-
3
-
-
84942411709
-
Information hiding using steganography
-
Shah Alam, Malaysia
-
M.M. Amin, M. Salleh, S. Ibrahim, M.R. Kitmin, M.Z.I. Shamsuddin, Information hiding using steganography, in: 4th Natl. Conf. on Telecommunication Technology Proceedings, Shah Alam, Malaysia, 2003
-
(2003)
4th Natl. Conf. on Telecommunication Technology Proceedings
-
-
Amin, M.M.1
Salleh, M.2
Ibrahim, S.3
Kitmin, M.R.4
Shamsuddin, M.Z.I.5
-
4
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
DOI 10.1109/93.959097
-
J. Fridrich, M. Goljan, and R. Du Detecting LSB steganography in color and gray-scale images IEEE Multimedia Magaz., Special Issue on Security October-November 2001 22 28 (Pubitemid 33018249)
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
5
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
N. Johnson, and S. Jajodia Exploring steganography: Seeing the unseen IEEE Comput. 31 2 1998 26 34
-
(1998)
IEEE Comput.
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.1
Jajodia, S.2
-
6
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Springer-Verlag Berlin
-
N.F. Johnson, and S. Jajodia Steganalysis of images created using current steganography software Lecture Notes in Computer Science vol. 1525 1998 Springer-Verlag Berlin 273 289
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
7
-
-
0001931684
-
A survey of steganographic techniques
-
N.F. Johnson, and S. Katzenbeisser A survey of steganographic techniques S. Katzenbeisser, F. Petitcolas, Information Hiding 2000 Artech House Norwood, MA 43 78
-
(2000)
Information Hiding
, pp. 43-78
-
-
Johnson, N.F.1
Katzenbeisser, S.2
-
10
-
-
11844252006
-
Cyber warfare: Steganography vs. steganalysis
-
Huaiqing Wang, and Shuozhong Wang Cyber warfare: Steganography vs. steganalysis Commun. ACM 47 October 2004 76 82
-
(2004)
Commun. ACM
, vol.47
, pp. 76-82
-
-
Wang, H.1
Wang, S.2
-
11
-
-
0036031193
-
Adaptive steganography
-
R. Chandramouli, Li Grace, and Nasir Memon Adaptive steganography Proc. SPIE, Security and Watermarking of Multimedia Contents IV, San Jose, CA vol. 4675 2002 69 78
-
(2002)
Proc. SPIE, Security and Watermarking of Multimedia Contents IV, San Jose, CA
, vol.4675
, pp. 69-78
-
-
Chandramouli, R.1
Grace, L.2
Memon, N.3
-
12
-
-
0036034444
-
Practical steganalysis of digital images-state of the art
-
San Jose, CA, January
-
J. Fridrich, M. Goljan, Practical steganalysis of digital images-state of the art, in: Proc. SPIE Photonics West, Electronic Imaging (2002), Security and Watermarking of Multimedia Contents, San Jose, CA, vol. 4675, January 2002, pp. 1-13
-
(2002)
Proc. SPIE Photonics West, Electronic Imaging (2002), Security and Watermarking of Multimedia Contents
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
13
-
-
27944507950
-
Steganalysis attacks on stego images using stego-signatures and statistical image properties
-
Tariq Al Hawi, Mahmoud Al Qutayari, Hassan Barada, Steganalysis attacks on stego images using stego-signatures and statistical image properties, in: TENCON 2004, Region 10 Conference, vol. 2, 2004, pp. 104-107
-
(2004)
TENCON 2004, Region 10 Conference
, vol.2
, pp. 104-107
-
-
Hawi, T.A.1
Qutayari, M.A.2
Barada, H.3
-
14
-
-
0034769448
-
Intensity histogram steganalysis in BPCS-steganography
-
M. Niimi, R. Eason, H. Noda, E. Kawaguchi, Intensity histogram steganalysis in BPCS-steganography, in: Proc. SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, 2001, pp. 555-564
-
(2001)
Proc. SPIE, Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 555-564
-
-
Niimi, M.1
Eason, R.2
Noda, H.3
Kawaguchi, E.4
-
15
-
-
0035766166
-
