-
2
-
-
84957868624
-
An information-theoretic model for steganography
-
Information Hiding, Springer Berlin / Heidelberg
-
Cachin, C., "An information-theoretic model for steganography," in [Information Hiding], Lecture Notes in Computer Science 1525, 306-318, Springer Berlin / Heidelberg (1998).
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
3
-
-
53349159971
-
-
Morgan Kaufmann
-
Cox, I., Miller, M., Bloom, J., Fridrich, J., and Kalker, T., [Digital Watermarking and Steganography], Morgan Kaufmann (2007).
-
(2007)
Digital Watermarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
4
-
-
0033640646
-
Statistical pattern recognition: A review
-
January
-
Jain, A. K., Duin, R. P., and Mao, J., "Statistical pattern recognition: a review," IEEE Transactions on Pattern Analysis and Machine Intelligence 22, 4-37 (January 2000).
-
(2000)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.22
, pp. 4-37
-
-
Jain, A.K.1
Duin, R.P.2
Mao, J.3
-
5
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
DOI 10.1109/TIFS.2006.890517
-
Wang, Y. and Moulin, P., "Optimized feature extraction for learning-based image steganalysis," IEEE Transactions on Information Forensics and Security 2, 31-45 (March 2007). (Pubitemid 46375829)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
7
-
-
36348934661
-
Feature selection based on the bhattacharyya distance
-
Xuan, G., Zhu, X., Chai, P., Zhang, Z., Shi, Y. Q., and Fu, D., "Feature selection based on the bhattacharyya distance," International Conference on Pattern Recognition 4, 957 (2006).
-
(2006)
International Conference on Pattern Recognition
, vol.4
, pp. 957
-
-
Xuan, G.1
Zhu, X.2
Chai, P.3
Zhang, Z.4
Shi, Y.Q.5
Fu, D.6
-
8
-
-
44649098085
-
A review on blind detection for image steganography
-
Luo, X.-Y., Wang, D.-S., Wang, P., and Liu, F.-L., "A review on blind detection for image steganography," Signal Processing 88(9), 2138-2157 (2008).
-
(2008)
Signal Processing
, vol.88
, Issue.9
, pp. 2138-2157
-
-
Luo, X.-Y.1
Wang, D.-S.2
Wang, P.3
Liu, F.-L.4
-
9
-
-
77951863909
-
Principal feature selection and fusion method for image steganalysis
-
Qin, J., Sun, X., Xiang, X., and Niu, C., "Principal feature selection and fusion method for image steganalysis," Journal of Electronic Imaging 18(3), 033009 (2009).
-
(2009)
Journal of Electronic Imaging
, vol.18
, Issue.3
, pp. 033009
-
-
Qin, J.1
Sun, X.2
Xiang, X.3
Niu, C.4
-
10
-
-
34548017677
-
Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images
-
DOI 10.1016/j.patcog.2007.06.005, PII S0031320307002658
-
Liu, Q., Sung, A. H., Chen, Z., and Xu, J., "Feature mining and pattern classification for steganalysis of lsb matching steganography in grayscale images," Pattern Recognition 41(1), 56-66 (2008). (Pubitemid 47284217)
-
(2008)
Pattern Recognition
, vol.41
, Issue.1
, pp. 56-66
-
-
Liu, Q.1
Sung, A.H.2
Chen, Z.3
Xu, J.4
-
11
-
-
0242576328
-
Steganalysis of additive-noise modelable information hiding
-
SPIE
-
Harmsen, J. J. and Pearlman,W. A., "Steganalysis of additive-noise modelable information hiding," Security and Watermarking of Multimedia Contents V 5020(1), 131-142, SPIE (2003).
-
(2003)
Security and Watermarking of Multimedia Contents V
, vol.5020
, Issue.1
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
12
-
-
0003922190
-
-
Wiley-Interscience
-
Duda, R., Hart, P., and Stork, D., [Pattern Classification], Wiley-Interscience (2001).
-
(2001)
Pattern Classification
-
-
Duda, R.1
Hart, P.2
Stork, D.3
-
13
-
-
2642537531
-
On partial least squares dimension reduction for microarray-based classification: A simulation study
-
Nguyen, D. V. and Rocke, D. M., "On partial least squares dimension reduction for microarray-based classification: a simulation study," Computational Statistics & Data Analysis 46(3), 407-425 (2004).
-
(2004)
Computational Statistics & Data Analysis
, vol.46
, Issue.3
, pp. 407-425
-
-
Nguyen, D.V.1
Rocke, D.M.2
-
15
-
-
0020998698
-
On using principal components before separating a mixture of two multivariate normal distributions
-
Chang, W.-C., "On using principal components before separating a mixture of two multivariate normal distributions," Journal of the Royal Statistical Society. Series C (Applied Statistics) 32(3), 267-275 (1983).
