-
1
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
Santa Clara, CA, January 21- 24
-
Harmsen J J, Pearlman W A. Steganalysis of additive noise modelable information hiding. In Proc. SPIE Electronic Imaging 5022, Santa Clara, CA, January 21- 24, (2003), 131-142.
-
(2003)
Proc. SPIE Electronic Imaging 5022
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
2
-
-
8844250782
-
Fast additive noise steganalysis
-
San Jose, CA, January 19- 22
-
Harmsen J J, Bowers K D, Pearlman W A. Fast Additive Noise Steganalysis. In Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19- 22, (2004), 489-495.
-
(2004)
Proc. SPIE Symposium on Electronic Imaging
, pp. 489-495
-
-
Harmsen, J.J.1
Bowers, K.D.2
Pearlman, W.A.3
-
3
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox IJ., Kilian J., Leighton T., et al. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing (1997), 6(12):1673-1687.
-
(1997)
IEEE Transaction on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
-
4
-
-
0031354216
-
DCT-based watermark recovering without resorting to the uncorrupted original image
-
Atlanta, USA
-
Piva A., Barni M., Bartolini E, et al. DCT-based watermark recovering without resorting to the uncorrupted original image. In: Proceedings of 4th IEEE International Conference on Image Processing ICIP'97, Atlanta, USA, (1997), 520-523.
-
(1997)
Proceedings of 4th IEEE International Conference on Image Processing ICIP'97
, pp. 520-523
-
-
Piva, A.1
Barni, M.2
Bartolini, E.3
-
5
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Ker A. Steganalysis of LSB matching in grayscale images. IEEE. Signal Processing Letters, (2005), 12(6):441-444.
-
(2005)
IEEE. Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.1
-
6
-
-
33750555925
-
Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
-
Amsterdam, Netherlands, July 6-8
-
Yun Q. Shi, Guorong Xuan, Dekun Zou, Jianjiong Gao, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Wen Chen, Chunhua Chen: Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-Error Image, and Neural Network. In Proc. ICME 2005, Amsterdam, Netherlands, July 6-8, (2005), 269-272.
-
(2005)
Proc. ICME 2005
, pp. 269-272
-
-
Shi, Y.Q.1
Xuan, G.2
Zou, D.3
Gao, J.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, W.8
Chen, C.9
-
7
-
-
0041308536
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Noordwijkerhout, The Netherlands
-
Lyu S., Farid H. Detecting hidden messages using higher-order statistics and support vector machines. In Proc. 5th Int. Information Hiding Workshop, Noordwijkerhout, The Netherlands, 2002.
-
(2002)
Proc. 5th Int. Information Hiding Workshop
-
-
Lyu, S.1
Farid, H.2
-
8
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
Toronto, Ontario, Canada, May 23-25
-
Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Proc. 6th Int. Information Hiding Workshop, Toronto, Ontario, Canada, May 23-25, (2004)67-81.
-
(2004)
Proc. 6th Int. Information Hiding Workshop
, pp. 67-81
-
-
Fridrich, J.1
-
9
-
-
33646167860
-
Towards multi-class blind steganalyzer for jpeg images
-
Siena, Italy, September 15-17
-
Pevny T, Fridrich J. Towards Multi-class Blind Steganalyzer for JPEG Images. In Proc. IWDW 2005, Siena, Italy, September 15-17, (2005)39-53.
-
(2005)
Proc. IWDW 2005
, pp. 39-53
-
-
Pevny, T.1
Fridrich, J.2
-
11
-
-
68349127643
-
-
Westfeld A. F5. http://wwwrn.inf.tu-dresden.de/.
-
F5
-
-
Westfeld, A.1
-
13
-
-
84885931988
-
-
www.outguess.org/.
-
-
-
-
14
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
Sallee P. Model-based methods for steganography and steganalysis. International Journal of Image and Graphics, (2005), 5(1):167-189.
-
(2005)
International Journal of Image and Graphics
, vol.5
, Issue.1
, pp. 167-189
-
-
Sallee, P.1
-
15
-
-
84885913928
-
-
S. Hetzl. http://steghide.sourceforge.net/.
-
-
-
Hetzl, S.1
-
16
-
-
33749598442
-
Breaking cauchy model-based. Jpeg steganography with first order statistics
-
Sophia Antipolis, France, September 13- 15
-
Bohme R, Westfeld A. Breaking cauchy model-based. jpeg steganography with first order statistics. In Proc. ESORICS 2004, Sophia Antipolis, France, September 13- 15, (2004)125-140.
-
(2004)
Proc. ESORICS 2004
, pp. 125-140
-
-
Bohme, R.1
Westfeld, A.2
-
17
-
-
8844256156
-
Steganalysis using color wavelet statistics and one-class support vector machines
-
San Jose, CA, January 19-22
-
Lyu S, Farid H. Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines. In Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, January 19-22, (2004)35-45.
-
(2004)
Proc. SPIE Symposium on Electronic Imaging
, pp. 35-45
-
-
Lyu, S.1
Farid, H.2
-
18
-
-
84885941992
-
-
http://www.corel.com/.
-
-
-
-
19
-
-
84885897240
-
-
http://www.cs.washington.edu/.
-
-
-
-
20
-
-
21844480333
-
Image steganography and steganalysis: Concepts and practice
-
Seoul, Korea, October 20-22
-
Chandramouli R., Kharrazi M., Memon N D. Image Steganography and Steganalysis: Concepts and Practice. In Proc. IWDW 2003, Seoul, Korea, October 20-22, (2003), 35-49.
-
(2003)
Proc. IWDW 2003
, pp. 35-49
-
-
Chandramouli, R.1
Kharrazi, M.2
Memon, N.D.3
-
21
-
-
0026142897
-
The JPEG still picture compression standard
-
Wallace G. The JPEG Still Picture Compression Standard. Communications of the ACM, (1991), 34(4):30-44.
-
(1991)
Communications of the ACM
, vol.34
, Issue.4
, pp. 30-44
-
-
Wallace, G.1
-
23
-
-
24744444102
-
Effective steganalysis based on statistical moments of wavelet characteristic function
-
Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen. Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. ITCC(1) (2005), 768-773.
-
(2005)
ITCC
, Issue.1
, pp. 768-773
-
-
Shi, Y.Q.1
Xuan, G.2
Yang, C.3
Gao, J.4
Zhang, Z.5
Chai, P.6
Zou, D.7
Chen, C.8
Chen, W.9
|