-
1
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
Plenum Pub Corp
-
G. J. Simmons, "The prisoners' problem and the subliminal channel," in Advances in Cryptology: Proceedings of CRYPTO'83. Plenum Pub Corp, pp. 51-67, 1984
-
(1984)
Advances in Cryptology: Proceedings of CRYPTO'83
, pp. 51-67
-
-
Simmons, G.J.1
-
2
-
-
33646197092
-
Information transmission and steganography
-
I. J. Cox, Ton Kalker, Georg Pakura and Machia Scheel, "Information transmission and steganography," Lecture Notes in Computer Science, vol. 3710, pp.15-29, 2005
-
(2005)
Lecture Notes in Computer Science
, vol.3710
, pp. 15-29
-
-
Cox, I.J.1
Kalker, T.2
Pakura, G.3
Scheel, M.4
-
3
-
-
34047217902
-
Image complexity and feature extraction for steganalysis of LSB
-
Q. Liu, A. Sung, J. Xu, and B. Ribeiro, "Image complexity and feature extraction for steganalysis of LSB," in ICPR06, pp. II:267-270, 2006
-
(2006)
ICPR06
-
-
Liu, Q.1
Sung, A.2
Xu, J.3
Ribeiro, B.4
-
4
-
-
35848951182
-
Data hiding: Current status and key issues
-
N. Wu and M. Hwang, "Data hiding: current status and key issues," International Journal of Network Security, vol. 4, no. 1, pp. 1-9, 2007
-
(2007)
International Journal of Network Security
, vol.4
, Issue.1
, pp. 1-9
-
-
Wu, N.1
Hwang, M.2
-
5
-
-
0242408734
-
Digital image steganography using stochastic modulation
-
J. Fidich and M. Goljan, "Digital image steganography using stochastic modulation," SPIE Electronic Imaging, pp. 191-202, 2003
-
(2003)
SPIE Electronic Imaging
, pp. 191-202
-
-
Fidich, J.1
Goljan, M.2
-
6
-
-
85084160704
-
Defending against statistical steganalysis
-
N. Provos, "Defending against statistical steganalysis," Usenix Security Symp., pp. 323-335, 2001
-
(2001)
Usenix Security Symp.
, pp. 323-335
-
-
Provos, N.1
-
9
-
-
0034787093
-
Reliable detection of LSB steganography in color and grayscale images
-
J. Fridrich, M. Goljan, R. Du, "Reliable detection of LSB steganography in color and grayscale images, in: Proceedings of ACM Workshop Multimedia Security, pp. 27-30, 2001
-
(2001)
Proceedings of ACM Workshop Multimedia Security
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
10
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
S. Dumitrescu, X. Wu, Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. Signal Process, 51 (7), pp.1995-2007, 2003
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
11
-
-
0041821327
-
A new approach to reliable detection of LSB steganography in natural image
-
T. Zhang, X.J. Ping, "A new approach to reliable detection of LSB steganography in natural image," Signal Process. 83 (10), pp.545-548,2003
-
(2003)
Signal Process
, vol.83
, Issue.10
, pp. 545-548
-
-
Zhang, T.1
Ping, X.J.2
-
12
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in: Proceedings of sixth Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, pp. 67-81, 2004
-
(2004)
Proceedings of Sixth Information Hiding Workshop, Lecture Notes in Computer Science
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
13
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Springer, Berlin
-
J. Fridrich, M. Goljan, D. Hogea, "Steganalysis of JPEG images: breaking the F5 algorithm," in: Proceedings of fifth International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 2578, Springer, Berlin, pp. 310-323, 2002.
-
(2002)
Proceedings of Fifth International Workshop on Information Hiding, Lecture Notes in Computer Science