Steganalysis based on JPEG compatibility
-
Denver, CO, August 20-24
-
J. Fridrich, M. Goljan, R. Du, Steganalysis based on JPEG compatibility, in: SPIE Multimedia System and Applications IV, Denver, CO, August 20-24, 2001, pp. 275-280
-
(2001)
SPIE Multimedia System and Applications IV
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
16
-
-
0027305609
-
MR image texture analysis-An approach to tissue characterization
-
R.A. Lerski MR image texture analysis-An approach to tissue characterization Magn. Resonance Imaging 11 1993 873 887
-
(1993)
Magn. Resonance Imaging
, vol.11
, pp. 873-887
-
-
Lerski, R.A.1
-
17
-
-
77955431596
-
-
http://home.comcast.net/~ebm.md/stego/softwarewindows.html
-
-
-
-
18
-
-
0001849187
-
Attacks on steganographic systems
-
Dresden, Germany, September 28-October 1
-
A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in: Proc. of Information Hiding, Third Int. Workshop, Dresden, Germany, September 28-October 1, 1999, pp. 61-75
-
(1999)
Proc. of Information Hiding, Third Int. Workshop
, pp. 61-75
-
-
Westfeld, A.1
Pfitzmann, A.2
-
19
-
-
35248881927
-
Detecting low embedding rates
-
Springer-Verlag Berlin
-
A. Westfeld Detecting low embedding rates Lecture Notes in Computer Science vol. 2578 2002 Springer-Verlag Berlin 324 339
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 324-339
-
-
Westfeld, A.1
-
21
-
-
33847692468
-
Image steganography and steganalysis: Concepts and practices
-
Seoul, Korea, January
-
R. Chandramouli, M. Kharrazi, N. Memon, Image steganography and steganalysis: Concepts and practices, in: Proc. 2nd Int. Workshop Digital Watermarking, Seoul, Korea, January 2003, pp. 35-49
-
(2003)
Proc. 2nd Int. Workshop Digital Watermarking
, pp. 35-49
-
-
Chandramouli, R.1
Kharrazi, M.2
Memon, N.3
-
22
-
-
0034509108
-
Steganalysis of LSB encoding in color images
-
New York, July 31-August 2
-
J. Fridrich, R. Du, L. Meng, Steganalysis of LSB encoding in color images, in: Proc. IEEE Int. Conf. on Multimedia and Expo, New York, July 31-August 2, 2000
-
(2000)
Proc. IEEE Int. Conf. on Multimedia and Expo
-
-
Fridrich, J.1
Du, R.2
Meng, L.3
-
23
-
-
0036448130
-
Image steganalysis with binary similarity measures
-
Rochester, New York, September
-
I. Avcibas, N. Memon, B. Sankur, Image steganalysis with binary similarity measures, in: IEEE Int. Conf. on Image Processing, Rochester, New York, September 2002
-
(2002)
IEEE Int. Conf. on Image Processing
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
25
-
-
0036450555
-
On steganalysis of random LSB embedding in continuous-tone images
-
Rochester, New York, September
-
S. Dumitrescu, X. Wu, N. Memon, On steganalysis of random LSB embedding in continuous-tone images, in: IEEE Int. Conf. on Image Processing, Rochester, New York, September 2002
-
(2002)
IEEE Int. Conf. on Image Processing
-
-
Dumitrescu, S.1
Wu, X.2
Memon, N.3
-
26
-
-
56649114639
-
Steganalysis of LSB embedding in multimedia signals
-
S. Dumitrescu, X. Wu, Steganalysis of LSB embedding in multimedia signals, in: IEEE ICME 2002, vol. 1, 2002, pp. 581-584
-
(2002)
IEEE ICME 2002
, vol.1
, pp. 581-584
-
-
Dumitrescu, S.1
Wu, X.2
-
27
-
-
14844309336
-
Improving LSB steganalysis using marginal and joint probabilistic distributions
-
Magdeburg, Germany, September 20-21, 2004 ACM
-
Benoit Roue, Patrick Bas, and Jean-Marc Chassery Improving LSB steganalysis using marginal and joint probabilistic distributions Proc. 6th Workshop on Multimedia & Security, MM&Sec 2004 Magdeburg, Germany, September 20-21, 2004 2004 ACM
-
(2004)
Proc. 6th Workshop on Multimedia & Security, MM&Sec 2004
-
-
Roue, B.1
Bas, P.2
