and Zhu Z. PM1 steganography in JPEG images using genetic algorithm. Soft Computing 13 4 (2009) 393-400
-
(2009)
Soft Computing
, vol.13
, Issue.4
, pp. 393-400
-
-
Yu, L.1
Zhao, Y.2
Ni, R.3
Zhu, Z.4
-
75
-
-
35048834273
-
-
Springer
-
C.C. Chang, P. Tsai, M.H. Lin, An adaptive steganography for index-based images using codeword grouping, Advances in Multimedia Information Processing-PCM, Springer, vol. 3333, 2004, pp. 731-738.
-
(2004)
An adaptive steganography for index-based images using codeword grouping, Advances in Multimedia Information Processing-PCM
, vol.3333
, pp. 731-738
-
-
Chang, C.C.1
Tsai, P.2
Lin, M.H.3
-
76
-
-
70350713375
-
-
H. Hioki, A data embedding method using BPCS principle with new complexity measures, in: Proceedings of Pacific Rim Workshop on Digital Steganography, July 2002, pp. 30-47.
-
H. Hioki, A data embedding method using BPCS principle with new complexity measures, in: Proceedings of Pacific Rim Workshop on Digital Steganography, July 2002, pp. 30-47.
-
-
-
-
77
-
-
51849169376
-
Robust image adaptive steganography using integer wavelets
-
6-10 January
-
K.B. Raja, S. Sindhu, T.D. Mahalakshmi, S. Akshatha, B.K. Nithin, M. Sarvajith, K.R. Venugopal, L.M. Patnaik, Robust image adaptive steganography using integer wavelets, in: Proceedings of the Third International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE'08, 6-10 January 2008, pp. 614-621.
-
(2008)
Proceedings of the Third International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE'08
, pp. 614-621
-
-
Raja, K.B.1
Sindhu, S.2
Mahalakshmi, T.D.3
Akshatha, S.4
Nithin, B.K.5
Sarvajith, M.6
Venugopal, K.R.7
Patnaik, L.M.8
-
78
-
-
70350703907
-
-
Master Dissertation, Texas Tech. University, USA, December, available from
-
Y. Srinivasan, High capacity data hiding system using BPCS steganography, Master Dissertation, Texas Tech. University, USA, December 2003, pp. 8, available from: 〈http://etd.lib.ttu.edu/theses/available/etd-06272008-31295018922590/unrestricted/31295018922590.pdf〉
-
(2003)
High capacity data hiding system using BPCS steganography
, pp. 8
-
-
Srinivasan, Y.1
-
79
-
-
0036833013
-
BPCS steganography using EZW lossy compressed images
-
Spaulding J., Noda H., Shirazi M.N., and Kawaguchi E. BPCS steganography using EZW lossy compressed images. Pattern Recognition Letters 23 13 (2002) 1579-1587
-
(2002)
Pattern Recognition Letters
, vol.23
, Issue.13
, pp. 1579-1587
-
-
Spaulding, J.1
Noda, H.2
Shirazi, M.N.3
Kawaguchi, E.4
-
80
-
-
50249108926
-
-
Brisbane, Australia, August 22-25
-
J. Fridrich, Application of data hiding in digital images, Tutorial for the ISSPA'99, Brisbane, Australia, August 22-25, 1999.
-
(1999)
Application of data hiding in digital images, Tutorial for the ISSPA'99
-
-
Fridrich, J.1
-
81
-
-
4544276321
-
Secure transmission of medical records using high capacity steganography
-
Y. Srinivasan, B. Nutter, S. Mitra, B. Phillips, D. Ferris, Secure transmission of medical records using high capacity steganography, in: Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, CBMS'04, 2004, pp. 122-127.
-
(2004)
Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, CBMS'04
, pp. 122-127
-
-
Srinivasan, Y.1
Nutter, B.2
Mitra, S.3
Phillips, B.4
Ferris, D.5
-
82
-
-
0032634270
-
Principle and applications of BPCS steganography
-
2-4 November
-
E. Kawaguchi, R.O. Eason, Principle and applications of BPCS steganography, in: Proceedings of SPIE International Symposium on Voice, Video, and Data Communications, 2-4 November 1998, pp. 464-473.
