-
1
-
-
21844461602
-
Maximum likelihood estimation of length of secret message embedded using K steganography in spatial domain
-
DOI 10.1117/12.584426, 60, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
-
J. Fridrich, D. Soukal, and M. Goljan, "Maximum likelihood estimation of length of secret message embedded using (K steganography in spatial domain," in Proc. Int. Conf. SPIE Electronic Imaging, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 5681, 595-606 (2005). (Pubitemid 40953017)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5681
, pp. 595-606
-
-
Fridrich, J.1
Soukal, D.2
Goljan, M.3
-
2
-
-
80455153313
-
Searching for hidden messages: Automatic detection of steganography
-
J. Riedl and R. W. Hill Jr., Eds., Association for the Advancement of Artificial Intelligence (AAAI), Meno Park, CA
-
G. Berg, I. Davidson, M.-Y. Duan, and G. Paul, "Searching for hidden messages: Automatic detection of steganography," in Proc. ACM Int. Conf. Knowledge Discovery and Data Mining, J. Riedl and R. W. Hill Jr., Eds., pp. 545-550, Association for the Advancement of Artificial Intelligence (AAAI), Meno Park, CA (2004).
-
(2004)
Proc. ACM Int. Conf. Knowledge Discovery and Data Mining
, pp. 545-550
-
-
Berg, G.1
Davidson, I.2
Duan, M.-Y.3
Paul, G.4
-
3
-
-
33750990501
-
A feature selection methodology for steganalysis," in Proc. Int. Workshop on Multimedia Content Representation, Classification, and Security, P. Gros, Ed
-
Y. Miche, B. Roue, A. Lendasse, and P. Bas, "A feature selection methodology for steganalysis," in Proc. Int. Workshop on Multimedia Content Representation, Classification, and Security, P. Gros, Ed., Lect. Notes Comput. Sci. 4105, 49-56 (2006).
-
(2006)
Lect. Notes Comput. Sci.
, vol.4105
, pp. 49-56
-
-
Miche, Y.1
Roue, B.2
Lendasse, A.3
Bas, P.4
-
4
-
-
33646167860
-
Towards multi-class blind steganalyzer for JPEG images
-
M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds. Lect. Notes Comput. Sci.
-
T. Pevný and J. Fridrich, "Towards multi-class blind steganalyzer for JPEG images," in Proc. Int. Workshop on Digital Watermarking, M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds., Lect. Notes Comput. Sci. 3710, 39-53 (2005).
-
(2005)
Proc. Int. Workshop on Digital Watermarking
, vol.3710
, pp. 39-53
-
-
Pevný, T.1
Fridrich, J.2
-
5
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis," in Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp III and P. W. Wong, Eds
-
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," in Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 5681, 650503 (2007).
-
(2007)
Proc. SPIE
, vol.5681
, pp. 650503
-
-
Pevný, T.1
Fridrich, J.2
-
6
-
-
0034775171
-
Steganalysis of watermarking techniques using image quality metrics
-
DOI 10.1117/12.435436
-
I. Avcibaş, N. Memon, and B. Sankur, "Steganalysis of watermarking techniques using image quality metrics," in Electronic Imaging, Security and Watermarking of Multimedia Contents, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 4314, 523-531 (2001). (Pubitemid 33012271)
-
(2001)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
7
-
-
0036448130
-
Image steganalysis with binary similarity measures
-
I. Avcibaş, N. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," IEEE Trans. Image Process. 3(6), 645-648 (2002).
-
(2002)
IEEE Trans. Image Process.
, vol.3
, Issue.6
, pp. 645-648
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
8
-
-
33645696636
-
Image steganalysis with binary similarity measures
-
DOI 10.1155/ASP.2005.2749, PII S1110865705505110
-
I. Avcibaş, N. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," EURASIP J. Appl. Signal Process. 2005(17), 2749-2757 (2005). (Pubitemid 44178258)
-
(2005)
Eurasip Journal on Applied Signal Processing
, vol.2005
, Issue.17
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazi, M.2
Memon, N.3
Sankur, B.4
-
9
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
IEEE, Piscataway, NJ
-
H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. IEEE Int. Conf. Image Processing, pp. 905-908, IEEE, Piscataway, NJ (2002).
