-
2
-
-
15044345755
-
Capacity and codes for embedding information in gray-scale signals
-
Mar.
-
F. Willems and M. Dijk, "Capacity and codes for embedding information in gray-scale signals," IEEE Trans. Inf. Theory, vol.51, pp. 1209-1214, Mar. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, pp. 1209-1214
-
-
Willems, F.1
Dijk, M.2
-
3
-
-
45449087266
-
Constructing good covering codes for applications in steganography
-
J. Bierbrauer and J. Fridrich, "Constructing good covering codes for applications in steganography," LNCS Trans. Data Hiding and Multimed. Secur., vol.4920, no.3, pp. 1-22, 2008.
-
(2008)
LNCS Trans. Data Hiding and Multimed. Secur.
, vol.4920
, Issue.3
, pp. 1-22
-
-
Bierbrauer, J.1
Fridrich, J.2
-
5
-
-
0036688310
-
A secure data hiding scheme for binary images
-
Aug.
-
Y. C. Tseng, Y.-Y. Chen, and H.-K. Pan, "A secure data hiding scheme for binary images," IEEE Trans. Commun., vol.50, no.8, pp. 1227-1231, Aug. 2002.
-
(2002)
IEEE Trans. Commun.
, vol.50
, Issue.8
, pp. 1227-1231
-
-
Tseng, Y.C.1
Chen, Y.-Y.2
Pan, H.-K.3
-
7
-
-
33847156891
-
Steganography and error-correcting codes
-
C. Munuera, "Steganography and error-correcting codes," Signal Process., vol.87, pp. 1528-1533, 2007.
-
(2007)
Signal Process.
, vol.87
, pp. 1528-1533
-
-
Munuera, C.1
-
8
-
-
33748096430
-
Matrix embedding for large payloads
-
Sep.
-
J. Fridrich and D. Soukal, "Matrix embedding for large payloads," IEEE Trans. Inf. Secur. Forens., vol.1, no.3, pp. 390-394, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Secur. Forens.
, vol.1
, Issue.3
, pp. 390-394
-
-
Fridrich, J.1
Soukal, D.2
-
9
-
-
34548216307
-
Practical methods for minimizing embedding impact in steganography
-
Steganogr., Watermarking of Multimed. Contents IX, San Jose, CA
-
J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography," in Proc. SPIE, Secur., Steganogr., Watermarking of Multimed. Contents IX, San Jose, CA, 2007, vol.6050, pp. 2-3.
-
(2007)
Proc. SPIE, Secur.
, vol.6050
, pp. 2-3
-
-
Fridrich, J.1
Filler, T.2
-
10
-
-
47349094397
-
Efficient steganographic embedding by exploiting modification direction
-
Nov.
-
X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Lett., vol.10, pp. 781-783, Nov. 2006.
-
(2006)
IEEE Commun. Lett.
, vol.10
, pp. 781-783
-
-
Zhang, X.1
Wang, S.2
-
11
-
-
34147102225
-
Grid coloring in steganography
-
Apr.
-
J. Fridrich and P. Lisoněk, "Grid coloring in steganography," IEEE Trans. Inf. Theory, vol.53, pp. 1547-1549, Apr. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, pp. 1547-1549
-
-
Fridrich, J.1
Lisoněk, P.2
-
12
-
-
84937814312
-
F5-a steganographic algorithm: High capacity despite better steganalysis
-
LNCS 2137
-
A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," in Proc. 4th Int.Workshop Inf. Hiding, 2001, LNCS 2137, 2001, pp. 289-302.
-
(2001)
Proc. 4th Int.Workshop Inf. Hiding
, vol.2001
, pp. 289-302
-
-
Westfeld, A.1
-
13
-
-
21844470700
-
Writing on wet paper
-
Oct.
-
J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on wet paper," IEEE Trans. Signal Process., vol.53, pp. 3923-3935, Oct. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
14
-
-
34548335302
-
Improving embedding efficiency of covering codes for applications in steganography
-
Aug.
-
W. Zhang, S. Wang, and X. Zhang, "Improving embedding efficiency of covering codes for applications in steganography," IEEE Commun. Lett., vol.11, pp. 680-682, Aug. 2007.
-
(2007)
IEEE Commun. Lett.
, vol.11
, pp. 680-682
-
-
Zhang, W.1
Wang, S.2
Zhang, X.3
-
15
-
-
33645814428
-
LSB matching revisited
-
May
-
J. Mielikainen, "LSB matching revisited," IEEE Signal Process. Lett., vol.13, pp. 285-287, May 2006.
-
(2006)
IEEE Signal Process. Lett.
, vol.13
, pp. 285-287
-
-
Mielikainen, J.1
-
16
-
-
33746613626
-
A general framework for the structural steganalysis of LSB replacement
-
LNCS 3727
-
A. D. Ker, "A general framework for the structural steganalysis of LSB replacement," in Proc. Int.Workshop 7th Inf. Hiding, 2005, LNCS 3727, 2005, pp. 296-311.
-
(2005)
Proc. Int.Workshop 7th Inf. Hiding
, vol.2005
, pp. 296-311
-
-
Ker, A.D.1
-
17
-
-
37149022890
-
A coding problem in steganography
-
Jan.
-
W. Zhang and S. Li, "A coding problem in steganography," Designs, Codes and Cryptogr., vol.46, no.1, pp. 67-81, Jan. 2008.
-
(2008)
Designs, Codes and Cryptogr
, vol.46
, Issue.1
, pp. 67-81
-
-
Zhang, W.1
Li, S.2
-
18
-
-
0037854454
-
The duality between information embedding and source coding with side information and some applications
-
May
-
R. J. Barron, B. Chen, and G. W.Wornell, "The duality between information embedding and source coding with side information and some applications," IEEE Trans. Inf. Theory, vol.49, pp. 1159-1180, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, pp. 1159-1180
-
-
Barron, R.J.1
Chen, B.2
Wornell, G.W.3
|