-
(1998)
Proceedings of SPIE International Symposium on Voice, Video, and Data Communications
, pp. 464-473
-
-
Kawaguchi, E.1
Eason, R.O.2
-
83
-
-
49449101106
-
Multilevel reversible data hiding based on histogram modification of difference images
-
Lin C.C., Tai W.L., and Chang C.C. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition 41 12 (2008) 3582-3591
-
(2008)
Pattern Recognition
, vol.41
, Issue.12
, pp. 3582-3591
-
-
Lin, C.C.1
Tai, W.L.2
Chang, C.C.3
-
84
-
-
31744433507
-
Genetic algorithm based methodology for breaking the steganalytic systems
-
Wu Y.T., and Shih F.Y. Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Transactions on Systems, Man, and Cybernetics-part B: cybernetics 36 1 (2006) 24-31
-
(2006)
IEEE Transactions on Systems, Man, and Cybernetics-part B: cybernetics
, vol.36
, Issue.1
, pp. 24-31
-
-
Wu, Y.T.1
Shih, F.Y.2
-
85
-
-
35048868460
-
Genetic algorithm for optimal imperceptibility in image communication through noisy Channel
-
October
-
S.P. Maity, M.K. Kundu, P.K. Nandi, Genetic algorithm for optimal imperceptibility in image communication through noisy Channel, in: Proceedings of the International Conference on Neural Information Processing (ICONIP '2004), India, 29 October 2004, pp. 700-705.
-
(2004)
Proceedings of the International Conference on Neural Information Processing (ICONIP '2004), India, 29
, pp. 700-705
-
-
Maity, S.P.1
Kundu, M.K.2
Nandi, P.K.3
-
86
-
-
65949107853
-
A novel content-based information hiding scheme
-
22-24 January
-
J. Kong, H. Jia, X. Li, Z. Qi, A novel content-based information hiding scheme, in: Proceedings of the International Conference on Computer Engineering and Technology, 22-24 January 2009, vol. 1, pp. 436-440.
-
(2009)
Proceedings of the International Conference on Computer Engineering and Technology
, vol.1
, pp. 436-440
-
-
Kong, J.1
Jia, H.2
Li, X.3
Qi, Z.4
-
87
-
-
59049094514
-
A high capacity 3D steganography algorithm
-
Chao M.W., Lin C.H., Yu C.W., and Lee T.Y. A high capacity 3D steganography algorithm. IEEE Transactions on Visualization and Computer Graphics 15 2 (2009) 274-284
-
(2009)
IEEE Transactions on Visualization and Computer Graphics
, vol.15
, Issue.2
, pp. 274-284
-
-
Chao, M.W.1
Lin, C.H.2
Yu, C.W.3
Lee, T.Y.4
-
88
-
-
42949136894
-
-
A. Bogomjakov, C. Gotsman, M. Isenburg, Distortion-free steganography for polygon meshes, in: Proceedings of Computer Graphics Forum, Eurographics'08, April 2008, 27 (2), pp. 637-642.
-
A. Bogomjakov, C. Gotsman, M. Isenburg, Distortion-free steganography for polygon meshes, in: Proceedings of Computer Graphics Forum, Eurographics'08, April 2008, vol. 27 (2), pp. 637-642.
-
-
-
-
89
-
-
50249090066
-
Information hiding based on image morphing
-
March
-
H. Nakamura, Q. Zhao, Information hiding based on image morphing, in: Proceedings of 22nd International Conference on Advanced Information Networking and Applications Workshops, AINAW, 25-28 March 2008, pp. 1585-1590.
-
(2008)
Proceedings of 22nd International Conference on Advanced Information Networking and Applications Workshops, AINAW, 25-28
, pp. 1585-1590
-
-
Nakamura, H.1
Zhao, Q.2
-
90
-
-
70350709201
-
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
-
Zeki A.M., and Manaf A.A. A novel digital watermarking technique based on ISB (Intermediate Significant Bit). World Academy of Science, Engineering and Technology 38 (2009) 1080-1087
-
(2009)
World Academy of Science, Engineering and Technology
, vol.38
, pp. 1080-1087
-
-
Zeki, A.M.1
Manaf, A.A.2
-
91
-
-
34547445526
-
A new steganographic method for color and grayscale image hiding
-
Yu Y.H., Chang C.C., and Lin I.C. A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding 107 3 (2007) 183-194
-
(2007)
Computer Vision and Image Understanding
, vol.107
, Issue.3
, pp. 183-194
-
-
Yu, Y.H.1
Chang, C.C.2
Lin, I.C.3
-
92
-
-
70350722995
-
-
M. Drew, S. Bergner, Spatio-chromatic decorrelation for color image compression, Technical Report, School of Computing Science, Simon Fraser University, Vancouver, Canada, 2007, available from: 〈http://fas.sfu.ca/pub/cs/TR/2007/CMPT2007-09.pdf〉.