, vol.2578
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
14
-
-
8844280060
-
Quantitive evaluation of pairs and RS steganalysis
-
E. J. Delp III and P. W. Wong, Eds.
-
Andrew D. Ker, "Quantitive evaluation of pairs and RS steganalysis.," Proc. SPIE Security, Steganography, Watermarking Multimedia Contents, vol.5306, E. J. Delp III and P. W. Wong, Eds., pp. 83-97, 2004
-
(2004)
Proc. SPIE Security, Steganography, Watermarking Multimedia Contents
, vol.5306
, pp. 83-97
-
-
Ker, A.D.1
-
15
-
-
0034775171
-
Steganalysis of watermarking techniques using image quality metrics
-
I. Avcibas, N. Memon, B. Sankur, "Steganalysis of watermarking techniques using image quality metrics," in: Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II, vol. 4314, pp. 523-531, 2000
-
(2000)
Proceedings of the SPIE, Security and Watermarking of Multimedia Contents II
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
17
-
-
8844256156
-
Steganalysis using color wavelet statistics and oneclass support vector machines
-
S. Lyu, H. Farid, "Steganalysis using color wavelet statistics and oneclass support vector machines," in: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 35-45, 2004
-
(2004)
Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 35-45
-
-
Lyu, S.1
Farid, H.2
-
18
-
-
33646134392
-
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics
-
T. Holotyak, J. Fridrich, S. Voloshynovskiy:, "Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics," The 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. Lecture Notes in Computer Science, vol. 3677, pp.273-274,2005
-
(2005)
The 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. Lecture Notes in Computer Science
, vol.3677
, pp. 273-274
-
-
Holotyak, T.1
Fridrich, J.2
Voloshynovskiy, S.3
-
19
-
-
21844461602
-
Maximum likelihood estimation of length of secret message embedded using steganography in spatial domain
-
J. Fridrich, David Soukal, Miroslav Goljan, "Maximum likelihood estimation of length of secret message embedded using steganography in spatial domain," Proc. SPIE,5681, pp.595-606,2005
-
(2005)
Proc. SPIE
, vol.5681
, pp. 595-606
-
-
Fridrich, J.1
Soukal, D.2
Goljan, M.3
-
20
-
-
24744444102
-
Effective steganalysis based on statistical moments of wavelet characteristic function
-
Y.Q. Shi, G.R. Xuan, C.Y. Yang et al., "Effective steganalysis based on statistical moments of wavelet characteristic function," in: Proceedings of IEEE International Conference on Information Technology: Coding and Computing, pp. 68-773, 2005
-
(2005)
Proceedings of IEEE International Conference on Information Technology: Coding and Computing
, pp. 68-773
-
-
Shi, Y.Q.1
Xuan, G.R.2
Yang, C.Y.3
-
21
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
Springer, Berlin
-
G.R. Xuan, Y.Q. Shi, J.J. Gao et al., "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in: Proceedings of seventh International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3727, Springer, Berlin, pp. 62-277, 2005
-
(2005)
Proceedings of seventh International Information Hiding Workshop, Lecture Notes in Computer Science
, vol.3727
, pp. 62-277
-
-
Xuan, G.R.1
Shi, Y.Q.2
Gao, J.J.3
-
22
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
Y. Wang, P. Moulin, "Optimized feature extraction for learning-based image steganalysis," IEEE Trans. Inf. Forensics Secur. 2 (1), pp. 31-45,2007
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, Issue.1
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
23
-
-
0242576328
-
Higher-order statistical steganalysis of palette images
-
E. J. Delp III and P.W.Wong, Eds.
-
J. Harmsen, W. Pearlman, "Higher-order statistical steganalysis of palette images," Proc. SPIE Security Watermarking Multimedia Contents, vol. 5020, E. J. Delp III and P.W.Wong, Eds., pp. 131-142, 2003
-
(2003)
Proc. SPIE Security Watermarking Multimedia Contents
, vol.5020
, pp. 131-142
-
-
Harmsen, J.1
Pearlman, W.2
-
24
-
-
20444404178
-
Steganalysis of LSB Matching in Grayscale Images
-
Andrew D. Ker, "Steganalysis of LSB Matching in Grayscale Images," IEEE Signal Processing Letters, Vol. 12, No. 6, pp.441-444, 2005
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
25
-
-
33645676686
-
New blind steganalysis and its implications
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Security, Steganography, and Watermarking of Multimedia Contents VIII, ser. Proceedings of SPIE, vol. 6072, pp.1-13, 2006
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VIII, ser. Proceedings of SPIE
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
28
-
-
58049131290
-
A comparative study of ±1 steganalyzers
-
G. Cancelli, G. Doerr, M. Barni, and I. J. Cox, "A comparative study of ±1 steganalyzers," Proc. IEEE International Workshop on Multimedia Signal Processing, pp.791-796, 2008
-
(2008)
Proc. IEEE International Workshop on Multimedia Signal Processing
, pp. 791-796
-
-
Cancelli, G.1
Doerr, G.2
Barni, M.3
Cox, I.J.4
|