-
1
-
-
33845191956
-
Equivalence Analysis among DIH, SPA, and RS Steganalysis Methods
-
the 10th IFIP conference of Communication and Multimedia Security
-
X. Luo, C. Yang, F. Liu. Equivalence Analysis among DIH, SPA, and RS Steganalysis Methods, the 10th IFIP conference of Communication and Multimedia Security, LNCS 4237, 2006, pp.161-172.
-
(2006)
LNCS
, vol.4237
, pp. 161-172
-
-
Luo, X.1
Yang, C.2
Liu, F.3
-
2
-
-
77951482012
-
-
JPEG-Jsteg. [Online]. Available
-
D. Upham, JPEG-Jsteg. [Online]. Available: Http://zooid.org/~paul/crypto/ jsteg/
-
-
-
Upham, D.1
-
3
-
-
3042742327
-
Hide and Seek: An Introduction to Steganography
-
N. Provos, P. Honeyman. Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy, 2003, 1 (3): 32-44.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
4
-
-
44149103187
-
Biometric Inspired Digital Image Steganography
-
A. Cheddad, J. Condell, K. Curran, and et al.. Biometric Inspired Digital Image Steganography, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2008, pp.159-168.
-
15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2008
, pp. 159-168
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
-
5
-
-
1442293736
-
-
2nd ed. USA, Morgan Kaufmann Publishers
-
P. Wayner. Disappearing Cryptography, 2nd ed. USA, Morgan Kaufmann Publishers, 2002.
-
(2002)
Disappearing Cryptography
-
-
Wayner, P.1
-
6
-
-
77951451199
-
-
SAC Melbourne, Florida, USAACM,2003
-
T. Zhang, X. Ping. A Fast and Effective Steganalytic Technique against JSteg-like Algorithms, SAC 2003, Melbourne, Florida, USAACM,2003
-
(2003)
A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms
-
-
Zhang, T.1
Ping, X.2
-
7
-
-
35248884299
-
Steganalysis of JPEG Images: Breaking the F5 Algorithm
-
October 7-9, 2002
-
J. Fridrich , M. Goljan, , D. Hogeg. Steganalysis of JPEG Images: Breaking the F5 Algorithm. Proceedings of Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The Netherlands, 2578/2003: 310-323, October 7-9, 2002.
-
(2003)
Proceedings of Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The Netherlands
, vol.2578
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogeg, D.3
-
8
-
-
44649098085
-
-
X. Luo, D. Wang , P. Wang, and et al.. A review on blind detection for image steganography, 2008, 88(9):2138-2157.
-
(2008)
A Review on Blind Detection for Image Steganography
, vol.88
, Issue.9
, pp. 2138-2157
-
-
Luo, X.1
Wang, D.2
Wang, P.3
-
9
-
-
77951490105
-
Multi-Class Classification Fusion using Boosting for Identifying Steganography Methods, Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications
-
M. R. Benjamin, L. P. Gilbert. Multi-Class Classification Fusion using Boosting for Identifying Steganography Methods, Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications, Proc. of SPIE, 2008, 6974, pp. 697407-1-697407-10.
-
Proc. of SPIE, 2008
, vol.6974
, pp. 6974071-69740710
-
-
Benjamin, M.R.1
Gilbert, L.P.2
-
10
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
Proc. 7th International Information Hiding Workshop, ser. Berlin, Germany: Springer
-
G. Xuan, Y. Shi, J. Gao, and et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In Proc. 7th International Information Hiding Workshop, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer, vol.3727, 2005, pp. 262-277.
-
(2005)
Lecture Notes in Computer Science
, vol.3727
, pp. 262-277
-
-
Xuan, G.1
Shi, Y.2
Gao, J.3
-
11
-
-
77951463196
-
-
[Online]. Available
-
NRCS Photo Gallery. [Online]. Available: http://photogallery.nrcs.usda. gov/
-
-
-
|