-
M. Drew, S. Bergner, Spatio-chromatic decorrelation for color image compression, Technical Report, School of Computing Science, Simon Fraser University, Vancouver, Canada, 2007, available from: 〈http://fas.sfu.ca/pub/cs/TR/2007/CMPT2007-09.pdf〉.
-
-
-
-
93
-
-
84937060908
-
Color image wavelet compression using vector morphology
-
September 5-8, Tampere, Finland
-
M. Saenz, R. Oktem, K. Egiazarian, E. Delp, Color image wavelet compression using vector morphology, in: Proceedings of the European Signal Processing Conference, September 5-8 2000, Tampere, Finland, 2000, pp. 5-8.
-
(2000)
Proceedings of the European Signal Processing Conference
, pp. 5-8
-
-
Saenz, M.1
Oktem, R.2
Egiazarian, K.3
Delp, E.4
-
94
-
-
0003112504
-
Multimedia systems and applications
-
Rodriguez A., and Rowe L. Multimedia systems and applications. IEEE Computer 28 5 (1995) 20-22
-
(1995)
IEEE Computer
, vol.28
, Issue.5
, pp. 20-22
-
-
Rodriguez, A.1
Rowe, L.2
-
95
-
-
2942615175
-
Using similarity measures and homogeneity for the comparison of images
-
Van Der Weken D., Nachtegael M., and Kerre E. Using similarity measures and homogeneity for the comparison of images. Image and Vision Computing 22 9 (2004) 695-702
-
(2004)
Image and Vision Computing
, vol.22
, Issue.9
, pp. 695-702
-
-
Van Der Weken, D.1
Nachtegael, M.2
Kerre, E.3
-
96
-
-
0033601691
-
A fair benchmark for image watermarking systems
-
San Jose, California, USA, 25-27 January
-
M. Kutter, F. Petitcolas, A fair benchmark for image watermarking systems, in: Proceedings of Electronic Imaging '99, Security and Watermarking of Multimedia Contents, San Jose, California, USA, 25-27 January 1999, vol. 3657, pp. 226-239.
-
(1999)
Proceedings of Electronic Imaging '99, Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 226-239
-
-
Kutter, M.1
Petitcolas, F.2
-
98
-
-
0036034444
-
Practical steganalysis of digital images-state of the art
-
San Jose, California, January
-
J. Fridrich, M. Goljan, Practical steganalysis of digital images-state of the art, in: Proceedings of SPIE Photonics West, Electronic Imaging'02, Security and Watermarking of Multimedia Contents, San Jose, California, January 2002, vol. 4675, pp. 1-13.
-
(2002)
Proceedings of SPIE Photonics West, Electronic Imaging'02, Security and Watermarking of Multimedia Contents
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
100
-
-
0034430895
-
Exploring on steganography for low bit rate wavelet based coder in image retrieval system
-
Kuala Lumpur, Malaysia
-
S. Areepongsa, N. Kaewkamnerd, Y.F. Syed, K.R. Rao, Exploring on steganography for low bit rate wavelet based coder in image retrieval system, in: Proceedings of IEEE TENCON, Kuala Lumpur, Malaysia, 2000, vol. 3, pp. 250-255.
-
(2000)
Proceedings of IEEE TENCON
, vol.3
, pp. 250-255
-
-
Areepongsa, S.1
Kaewkamnerd, N.2
Syed, Y.F.3
Rao, K.R.4
-
101
-
-
70350725400
-
A survey of steganographic techniques for image files
-
Kruus P., Scace C., Heyman M., and Mundy M. A survey of steganographic techniques for image files. Advanced Security Research Journal V I (2003) 41-51
-
(2003)
Advanced Security Research Journal
, vol.V
, Issue.I
, pp. 41-51
-
-
Kruus, P.1
Scace, C.2
Heyman, M.3
Mundy, M.4
-
102
-
-
54049153656
-
Skin tone based steganography in video files exploiting the YCbCr colour space
-
Hannover, Germany, June 23-26
-
A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, Skin tone based steganography in video files exploiting the YCbCr colour space, in: Proceedings of the IEEE International Conference on Multimedia and Expo, Hannover, Germany, June 23-26, 2008, pp. 905-909.