-
(1983)
Journal of the Royal Statistical Society. Series C (Applied Statistics)
, vol.32
, Issue.3
, pp. 267-275
-
-
Chang, W.-C.1
-
16
-
-
47949115223
-
Application of principal component analysis to distinguish patients with schizophrenia from healthy controls based on fractional anisotropy measurements
-
Caprihan, A., Pearlson, G. D., and Calhoun, V. D., "Application of principal component analysis to distinguish patients with schizophrenia from healthy controls based on fractional anisotropy measurements," Neuroimage 42, 675-682 (2008).
-
(2008)
Neuroimage
, vol.42
, pp. 675-682
-
-
Caprihan, A.1
Pearlson, G.D.2
Calhoun, V.D.3
-
17
-
-
0039945552
-
Geographical and interspecific cranial variation in big-eared ground squirrels (spermophilus): A multivariate study
-
March
-
Robinson, J. W. and Hoffmann, R. S., "Geographical and interspecific cranial variation in big-eared ground squirrels (spermophilus): A multivariate study," Systematic Zoology 24, 79-88 (March 1975).
-
(1975)
Systematic Zoology
, vol.24
, pp. 79-88
-
-
Robinson, J.W.1
Hoffmann, R.S.2
-
18
-
-
0024281187
-
Neurometrics: Computer-assisted differential diagnosis of brain dysfunctions
-
John, E., Prichep, L., Fridman, J., and Easton, P., "Neurometrics: computer-assisted differential diagnosis of brain dysfunctions," Science 239(4836), 162-169 (1988). (Pubitemid 18026016)
-
(1988)
Science
, vol.239
, Issue.4836
, pp. 162-169
-
-
John, E.R.1
Prichep, L.S.2
Fridman, J.3
Easton, P.4
-
19
-
-
0003290690
-
Steganalysis of watermarking techniques using image quality metrics
-
SPIE
-
Avcibas, I., Memon, N., and Sankur, B., "Steganalysis of watermarking techniques using image quality metrics," Security and Watermarking of Multimedia Contents VI 5306, 83-97, SPIE (2001).
-
(2001)
Security and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 83-97
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
20
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
Information Hiding, Springer Berlin / Heidelberg
-
Fridrich, J., "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in [Information Hiding], Lecture Notes in Computer Science 3200, 67-81, Springer Berlin / Heidelberg (2005).
-
(2005)
Lecture Notes in Computer Science
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
21
-
-
33646134392
-
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
-
Communications and Multimedia Security, Springer Berlin / Heidelberg
-
Holotyak, T., Fridrich, J., and Voloshynovskiy, S., "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in [Communications and Multimedia Security], Lecture Notes in Computer Science 3677, 273-274, Springer Berlin / Heidelberg (2005).
-
(2005)
Lecture Notes in Computer Science
, vol.3677
, pp. 273-274
-
-
Holotyak, T.1
Fridrich, J.2
Voloshynovskiy, S.3
-
22
-
-
70350499655
-
Feature reduction and payload location with wam steganalysis
-
SPIE
-
Ker, A. D. and Lubenko, I., "Feature reduction and payload location with wam steganalysis," Media Forensics and Security 7254(1), 72540A, SPIE (2009).
-
(2009)
Media Forensics and Security
, vol.7254
, Issue.1
-
-
Ker, A.D.1
Lubenko, I.2
-
24
-
-
38049166461
-
A markov process based approach to effective attacking JPEG steganography
-
Information Hiding, Springer Berlin / Heidelberg
-
Shi, Y. Q., Chen, C., and Chen, W., "A markov process based approach to effective attacking JPEG steganography," in [Information Hiding], Lecture Notes in Computer Science 4437, 249-264, Springer Berlin / Heidelberg (2007).
-
(2007)
Lecture Notes in Computer Science
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
25
-
-
34548232251
-
Merging markov and dct features for multi-class jpeg steganalysis
-
SPIE
-
Pevný, T. and Fridrich, J., "Merging markov and dct features for multi-class jpeg steganalysis," Security, Steganography, and Watermarking of Multimedia Contents IX 6505(1), SPIE (2007).
-
(2007)
Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
, Issue.1
-
-
Pevný, T.1
Fridrich, J.2
-
26
-
-
33750990501
-
A feature selection methodology for steganalysis
-
Multimedia Content Representation, Classiffication and Security, Springer Berlin / Heidelberg
-
Miche, Y., Roue, B., Lendasse, A., and and, P. B., "A feature selection methodology for steganalysis," in [Multimedia Content Representation, Classiffication and Security], Lecture Notes in Computer Science 4105, 49-56, Springer Berlin / Heidelberg (2006).
