-
1
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
in, London, U. K.
-
N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software, " in Proc. Int. Workshop Information Hiding, ser. LNCS, London, U. K., 1998, vol. 1525, pp. 273-289.
-
(1998)
Proc. Int. Workshop Information Hiding, Ser. LNCS
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
2
-
-
84892764719
-
Attacks on steganographic systems
-
in, London, U. K.
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems, " in Proc. Int. Workshop Information Hiding, ser. LNCS, London, U. K., 2000, vol. 1768, pp. 61-76.
-
(2000)
Proc. Int. Workshop Information Hiding, Ser. LNCS
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
3
-
-
0036034444
-
Practical steganalysis of digital images: State of the art
-
J. Fridrich and M. Goljan, "Practical steganalysis of digital images: State of the art, " Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 1-13, 2002.
-
(2002)
Proc. SPIE, Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
4
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
May/Jun
-
N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography, " IEEE Security Privacy, vol. 1, no. 3, pp. 32-44, May/Jun. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
5
-
-
84882458403
-
Steganalysis
-
in, Amsterdam, The Netherlands: Elsevier, ch. 14
-
J. Fridrich, "Steganalysis, " in Multimedia Security Technologies for Digital Rights Management. Amsterdam, The Netherlands: Elsevier, 2006, ch. 14, p. 352.
-
(2006)
Multimedia Security Technologies for Digital Rights Management
, pp. 352
-
-
Fridrich, J.1
-
6
-
-
33646852111
-
An evaluationof image-based steganography methods
-
K. Bailey
-
K. Curran and K. Bailey, "An evaluationof image-based steganography methods, " Int. J. Digital Evidence, vol. 2, no. 2, 2003.
-
(2003)
Int. J. Digital Evidence
, vol.2
, Issue.2
-
-
Curran, K.1
-
7
-
-
84937814312
-
F5-a steganographic algorithm: High capacity despite better steganalysis
-
A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis, " in Proc. Int. Workshop Information Hiding, ser. LNCS, 2001, vol. 2137, pp. 289-302.
-
(2001)
Proc. Int. Workshop Information Hiding, Ser. LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
8
-
-
77952602378
-
-
STools v4.0 Online. Available
-
A. Brown, STools v4.0 [Online]. Available: ftp://ftp. demon. net/pub/mirrors/crypto/idea/code/s-tools4.zip
-
-
-
Brown, A.1
-
9
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen, " Computer, vol. 31, no. 2, pp. 26-34, 1998.
-
(1998)
Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
10
-
-
35248881927
-
Detecting low embedding rates
-
A. Westfeld, "Detecting low embedding rates, " in Proc. Int. Workshop Information Hiding, ser. LNCS, 2002, vol. 2578, pp. 324-329.
-
(2002)
Proc. Int. Workshop Information Hiding, Ser. LNCS
, vol.2578
, pp. 324-329
-
-
Westfeld, A.1
-
11
-
-
2642549992
-
Attacking the outGuess
-
J. Fridrich, M. Goljan, and D. Hogea, "Attacking the OutGuess, " in Proc. ACM Workshop on Multimedia and Security, 2002, pp. 1-4.
-
(2002)
Proc. ACM Workshop on Multimedia and Security
, pp. 1-4
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
12
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
DOI 10.1109/93.959097
-
J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images, " Special Issue on Security, IEEE Multimedia, vol. 8, no. 4, pp. 22-28, Oct./Dec. 2001. (Pubitemid 33018249)
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
13
-
-
77952630898
-
The dangers of webcrawled datasets
-
Feb. 1, Online. Available
-
G. Bell, "The dangers of webcrawled datasets, " First Monday vol. 15, no. 2, Feb. 1, 2010 [Online]. Available: http://firstmonday.org/htbin/ cgiwrap/bin/ojs/index.php/fm/article/view/2739/2456
-
(2010)
First Monday
, vol.15
, Issue.2
-
-
Bell, G.1
-
15
-
-
21844474312
-
Benchmarking stegano-graphic and steganalysis techniques
-
M. Kharrazi, H. T. Sencar, and N. Memon, "Benchmarking stegano-graphic and steganalysis techniques, " Proc. SPIE, Security, Steganog-raphy, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 252-263, 2005.
-
(2005)
Proc. SPIE, Security, Steganog-raphy, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 252-263
-
-
Kharrazi, M.1
Sencar, H.T.2
Memon, N.3
|