-
1
-
-
0032680807
-
Information hiding-A survey
-
Jul.
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-A survey," Proc. IEEE, vol.87, no.7, pp. 1062-1078, Jul. 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
2
-
-
0038343416
-
Steganalysis using image quality metrics
-
Feb.
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Trans. Image Process., vol.12, no.2, pp. 221-229, Feb. 2003.
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
3
-
-
29044433896
-
A feature-based classification technique for blind image steganalysis
-
Dec.
-
W.-N. Lie and G.-S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Trans. Multimedia, vol.7, no.6, pp. 1007-1020, Dec. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.6
, pp. 1007-1020
-
-
Lie, W.-N.1
Lin, G.-S.2
-
4
-
-
33748119112
-
Dual protection of JPEG images based on informed embedding and two-stage watermark extraction
-
Sep.
-
W.-N. Lie, G.-S. Lin, and S.-L. Cheng, "Dual protection of JPEG images based on informed embedding and two-stage watermark extraction," IEEE Trans. Inf. Forensics Security, vol.1, no.3, pp. 330-341, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.3
, pp. 330-341
-
-
Lie, W.-N.1
Lin, G.-S.2
Cheng, S.-L.3
-
5
-
-
33847151934
-
Quantization-based image steganography without data hiding position memorization
-
Y. Seki, H.Kobayashi, M. Fujiyoshi, and H. Kiya, "Quantization-based image steganography without data hiding position memorization," in Proc. IEEE Int. Symp. Circuits and Systems, 2005, vol.5, pp. 4987-4990.
-
(2005)
Proc. IEEE Int. Symp. Circuits and Systems
, vol.5
, pp. 4987-4990
-
-
Seki, Y.1
Kobayashi, H.2
Fujiyoshi, M.3
Kiya, H.4
-
6
-
-
0030587314
-
Parallel simulated annealing algorithms
-
D. J. Ram, T. H. Sreenivas, and K. G. Subramaniam, "Parallel simulated annealing algorithms," J. Parallel Distrib. Comput., vol.37, pp. 207-212, 1996.
-
(1996)
J. Parallel Distrib. Comput.
, vol.37
, pp. 207-212
-
-
Ram, D.J.1
Sreenivas, T.H.2
Subramaniam, K.G.3
-
7
-
-
2942568431
-
Applying informed coding and embedding to design a robust high-capacity watermark
-
Jun.
-
M. L. Miller, G. J. Doerr, and I. J. Cox, "Applying informed coding and embedding to design a robust high-capacity watermark," IEEE Trans. Image Process., vol.13, no.6, pp. 792-807, Jun. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.6
, pp. 792-807
-
-
Miller, M.L.1
Doerr, G.J.2
Cox, I.J.3
-
8
-
-
33645985020
-
Human visual system models in digital image watermarking
-
Dec.
-
D. Levicky and P. Foris, "Human visual system models in digital image watermarking," Radioengineering, vol.13, no.4, pp. 38-43, Dec. 2004.
-
(2004)
Radioengineering
, vol.13
, Issue.4
, pp. 38-43
-
-
Levicky, D.1
Foris, P.2
-
10
-
-
0033879938
-
Image quality assessment based on a degradation model
-
Apr.
-
N. Damera-Venkata, T.-D. Kite, W.-S. Geisler, B.-L. Evans, and A.-C. Bovik, "Image quality assessment based on a degradation model," IEEE Trans. Image Process., vol.9, no.4, pp. 636-650, Apr. 2000.
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.4
, pp. 636-650
-
-
Damera-Venkata, N.1
Kite, T.-D.2
Geisler, W.-S.3
Evans, B.-L.4
Bovik, A.-C.5
-
11
-
-
31744433507
-
Genetic algorithm based methodology for breaking the steganalytic systems
-
Feb.
-
Y.-T. Wu and F. Y. Shih, "Genetic algorithm based methodology for breaking the steganalytic systems," IEEE Trans. Syst., Man, Cybern. B, vol.36, no.1, pp. 25-31, Feb. 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. B
, vol.36
, Issue.1
, pp. 25-31
-
-
Wu, Y.-T.1
Shih, F.Y.2
-
12
-
-
10444262110
-
-
[Online]. Available
-
D. Upham, JSteg, 1997. [Online]. Available: http://www.funet.fi/pub/ crypt/steganography/jpeg-jsteg-v4.diff.gz.
-
(1997)
JSteg
-
-
Upham, D.1
-
13
-
-
0038675417
-
A fast and effective steganalytic technique against JSteg-like algorithms
-
T. Zhang and X. Ping, "A fast and effective steganalytic technique against JSteg-like algorithms," in Proc. ACM Symp. Applied Computing, 2003, pp. 307-311.