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, pp. 905-908
-
-
Farid, H.1
-
10
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
F. A. P. Petitcolas, Eds. Lect. Notes Comput. Sci.
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in 5th Int. Workshop on Information Hiding, F. A. P. Petitcolas, Eds., Lect. Notes Comput. Sci. 2578, 340-354 (2002).
-
(2002)
5th Int. Workshop on Information Hiding
, vol.2578
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
-
11
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Secur. 1(1), 111-119 (2006).
-
(2006)
IEEE Trans. Inf. Forensics Secur.
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
13
-
-
33645660635
-
Multiclass blind steganalysis for JPEG images
-
E. J. Delp III and P. W. Wong, Eds., Proc. SPIE
-
T. Pevný and J. Fridrich, "Multiclass blind steganalysis for JPEG images," in Electronic Imaging, Photonics West, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 6072, 60720O (2006).
-
(2006)
Electronic Imaging, Photonics West
, vol.6072
-
-
Pevný, T.1
Fridrich, J.2
-
14
-
-
33646134392
-
Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in 9th IFIP TC-6/TC-11 Conf. Communications and Multimedia Security
-
T. Holotyak, J. Fridrich, and S. Voloshynovskiy, "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in 9th IFIP TC-6/TC-11 Conf. Communications and Multimedia Security, Lect. Notes Comput. Sci. 3677, 273-284 (2005).
-
(2005)
Lect. Notes Comput. Sci.
, vol.3677
, pp. 273-284
-
-
Holotyak, T.1
Fridrich, J.2
Voloshynovskiy, S.3
-
15
-
-
33645676686
-
New blind steganalysis and its implications
-
E. J. Delp III and P. W. Wong, Eds., Proc. SPIE
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Security, Steganography, and Watermarking of Multimedia Contents VI, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 6072, 607201 (2006).
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.6072
, pp. 607201
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
16
-
-
0242413905
-
Steganographic system based on higher-order statistics
-
E. J. Delp III and P. W. Wong, Eds., Proc. SPIE
-
R. Tzschoppe, R. Bäuml, J. B. Huber, and A. Kaup, "Steganographic system based on higher-order statistics," in Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 5020, 56-166 (2003).
-
(2003)
Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V
, vol.5020
, pp. 56-166
-
-
Tzschoppe, R.1
Bäuml, R.2
Huber, J.B.3
Kaup, A.4
-
17
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
E. J. Delp III and P. W. Wong, Eds., Proc. SPIE
-
J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, E. J. Delp III and P. W. Wong, Eds., Proc. SPIE 5020, 131-142 (2003).
-
(2003)
Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V
, vol.5020
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
19
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
DOI 10.1109/93.959097
-
J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images," IEEE Multimedia 3, 22-28 (2001). (Pubitemid 33018249)
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
20
-
-
0034509108
-
Staganalysis of LSB encoding in color images
-
J. Fridrich, R. Du, and M. Long, "Steganalysis of LSB encoding in color images," in Proc. IEEE Int. Conf. Multimedia and Expo, pp. 1279-1282, IEEE, Piscataway, NJ (2000). (Pubitemid 33059176)
-
(2000)
