-
1
-
-
77952661671
-
-
Estimating the Redundancy Factor for RA-encoded sequences and also Studying Ste-ganalysis Performance of YASS Univ. of California, Santa Barbara, Dec, Online. Available
-
A. Sarkar, U. Madhow, and B. S. Manjunath, Estimating the Redundancy Factor for RA-encoded sequences and also Studying Ste-ganalysis Performance of YASS Univ. of California, Santa Barbara, Dec. 2008 [Online]. Available: http://vision. ece.ucsb.edu/publica-tions/Sarkar-tech-report-estimate-q.pdf
-
(2008)
-
-
Sarkar, A.1
Madhow, U.2
Manjunath, B.S.3
-
3
-
-
34247261453
-
Accumu-late-repeat-accumulate codes
-
Apr
-
A. Abbasfar, D. Divsalar, K. Yao, R. Inc, and C. Los Altos, "Accumu-late-repeat-accumulate codes, " IEEE Trans. Commun., vol. 55, no. 4, pp. 692-702, Apr. 2007.
-
(2007)
IEEE Trans. Commun.
, vol.55
, Issue.4
, pp. 692-702
-
-
Abbasfar, A.1
Divsalar, D.2
Yao, K.3
Inc, R.4
Altos, C.L.5
-
4
-
-
24144456920
-
Public-key steganography with active attacks
-
in, Springer
-
M. Backes and C. Cachin, "Public-key steganography with active attacks, " in Proc. Theory of Cryptography Conf., 2005, vol. 3378, pp. 210-226, Springer.
-
(2005)
Proc. Theory of Cryptography Conf.
, vol.3378
, pp. 210-226
-
-
Backes, M.1
Cachin, C.2
-
5
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, " IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001. (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
6
-
-
51749089283
-
JPEG image steganalysis utilizing both in-trablock and interblock correlations
-
in, May
-
C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both in-trablock and interblock correlations, " in Proc. Int. Symp. Circuits and Systems (ISCAS), May 2008, pp. 3029-3032.
-
(2008)
Proc. Int. Symp. Circuits and Systems (ISCAS)
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.Q.2
-
7
-
-
77952605912
-
-
Some Notes on Steganography, Posted on Steganography Mailing List, Online. Available
-
R. Crandall, Some Notes on Steganography, Posted on Steganography Mailing List 1998 [Online]. Available: http://os.inf.tu-dresden. de/~westfeld/crandall. pdf
-
(1998)
-
-
Crandall, R.1
-
8
-
-
84957887122
-
On public-key steganography in the presence of an active warden
-
in, Springer
-
S. Craver, "On public-key steganography in the presence of an active warden, " in Proc. Second Int. Information Hiding Workshop, pp. 355-368, Springer.
-
Proc. Second Int. Information Hiding Workshop
, pp. 355-368
-
-
Craver, S.1
-
9
-
-
0001585514
-
Coding theorems for turbolike codes
-
in, Sep
-
D. Divsalar, H. Jin, and R. J. McEliece, "Coding theorems for turbolike codes, " in 36th Allerton Conf. Communications, Control, and Computing, Sep. 1998, pp. 201-210.
-
(1998)
36th Allerton Conf. Communications, Control, and Computing
, pp. 201-210
-
-
Divsalar, D.1
Jin, H.2
McEliece, R.J.3
-
10
-
-
35248897534
-
Eliminating steganog-raphy in Internet traffic with active wardens
-
G. Fisk, M. Fisk, C. Papadopoulos, and J. Neil, "Eliminating steganog-raphy in Internet traffic with active wardens, " in Lecture Notes in Computer Science, 2003, pp. 18-35.
-
(2003)
Lecture Notes in Computer Science
, pp. 18-35
-
-
Fisk, G.1
Fisk, M.2
Papadopoulos, C.3
Neil, J.4
-
11
-
-
33750906998
-
Minimizing the embedding impact in steganography
-
in, New York, ACM
-
J. Fridrich, "Minimizing the embedding impact in steganography, " in Proc. 8th Workshop on Multimedia and Security (MM&Sec '06), New York, 2006, pp. 2-10, ACM.
-
(2006)
Proc. 8th Workshop on Multimedia and Security (MM&Sec '06)
, pp. 2-10
-
-
Fridrich, J.1
-
12
-
-
14844321910
-
Perturbed quantization steganography with wet paper codes
-
in, New York, ACM
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography with wet paper codes, " in Proc. 2004 Workshop on Multimedia and Security (MM&Sec '04), New York, 2004, pp. 4-15, ACM.
-
(2004)
Proc. 2004 Workshop on Multimedia and Security (MM&Sec '04)
, pp. 4-15
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
13
-
-
33645015900
-
Wet paper codes with improved embedding efficiency
-
Mar
-
J. Fridrich, M. Goljan, and D. Soukal, "Wet paper codes with improved embedding efficiency, " IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 102-110, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
14
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
in, Sep
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities, " in Proc. ACM, Sep. 2007, pp. 3-14.
-
(2007)
Proc. ACM
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
15
-
-
33748096430
-
Matrix embedding for large payloads
-
Sep
-
J. Fridrich and D. Soukal, "Matrix embedding for large payloads, " IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 390-395, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.3
, pp. 390-395
-
-
Fridrich, J.1
Soukal, D.2
-
16
-
-
21844447330
-
Image steganography: Concepts and practice
-
in, Singapore: Institute for Mathematical Sciences, National University of Singapore
-
M. Kharrazi, H. Sencar, and N. Memon, "Image steganography: Concepts and practice, " in Lecture Note Series. Singapore: Institute for Mathematical Sciences, National University of Singapore.