-
(2006)
Lecture Notes in Computer Science
, vol.4105
, pp. 49-56
-
-
Miche, Y.1
Roue, B.2
Lendasse, A.3
B, P.4
-
27
-
-
68249138572
-
Reliable steganalysis using a minimum set of samples and features
-
901381
-
Miche, Y., Bas, P., Lendasse, A., Jutten, C., and Simula, O., "Reliable steganalysis using a minimum set of samples and features," EURASIP Journal on Information Security 2009(901381), 13 (2009).
-
(2009)
EURASIP Journal on Information Security
, vol.2009
, pp. 13
-
-
Miche, Y.1
Bas, P.2
Lendasse, A.3
Jutten, C.4
Simula, O.5
-
28
-
-
51749089283
-
Jpeg image steganalysis utilizing both intrablock and interblock correlations
-
May
-
Chen, C. and Shi, Y. Q., "Jpeg image steganalysis utilizing both intrablock and interblock correlations," IEEE International Symposium on Circuits and Systems , 3029-3032 (May 2008).
-
(2008)
IEEE International Symposium on Circuits and Systems
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.Q.2
-
29
-
-
69949179954
-
Universal jpeg steganalysis based on microscopic and macroscopic calibration
-
October
-
Huang, F., Huang, J., and Li, B., "Universal jpeg steganalysis based on microscopic and macroscopic calibration," 15th IEEE International Conference on Image Processing , 2068-2071 (October 2008).
-
(2008)
15th IEEE International Conference on Image Processing
, pp. 2068-2071
-
-
Huang, F.1
Huang, J.2
Li, B.3
-
32
-
-
77951863908
-
Quantitive evaluation of pairs and rs steganalysis
-
SPIE
-
Ker, A., "Quantitive evaluation of pairs and rs steganalysis," Security, Steganography, and Watermarking of Multimedia Contents III 3677, 273-274, SPIE (2004).
-
(2004)
Security, Steganography, and Watermarking of Multimedia Contents III
, vol.3677
, pp. 273-274
-
-
Ker, A.1
-
33
-
-
34547548299
-
Steganalysis of binary cartoon image using distortion measure
-
Cheng, J., Kot, A., and Rahardja, S., "Steganalysis of binary cartoon image using distortion measure," IEEE International Conference on Acoustics, Speech and Signal Processing 2, II-61-II-64 (2007).
-
(2007)
IEEE International Conference on Acoustics, Speech and Signal Processing
, vol.2
-
-
Cheng, J.1
Kot, A.2
Rahardja, S.3
-
34
-
-
85084160704
-
Defending against statistical steganalysis
-
USENIX Association, Berkeley, CA, USA
-
Provos, N., "Defending against statistical steganalysis," Proceedings of the 10th conference on USENIX Security Symposium , 24-24, USENIX Association, Berkeley, CA, USA (2001).
-
(2001)
Proceedings of the 10th Conference on USENIX Security Symposium
, pp. 24-24
-
-
Provos, N.1
-
35
-
-
84937814312
-
F5: A steganographic algorithm
-
Information Hiding, Springer Berlin / Heidelberg
-
Westfeld, A., "F5: A steganographic algorithm," in [Information Hiding], Lecture Notes in Computer Science 2137, 289-302, Springer Berlin / Heidelberg (2001).
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
36
-
-
80054840132
-
-
"Jphide&seek." http://linux01.gwdg.de/~alatham/stego.html.
-
Jphide&seek
-
-
-
37
-
-
77951838992
-
-
"Steghide." http://steghide.sourceforge.net/.
-
Steghide
-
-
-
38
-
-
77951789528
-
-
"Jsteg." http://zooid.org/paul/crypto/jsteg/.
-
Jsteg
-
-
-
39
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Burges, C. J., "A tutorial on support vector machines for pattern recognition," Data Mining and Knowledge Discovery 2, 121-167 (1998).
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, pp. 121-167
-
-
Burges, C.J.1
-
41
-
-
80052408126
-
Classiffication with kernel mahalanobis distance classifiers
-
Springer Berlin Heidelberg
-
Haasdonk, B. and Pkalska, E., "Classiffication with kernel mahalanobis distance classifiers," Advances in Data Analysis, Data Handling and Business Intelligence, 351-361, Springer Berlin Heidelberg (2009).
-
(2009)
Advances in Data Analysis, Data Handling and Business Intelligence
, pp. 351-361
-
-
Haasdonk, B.1
Pkalska, E.2
|