IEEE International Conference on Multi-Media and Expo
, pp. 1279-1282
-
-
Fridrich, J.1
Du, R.2
Long, M.3
-
21
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
S. Dumitrescu, X. L. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. Signal Process. 51(7), 1995-2007 (2003).
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.L.2
Wang, Z.3
-
22
-
-
29044433896
-
A feature-based classification technique for blind image steganalysis
-
W. N. Lie and G. S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Trans. Multimedia 7(6), 1007-1020 (2005).
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.6
, pp. 1007-1020
-
-
Lie, W.N.1
Lin, G.S.2
-
23
-
-
0038343416
-
Steganalysis using image quality metrics
-
I. Avcibaş, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Trans. Image Process. 12(2), 221-229 (2003).
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibaş, I.1
Memon, N.2
Sankur, B.3
-
24
-
-
42949152730
-
Statistical moments based universal steganalysis Using JPEG-2D array and 2-D characteristic function
-
Atlanta, GA, October 8-11, 2006, IEEE, Piscataway, NJ
-
C. Chen, Y. Q. Shi, W. Chen, and G. Xuan, "Statistical moments based universal steganalysis Using JPEG-2D array and 2-D characteristic function," in Proc. Int Conf. on Image Processing (ICIP 2006), Atlanta, GA, October 8-11, 2006, pp. 105-108, IEEE, Piscataway, NJ (2006)
-
(2006)
Proc. Int Conf. on Image Processing (ICIP 2006)
, pp. 105-108
-
-
Chen, C.1
Shi, Y.Q.2
Chen, W.3
Xuan, G.4
-
25
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
DOI 10.1109/TIFS.2006.890517
-
Y. Wang and P. Moulin, "Optimized feature extraction for learningbased image steganalysis," IEEE Trans. Inf. Forensics Secur. 2(1), 31-45 (2007). (Pubitemid 46375829)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
30
-
-
34548203998
-
Dimension reduction via principal variables
-
DOI 10.1016/j.csda.2007.02.012, PII S0167947307000564
-
J. A. Cumming and D. A. Wooff, "Dimension reduction via principal variables," Comput. Stat. Data Anal. 2007(52), 550-565 (2007). (Pubitemid 47331724)
-
(2007)
Computational Statistics and Data Analysis
, vol.52
, Issue.1
, pp. 550-565
-
-
Cumming, J.A.1
Wooff, D.A.2
-
31
-
-
0345579696
-
-
Duxbury Press, Pacific Grove, CA
-
J. M. Lattin, J. D. Carroll, and P. E. Green, Analyzing Multivariate Data, Duxbury Press, Pacific Grove, CA (2002).
-
(2002)
Analyzing Multivariate Data
-
-
Lattin, J.M.1
Carroll, J.D.2
Green, P.E.3
-
33
-
-
68349127643
-
-
available online at, Mar. 26
-
A. Westfeld, "F5," available online at http://wwwrn.inf.tu- dresden.de/~westfeld/f5.html, Mar. 26, 2006.
-
(2006)
F5
-
-
Westfeld, A.1
-
34
-
-
33847721963
-
-
available online at, Mar. 24
-
N. Provos, "Outguess," available online at http://www.outguess. org, Mar. 24, 2006.
-
(2006)
Outguess
-
-
Provos, N.1
-
35
-
-
35048819204
-
Model based steganography
-
T. Kalker, I. Cox, and Y. M. Ro, Eds., Lect. Notes Comput. Sci.
-
P. Sallee, "Model based steganography," in Proc. Int. Workshop on Digital Watermarking, T. Kalker, I. Cox, and Y. M. Ro, Eds., Lect. Notes Comput. Sci. 2939, 174-188 (2004).
-
(2004)
Proc. Int. Workshop on Digital Watermarking
, vol.2939
, pp. 174-188
-
-
Sallee, P.1
-
36
-
-
84873189165
-
-
available online at, Mar. 24
-
S. Hetzl, "Steghide," available online at http://steghide. sourceforger.net, Mar. 24, 2006.
-
(2006)
Steghide
-
-
Hetzl, S.1
-
37
-
-
84875600849
-
-
available online at, Apr. 6
-
L. B. Chen, "Svm-Chen 2.0," available online at http://svmligh.joachims.org, Apr. 6, 2006.
-
(2006)
Svm-Chen 2.0
-
-
Chen, L.B.1
-
38
-
-
52249093733
-
Steganalysis based on lifting wavelet transform for Palette images
-
Y. P. Wang, Q. F. Zhang, H. L. Liu, and Z. M. Niu, Eds., IEEE Computer Soc., Washington, DC
-
J. H. Qin, X. M. Sun, and X. Y. Xiang, "Steganalysis based on lifting wavelet transform for Palette images," in Proc. Int. Workshop on Computational Intelligence and Security, Y. P. Wang, Q. F. Zhang, H. L. Liu, and Z. M. Niu, Eds., pp. 672-675, IEEE Computer Soc., Washington, DC (2007).
-
(2007)
Proc. Int. Workshop on Computational Intelligence and Security
, pp. 672-675
-
-
Qin, J.H.1
Sun, X.M.2
Xiang, X.Y.3
-
39
-
-
70350499655
-
Feature reduction and payload location with WAM steganalysis," in Media Forensics and Security XI
-
72540A
-
A. Ker and I. Lubenko, "Feature reduction and payload location with WAM steganalysis," in Media Forensics and Security XI, A. D. Ker, and I. Lubenko, Eds., Proc. SPIE 7254, 72540A (2009).
-
(2009)
Proc. SPIE
, vol.7254
-
-
Ker, A.1
Lubenko, I.2
|