-
1
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
Curran, K., Cheddad, A., Condell, J., McKevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Processing 90(3), 727-752 (2010)
-
(2010)
Signal Processing
, vol.90
, Issue.3
, pp. 727-752
-
-
Curran, K.1
Cheddad, A.2
Condell, J.3
McKevitt, P.4
-
2
-
-
33749598442
-
Breaking cauchy model-based JPEG steganography with first order statistics
-
Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. Springer, Heidelberg
-
Böhme, R., Westfeld, A.: Breaking cauchy model-based JPEG steganography with first order statistics. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 125-140. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3193
, pp. 125-140
-
-
Böhme, R.1
Westfeld, A.2
-
3
-
-
2642549992
-
Attacking the outguess
-
Fridrich, J., Goljan, M., Hogea, D.: Attacking the outguess. In: ACM Workshop on Multimedia and Security, Juan-les-Pins, France (December 2002)
-
ACM Workshop on Multimedia and Security, Juan-les-Pins, France (December 2002)
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
4
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
-
Fridrich, J.J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310-323. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2578
, pp. 310-323
-
-
Fridrich, J.J.1
Goljan, M.2
Hogea, D.3
-
5
-
-
14844321910
-
Perturbed quantization steganography with wet paper codes
-
Dittmann, J., Fridrich, J.J. (eds.) ACM, New York
-
Fridrich, J.J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Dittmann, J., Fridrich, J.J. (eds.) MM&Sec, pp. 4-15. ACM, New York (2004)
-
(2004)
MM&Sec
, pp. 4-15
-
-
Fridrich, J.J.1
Goljan, M.2
Soukal, D.3
-
6
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. Springer, Heidelberg
-
Kim, Y., Duric, Z., Richards, D.: Modified matrix encoding technique for minimal distortion steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 314-327. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
7
-
-
85084160704
-
Defending against statistical steganalysis
-
USENIX (ed.) USENIX
-
Provos, N.: Defending against statistical steganalysis. In: USENIX (ed.) Proceedings of the Tenth USENIX Security Symposium, Washington, DC, USA, August 13-17. USENIX (2001)
-
(2001)
Proceedings of the Tenth USENIX Security Symposium, Washington, DC, USA, August 13-17
-
-
Provos, N.1
-
9
-
-
35048819204
-
Model-based steganography
-
Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. Springer, Heidelberg
-
Sallee, P.: Model-based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154-167. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
10
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
Sallee, P.: Model-based methods for steganography and steganalysis. Int. J. Image Graphics 5(1), 167-190 (2005)
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
11
-
-
77954582811
-
-
Upham, D.: http://zooid.org/~paul/crypto/jsteg/
-
-
-
Upham, D.1
-
13
-
-
84937814312
-
F5 - A steganographic algorithm
-
Moskowitz, I.S. (ed.) IH 2001. Springer, Heidelberg
-
Westfeld, A.: F5 - A steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289-302. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
14
-
-
35248881927
-
Detecting low embedding rates
-
Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
-
Westfeld, A.: Detecting low embedding rates. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 324-339. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2578
, pp. 324-339
-
-
Westfeld, A.1
-
15
-
-
84892764719
-
Attacks on steganographic systems
-
Pfitzmann, A. (ed.) IH 1999. Springer, Heidelberg
-
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61-76. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
|