-
(2008)
Proceedings of the IEEE International Conference on Multimedia and Expo
, pp. 905-909
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Mc Kevitt, P.4
-
103
-
-
67651108785
-
A skin tone detection algorithm for an adaptive approach to steganography
-
Cheddad A., Condell J., Curran K., and Mc Kevitt P. A skin tone detection algorithm for an adaptive approach to steganography. Signal Processing 89 12 (2009) 2465-2478
-
(2009)
Signal Processing
, vol.89
, Issue.12
, pp. 2465-2478
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Mc Kevitt, P.4
-
105
-
-
0034270385
-
Robust watermarking of facial images based on salient geometric pattern matching
-
Nikolaidis A., and Pitas I. Robust watermarking of facial images based on salient geometric pattern matching. IEEE Transactions on Multimedia 2 3 (2000) 172-184
-
(2000)
IEEE Transactions on Multimedia
, vol.2
, Issue.3
, pp. 172-184
-
-
Nikolaidis, A.1
Pitas, I.2
-
106
-
-
2642515522
-
A steganographic scheme for secure communications based on the chaos and Euler theorem
-
Lou D.C., and Sung C.H. A steganographic scheme for secure communications based on the chaos and Euler theorem. IEEE Transactions on Multimedia 6 3 (2004) 501-509
-
(2004)
IEEE Transactions on Multimedia
, vol.6
, Issue.3
, pp. 501-509
-
-
Lou, D.C.1
Sung, C.H.2
-
107
-
-
62949241216
-
Securing information content using new encryption method and steganography
-
University of East London, UK, 13-16 November
-
A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, Securing information content using new encryption method and steganography, in: Proceedings of the Third IEEE International Conference on Digital Information Management, University of East London, UK, 13-16 November 2008, pp. 563-568.
-
(2008)
Proceedings of the Third IEEE International Conference on Digital Information Management
, pp. 563-568
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Mc Kevitt, P.4
-
108
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Wu D.C., and Tsai W.H. A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24 9-10 (2003) 1613-1626
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
109
-
-
42949124470
-
Influence of embedding strategies on security of steganographic methods in the JPEG domain
-
San Jose, CA, January 28-30, 6819, pp
-
J. Kodovsky, J. Fridrich, Influence of embedding strategies on security of steganographic methods in the JPEG domain, in: Proceedings of SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 28-30, 2008, vol. 6819, pp. 1-13.
-
(2008)
Proceedings of SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents
, vol.10
, pp. 1-13
-
-
Kodovsky, J.1
Fridrich, J.2
-
110
-
-
59149105989
-
Steganalysis of reversible contrast mapping watermarking
-
Chen Y.S., and Wang R.Z. Steganalysis of reversible contrast mapping watermarking. IEEE Signal Processing Letters 16 2 (2009) 125-128
-
(2009)
IEEE Signal Processing Letters
, vol.16
, Issue.2
, pp. 125-128
-
-
Chen, Y.S.1
Wang, R.Z.2
-
111
-
-
0003822632
-
A statistical test suite for random and pseudorandom number generators for cryptographic applications, National Institute of Standards and Technology (NIST)
-
August
-
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, S. Vo, A statistical test suite for random and pseudorandom number generators for cryptographic applications, National Institute of Standards and Technology (NIST), special publication 800-22, August 2008.
-
(2008)
special publication
, vol.800 -22
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
112
-
-
0032310338
-
A methodology for data hiding using images
-
Boston, MA, USA, 18-21 October
-
L.M. Marvel, C.T. Retter, A methodology for data hiding using images, in: Proceedings of IEEE Military Communications Conference, MILCOM'98, Boston, MA, USA, 18-21 October 1998, pp. 1044-1047.
-
(1998)
Proceedings of IEEE Military Communications Conference, MILCOM'98
, pp. 1044-1047
-
-
Marvel, L.M.1
Retter, C.T.2
-
114
-
-
70350711433
-
-
P. Bas, Analyse stéganographique d'images numériques: Comparaison de différentes méthodes, Rapport de stage, Laboratoire des Images et des Signaux, University of Joseph Fourier, 23rd June 2003, (in French).
-
P. Bas, Analyse stéganographique d'images numériques: Comparaison de différentes méthodes, Rapport de stage, Laboratoire des Images et des Signaux, University of Joseph Fourier, 23rd June 2003, (in French).
-
-
-
-
115
-
-
0034787093
-
Reliable detection of LSB steganography in grayscale and color images
-
Session on Multimedia Security and Watermarking, Ottawa, Canada, 5th October
-
J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in grayscale and color images, in: Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, 5th October 2001, pp. 27-30.