-
Lecture Note Series
-
-
Kharrazi, M.1
Sencar, H.2
Memon, N.3
-
17
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion
-
in, Jul
-
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion, " in Lecture Notes in Computer Science: 8th Int. Workshop on Information Hiding, Jul. 2006, pp. 314-327.
-
(2006)
Lecture Notes in Computer Science: 8th Int. Workshop on Information Hiding
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
18
-
-
42949124470
-
Influence of embedding strategies on security of steganographic methods in the JPEG domain
-
in, San Jose, CA, Jan
-
J. Kodovský and J. Fridrich, "Influence of embedding strategies on security of steganographic methods in the JPEG domain, " in Proc. SPIE, San Jose, CA, Jan. 2008, pp. 21-213.
-
(2008)
Proc. SPIE
, pp. 21-213
-
-
Kodovský, J.1
Fridrich, J.2
-
19
-
-
70449646940
-
Calibration revisited
-
in, New York, ACM
-
J. Kodovský and J. Fridrich, "Calibration revisited, " in Proc. 11th ACM Workshop on Multimedia and Security (MM & Sec '09), New York, 2009, pp. 63-74, ACM.
-
(2009)
Proc. 11th ACM Workshop on Multimedia and Security (MM & Sec '09)
, pp. 63-74
-
-
Kodovský, J.1
Fridrich, J.2
-
20
-
-
56749160543
-
Steganalysis of YASS
-
in, New York, ACM
-
B. Li, Y. Shi, and J. Huang, "Steganalysis of YASS, " in Proc. 10th ACM Workshop on Multimedia and Security, New York, 2008, pp. 139-148, ACM.
-
(2008)
Proc. 10th ACM Workshop on Multimedia and Security
, pp. 139-148
-
-
Li, B.1
Shi, Y.2
Huang, J.3
-
21
-
-
0032680807
-
Information hiding - A survey
-
Jul
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-A survey, " Special Issue on Identification and Protection of Multimedia Information, Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, Jul. 1999.
-
(1999)
Special Issue on Identification and Protection of Multimedia Information, Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
22
-
-
33645660635
-
Multi-class blind steganalysis for JPEG images
-
in, San Jose, CA
-
T. Pevný and J. Fridrich, "Multi-class blind steganalysis for JPEG images, " in Proc. SPIE, San Jose, CA, 2006, pp. 257-269.
-
(2006)
Proc. SPIE
, pp. 257-269
-
-
Pevný, T.1
Fridrich, J.2
-
23
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
in, San Jose, CA
-
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis, " in Proc. SPIE, San Jose, CA, 2007, pp. 3 1-3 14.
-
(2007)
Proc. SPIE
, pp. 31-314
-
-
Pevný, T.1
Fridrich, J.2
-
24
-
-
39349083934
-
Design of rate-compatible punctured repeat-accumulate codes
-
DOI 10.1109/GLOCOM.2007.285, 4411195, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
S. Planjery and T. Gulliver, "Design of rate-compatible punctured repeat-accumulate codes, " in IEEE Global Telecommunications Conf. 2007 (GLOBECOM'07), 2007, pp. 1482-1487. (Pubitemid 351259273)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 1482-1487
-
-
Planjery, S.K.1
Gulliver, T.A.2
-
25
-
-
69749094893
-
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - A randomized block based hiding scheme
-
in, Oct
-
A. Sarkar, L. Nataraj, B. S. Manjunath, and U. Madhow, "Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme, " in Proc. ICIP, Oct. 2008, pp. 1292-1295.
-
(2008)
Proc. ICIP
, pp. 1292-1295
-
-
Sarkar, A.1
Nataraj, L.2
Manjunath, B.S.3
Madhow, U.4
-
26
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
in, Jul
-
Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography, " in Lecture Notes in Computer Science: 8th Int. Workshop on Information Hiding, Jul. 2006, pp. 249-264.
-
(2006)
Lecture Notes in Computer Science: 8th Int. Workshop on Information Hiding
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
27
-
-
9744279131
-
Robust image-adaptive data hiding based on erasure and error correction
-
Dec
-
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chan-drasekaran, "Robust image-adaptive data hiding based on erasure and error correction, " IEEE Trans. Image Process., vol. 13, no. 12, pp. 1627-1639, Dec. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.12
, Issue.13
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chan-drasekaran, S.5
-
28
-
-
49949091527
-
YASS: Yet another steganographic scheme that resists blind steganalysis
-
in, Jun
-
K. Solanki, A. Sarkar, and B. S. Manjunath, "YASS: Yet another steganographic scheme that resists blind steganalysis, " in 9th Int. Workshop on Information Hiding, Jun. 2007, pp. 16-31.
-
(2007)
9th Int. Workshop on Information Hiding
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
29
-
-
84937814312
-
High capacity despite better steganalysis (F5-A steganographic algorithm)
-
in, Apr
-
A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm), " in 4th Int. Workshop on Information Hiding, Apr. 2001, vol. 2137, pp. 289-302.
-
(2001)
4th Int. Workshop on Information Hiding
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
30
-
-
77957943117
-
Breaking the YASS algorithm via pixel and DCT coefficients analysis
-
X. Yu and N. Babaguchi, "Breaking the YASS algorithm via pixel and DCT coefficients analysis, " in 19th Int. Conf. Pattern Recognition, 2008, pp. 1-4.
-
(2008)
19th Int. Conf. Pattern Recognition
, pp. 1-4
-
-
Yu, X.1
Babaguchi, N.2
|