-
(2003)
Proc. ACM Symp. Applied Computing
, pp. 307-311
-
-
Zhang, T.1
Ping, X.2
-
14
-
-
0036034444
-
Practical steganalysis of digital imagesstate of the art
-
J. Fridrich and M. Goljan, "Practical steganalysis of digital imagesstate of the art," in Proc. SPIE, 2002, vol.4675, pp. 1-13.
-
(2002)
Proc. SPIE
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
15
-
-
84949935752
-
A newsteganalysis approach based on both complexity estimate and statistical filter
-
LNCS
-
X.Kong, T. Zhang, X.You, and D.Yang, "A newsteganalysis approach based on both complexity estimate and statistical filter," in Proc. IEEE Pacific-Rim Conf. Multimedia, 2002, vol.2532, LNCS, pp. 434-441.
-
(2002)
Proc. IEEE Pacific-Rim Conf. Multimedia
, vol.2532
, pp. 434-441
-
-
Kong, X.1
Zhang, T.2
You, X.3
Yang, D.4
-
16
-
-
0036028267
-
A mathematical approach to steganalysis
-
R. Chandramouli, "A mathematical approach to steganalysis," in Proc. SPIE, 2002, vol.4675, pp. 14-25.
-
(2002)
Proc. SPIE
, vol.4675
, pp. 14-25
-
-
Chandramouli, R.1
-
17
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Proc. SPIE, 2003, vol.5020, pp. 21-24.
-
(2003)
Proc. SPIE
, vol.5020
, pp. 21-24
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
18
-
-
33644999904
-
Steganalysis using high-order image statistics
-
Mar.
-
S. Lyu and H. Farid, "Steganalysis using high-order image statistics," IEEE Trans. Inf. Forensics Security, vol.1, no.1, pp. 111-119, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
20
-
-
33646783668
-
PSTEG: Steganographic embedding through patching
-
K. Petrowski, M. Kharrazi, H. T. Senchar, and N. Memon, "PSTEG: Steganographic embedding through patching," in Proc. Int. Conf. Acoustics, Speech, and Signal Processing, 2005, pp. II-537-II-540.
-
(2005)
Proc. Int. Conf. Acoustics, Speech, and Signal Processing
-
-
Petrowski, K.1
Kharrazi, M.2
Senchar, H.T.3
Memon, N.4
-
21
-
-
78649869719
-
Cover selection for steganographic embedding
-
M. Kharrazi, H. T. Senchar, and N. Memon, "Cover selection for steganographic embedding," in Proc. Int. Conf. Image Processing, 2006, pp. 117-120.
-
(2006)
Proc. Int. Conf. Image Processing
, pp. 117-120
-
-
Kharrazi, M.1
Senchar, H.T.2
Memon, N.3
-
22
-
-
0035440147
-
An additive approach to transform-domain information hiding and optimum detection structure
-
Sep.
-
Q. Cheng and T. S. Huang, "An additive approach to transform-domain information hiding and optimum detection structure," IEEE Trans. Multimedia, vol.3, no.3, pp. 273-284, Sep. 2001.
-
(2001)
IEEE Trans. Multimedia
, vol.3
, Issue.3
, pp. 273-284
-
-
Cheng, Q.1
Huang, T.S.2
-
23
-
-
33847697308
-
Steganalysis of embedding in two least-significant bits
-
Mar.
-
A. D. Ker, "Steganalysis of embedding in two least-significant bits," IEEE Trans. Inf. Forensics Security, vol.2, no.1, pp. 46-54, Mar. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.1
, pp. 46-54
-
-
Ker, A.D.1
-
24
-
-
42949146877
-
Determining the stego algorithm for JPEG images
-
T. Pevny and J. Fridrich, "Determining the stego algorithm for JPEG images," Proc. Inst. Elect. Eng., Inf. Security, vol.153, no.3, pp. 77-164, 2006.