-
(2001)
Proceedings of ACM, Special
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
116
-
-
0036448130
-
Image steganalysis with binary similarity measures
-
24-28 June
-
I. Avcibas, N. Memon, B. Sankur, Image steganalysis with binary similarity measures, in: Proceedings of the IEEE International Conference on Image Processing, 24-28 June 2002, vol. 3, pp. 645-648.
-
(2002)
Proceedings of the IEEE International Conference on Image Processing
, vol.3
, pp. 645-648
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
118
-
-
35048813035
-
Exploiting preserved statistics for steganalysis
-
Springer, Berlin
-
Bohme R., and Westfeld A. Exploiting preserved statistics for steganalysis. Lecture Notes in Computer Science vol. 3200/2005 (2005), Springer, Berlin 82-96
-
(2005)
Lecture Notes in Computer Science
, vol.3200-2005
, pp. 82-96
-
-
Bohme, R.1
Westfeld, A.2
-
119
-
-
0036543654
-
Data hiding watermarking for halftone images
-
Fu M.S., and Au O.C. Data hiding watermarking for halftone images. IEEE Transactions on Image Processing 11 4 (2002) 477-484
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.4
, pp. 477-484
-
-
Fu, M.S.1
Au, O.C.2
-
120
-
-
39749184675
-
Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning
-
Guo J.M. Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning. Signal Processing 88 6 (2008) 1496-1510
-
(2008)
Signal Processing
, vol.88
, Issue.6
, pp. 1496-1510
-
-
Guo, J.M.1
-
121
-
-
60749124959
-
Steganalysis of halftone image using inverse halftoning
-
Cheng J., and Kot A.C. Steganalysis of halftone image using inverse halftoning. Signal Processing 89 6 (2009) 1000-1010
-
(2009)
Signal Processing
, vol.89
, Issue.6
, pp. 1000-1010
-
-
Cheng, J.1
Kot, A.C.2
-
122
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
Fridrich J., Goljan M., and Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8 4 (2001) 22-28
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
123
-
-
34548232251
-
-
T. Pevny, J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis, in: Proceedings of SPIE Electronic Imaging, Photonics West, USA, January 2007, pp. 03-04.
-
T. Pevny, J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis, in: Proceedings of SPIE Electronic Imaging, Photonics West, USA, January 2007, pp. 03-04.
-
-
-
-
124
-
-
56749160543
-
Steganalysis of YASS
-
September
-
B. Li, Y.Q. Shi, J. Huang, Steganalysis of YASS, in: Proceedings of 10th ACM Workshop on Multimedia and Security, Oxford, United Kingdom, 22-23 September 2008, pp. 139-148.
-
(2008)
Proceedings of 10th ACM Workshop on Multimedia and Security, Oxford, United Kingdom, 22-23
, pp. 139-148
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
125
-
-
49949091527
-
YASS: Yet another steganographic scheme that resists blind steganalysis
-
Proceedings of the Ninth International Workshop on Information Hiding, Saint Malo, France, 11-13 June
-
K. Solanki, A. Sarkar, B.S. Manjunath, YASS: yet another steganographic scheme that resists blind steganalysis, in: Proceedings of the Ninth International Workshop on Information Hiding, Saint Malo, France, 11-13 June 2007, Lecture Notes in Computer Science, vol. 4567, pp. 16-31.
-
(2007)
Lecture Notes in Computer Science
, vol.4567
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
126
-
-
42949124470
-
Influence of embedding strategies on security of steganographic methods in the JPEG domain
-
San Jose, CA, January 28-31, 6819, pp
-
J. Kodovský, J. Fridrich, Influence of embedding strategies on security of steganographic methods in the JPEG domain, in: Proceedings of SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 28-31, 2008, vol. 6819, pp. 1-13.
-
(2008)
Proceedings of SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents
, vol.10
, pp. 1-13
-
-
Kodovský, J.1
Fridrich, J.2
-
127
-
-
70350729889
-
Weaknesses of MB2
-
Guangzhou, China, December 3-5
-
C. Ullerich, A. Westfeld, Weaknesses of MB2, in: Proceedings of the Sixth International Workshop on Digital Watermarking, Guangzhou, China, December 3-5, 2007, pp. 127-142.
-
(2007)
Proceedings of the Sixth International Workshop on Digital Watermarking
, pp. 127-142
-
-
Ullerich, C.1
Westfeld, A.2
-
128
-
-
51749089283
-
JPEG image steganalysis utilizing both intrablock and interblock correlations
-
Seattle, Washington, USA, 18-21 May
-
C. Chen, Y.Q. Shi, JPEG image steganalysis utilizing both intrablock and interblock correlations, in: Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS 2008, Seattle, Washington, USA, 18-21 May 2008, pp. 3029-3032.
-
(2008)
Proceedings of IEEE International Symposium on Circuits and Systems, ISCAS
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.Q.2
-
129
-
-
46449106742
-
JPEG based conditional entropy coding for correlated steganography
-
Beijing, China, 2-5 July
-
L. Zheng, I. Cox, JPEG based conditional entropy coding for correlated steganography, in: Proceedings of IEEE International Conference on Multimedia and Expo, Beijing, China, 2-5 July 2007, pp. 1251-1254.
-
(2007)
Proceedings of IEEE International Conference on Multimedia and Expo
, pp. 1251-1254
-
-
Zheng, L.1
Cox, I.2
-
130
-
-
70350737609
-
Information hiding, watermarking and steganography, Public Seminar, Intelligent Systems Research Centre (ISRC), University of Ulster at Magee, Northern Ireland
-
I. Cox, Information hiding, watermarking and steganography, Public Seminar, Intelligent Systems Research Centre (ISRC), University of Ulster at Magee, Northern Ireland, 28th April 2009.
-
(2009)
28th April
-
-
Cox, I.1
-
131
-
-
70350711431
-
An investigation into the use of the least significant bit substitution technique in digital watermarking
-
Curran K., Li X., and Clarke R. An investigation into the use of the least significant bit substitution technique in digital watermarking. American Journal Applied Sciences 2 3 (2005) 648-654
-
(2005)
American Journal Applied Sciences
, vol.2
, Issue.3
, pp. 648-654
-
-
Curran, K.1
Li, X.2
Clarke, R.3
-
132
-
-
1642588164
-
A novel video watermarking scheme in compression domain based on fast motion estimation
-
Z. Zhao, N. Yu, X. Li, A novel video watermarking scheme in compression domain based on fast motion estimation, in: Proceedings of IEEE International Conference on Communication Technology, 2003, pp. 1878-1882.
-
(2003)
Proceedings of IEEE International Conference on Communication Technology
, pp. 1878-1882
-
-
Zhao, Z.1
Yu, N.2
Li, X.3
-
133
-
-
64549118174
-
A local Tchebichef moments-based robust image watermarking
-
Deng C., Gao X., Li X., and Tao D. A local Tchebichef moments-based robust image watermarking. Signal Processing 89 8 (2009) 1531-1539
-
(2009)
Signal Processing
, vol.89
, Issue.8
, pp. 1531-1539
-
-
Deng, C.1
Gao, X.2
Li, X.3
Tao, D.4
-
134
-
-
38049065517
-
Digital watermarking in image affine co-variant regions
-
C. Deng, X. Gao, D. Tao, X. Li, Digital watermarking in image affine co-variant regions, in: International Conference on Machine Learning and Cybernetics, vol. 4, 2007, pp. 2125-2130.
-
(2007)
International Conference on Machine Learning and Cybernetics
, vol.4
, pp. 2125-2130
-
-
Deng, C.1
Gao, X.2
Tao, D.3
Li, X.4
-
135
-
-
66049112566
-
Geometrically invariant watermarking using affine covariant regions
-
C. Deng, X. Gao, D. Tao, X. Li, Geometrically invariant watermarking using affine covariant regions, in: Proceedings of IEEE International Conference on Image Processing, 2008, pp. 413-416.
-
(2008)
Proceedings of IEEE International Conference on Image Processing
, pp. 413-416
-
-
Deng, C.1
Gao, X.2
Tao, D.3
Li, X.4
-
136
-
-
62949143034
-
Invariant image watermarking based on local feature regions
-
C. Deng, X. Gao, D. Tao, X. Li, Invariant image watermarking based on local feature regions, in: Proceedings of International Conference on Cyberworlds, 2008, pp. 6-10.
-
(2008)
Proceedings of International Conference on Cyberworlds
, pp. 6-10
-
-
Deng, C.1
Gao, X.2
Tao, D.3
Li, X.4
-
137
-
-
0041339711
-
Watermarking in secure image retrieval
-
Li X. Watermarking in secure image retrieval. Pattern Recognition Letters 24 14 (2003) 2431-2434
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.14
, pp. 2431-2434
-
-
Li, X.1
|