-
(2006)
Proc. Inst. Elect. Eng., Inf. Security
, vol.153
, Issue.3
, pp. 77-164
-
-
Pevny, T.1
Fridrich, J.2
-
25
-
-
33845623763
-
Digital video steganalysis exploiting statistical visibility in the temporal domain
-
Dec.
-
U. Budhia, D. Kundur, and T. Zourntos, "Digital video steganalysis exploiting statistical visibility in the temporal domain," IEEE Trans. Inf. Forensics Security, vol.1, no.4, pp. 502-516, Dec. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.4
, pp. 502-516
-
-
Budhia, U.1
Kundur, D.2
Zourntos, T.3
-
26
-
-
0003557270
-
-
New York: Thomson
-
M. Sonka, V. Hlavac, and R. Boyle, Image Processing, Analysis, and Machine Vision. New York: Thomson, 2008.
-
(2008)
Image Processing Analysis, Machine Vision
-
-
Sonka, M.1
Hlavac, V.2
Boyle, R.3
-
27
-
-
67650175930
-
Steganalysis of multiple-base notational system steganography
-
B. Lin, Y. Fang, and J. Huang, "Steganalysis of multiple-base notational system steganography," IEEE Signal Process. Lett., vol.15, pp. 493-496, 2008.
-
(2008)
IEEE Signal Process. Lett.
, vol.15
, pp. 493-496
-
-
Lin, B.1
Fang, Y.2
Huang, J.3
-
28
-
-
0141489940
-
Data embedding into pictorial images with less distortion using discrete cosine transform
-
T. Ogihara, D. Nakamura, and N. Yokoya, "Data embedding into pictorial images with less distortion using discrete cosine transform," in Proc. Int. Conf. Pattern Recognition, 1996, pp. 675-679.
-
(1996)
Proc. Int. Conf. Pattern Recognition
, pp. 675-679
-
-
Ogihara, T.1
Nakamura, D.2
Yokoya, N.3
-
29
-
-
0141513138
-
Fast and robust watermarking of JPEG files
-
W. Luo, G. L. Heileman, and C. E. Pizano, "Fast and robust watermarking of JPEG files," in Proc. 5th IEEE Southwest Symp. Image Analysis and Interpretation, 2002, pp. 158-162.
-
(2002)
Proc. 5th IEEE Southwest Symp. Image Analysis and Interpretation
, pp. 158-162
-
-
Luo, W.1
Heileman, G.L.2
Pizano, C.E.3
-
30
-
-
44049091622
-
Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques
-
Jun.
-
C.-H. Huang, S.-C. Chuang, and J.-L. Wu, "Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques," IEEE Trans. Multimedia, vol.10, no.4, pp. 557-569, Jun. 2008.
-
(2008)
IEEE Trans. Multimedia
, vol.10
, Issue.4
, pp. 557-569
-
-
Huang, C.-H.1
Chuang, S.-C.2
Wu, J.-L.3
-
31
-
-
85032751036
-
Data hiding for fighting piracy
-
Mar.
-
M. Barni and F. Bartolini, "Data hiding for fighting piracy," IEEE Signal Process. Mag., vol.21, no.2, pp. 28-39, Mar. 2004.
-
(2004)
IEEE Signal Process. Mag.
, vol.21
, Issue.2
, pp. 28-39
-
-
Barni, M.1
Bartolini, F.2
-
32
-
-
37649010067
-
Breaking the BOWS watermarking system: Key guessing and sensitivity attacks
-
P. Comesana and F. Perex-Gonzales, "Breaking the BOWS watermarking system: Key guessing and sensitivity attacks," EURASIP J. Inf. Security, vol.2007, pp. 1-8, 2007.
-
(2007)
EURASIP J. Inf. Security
, vol.2007
, pp. 1-8
-
-
Comesana, P.1
Perex-Gonzales, F.2
-
33
-
-
84937814312
-
F5-a steganographic algorithm: High capacity despite better steganalysis
-
A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," Lecture Notes in Computer Science, vol.2137, pp. 289-302, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
34
-
-
0038156437
-
Data hiding in image and video: Part I-Fundamental issues and solutions
-
Jun.
-
M. Wu and B. Liu, "Data hiding in image and video: Part I-Fundamental issues and solutions," IEEE Trans. Image Process., vol.12, no.6, pp. 685-695, Jun. 2003.
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.6
, pp. 685-695
-
-
Wu, M.1
Liu, B.2
|