Chassery, J.-M.3
-
28
-
-
33645669455
-
An improved sample pairs method for detection of LSB embedding
-
Toronto, ON, Canada, May
-
P. Lu, X. Luo, Q. Tang, L. Shen, An improved sample pairs method for detection of LSB embedding, in: Proc. 6th Int. Workshop Inf. Hiding, Toronto, ON, Canada, May 2004
-
(2004)
Proc. 6th Int. Workshop Inf. Hiding
-
-
Lu, P.1
Luo, X.2
Tang, Q.3
Shen, L.4
-
29
-
-
27844504298
-
A new framework of LSB steganalysis of Digital Media
-
Sorina Dumitrescu, and Xiaolin Wu A new framework of LSB steganalysis of Digital Media IEEE Trans. Signal Process. 53 October 2005 3936 3947
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, pp. 3936-3947
-
-
Dumitrescu, S.1
Wu, X.2
-
30
-
-
79955595823
-
A LSB steganography detection algorithm
-
Li Zhi, Sui Ai Fen, Yang Yi Xian, A LSB steganography detection algorithm, in: Proc. IEEE Int. Symp. on Personal, Indoor and Mobile Radio Communication, 2003
-
(2003)
Proc. IEEE Int. Symp. on Personal, Indoor and Mobile Radio Communication
-
-
Zhi, L.1
Fen, S.A.2
Xian, Y.Y.3
-
31
-
-
0141563850
-
Reliable detection of LSB steganography based on difference image histogram
-
T. Zhang, X. Ping, Reliable detection of LSB steganography based on difference image histogram, in: Proc. ICASSP, vol. I, 2003, pp. 545-548
-
(2003)
Proc. ICASSP
, vol.1
, pp. 545-548
-
-
Zhang, T.1
Ping, X.2
-
32
-
-
0242665592
-
Higher-order statistical steganalysis of palette images
-
Santa Clara, CA
-
J. Fridrich, M. Goljan, D. Soukal, Higher-order statistical steganalysis of palette images, in: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, CA, vol. 5020, 2003, pp. 178-190
-
(2003)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents v
, vol.5020
, pp. 178-190
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
33
-
-
8844280060
-
Quantitative evaluation of pairs and RS steganalysis
-
A. Ker Quantitative evaluation of pairs and RS steganalysis Proc. SPIE, Security, Steganography, Watermarking of Multimedia Contents, San Jose, CA vol. 5306 2004 83 97
-
(2004)
Proc. SPIE, Security, Steganography, Watermarking of Multimedia Contents, San Jose, CA
, vol.5306
, pp. 83-97
-
-
Ker, A.1
-
34
-
-
35048891531
-
Improved detection of LSB steganography in grayscale images
-
Springer
-
A. Ker Improved detection of LSB steganography in grayscale images Proc. Inf. Hiding Workshop Lecture Notes in Computer Science vol. 3200 2004 Springer 97 115
-
(2004)
Proc. Inf. Hiding Workshop Lecture Notes in Computer Science
, vol.3200
, pp. 97-115
-
-
Ker, A.1
-
35
-
-
77955419535
-
LSB steganalysis using support vector regression
-
Erwei Lin, Edward Woertz, Moshe Kam, LSB steganalysis using support vector regression, in: Proc. IEEE, SME Information Assurance Workshop, 2003
-
(2003)
Proc. IEEE, SME Information Assurance Workshop
-
-
Lin, E.1
Woertz, E.2
Kam, M.3
-
38
-
-
33744773332
-
Universal image steganalysis using rate-distortion curves
-
San Jose, CA, January
-
M.U. Celik, G. Sharma, A.M. Tekalp, Universal image steganalysis using rate-distortion curves, in: Proc. IST/SPIE 16th Annu. Symp. Electronic Imaging Science Technology, San Jose, CA, January 2004, pp. 19-22
-
(2004)
Proc. IST/SPIE 16th Annu. Symp. Electronic Imaging Science Technology
, pp. 19-22
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
-
42
-
-
77955423363
-
Isotropy-based detection and estimation: A general framework of LSB steganalysis
-
X. Yu, T. Tan, and Y. Wang Isotropy-based detection and estimation: A general framework of LSB steganalysis IEEE Trans. Image Process. 11 5 2005 509 517
-
(2005)
IEEE Trans. Image Process.
, vol.11
, Issue.5
, pp. 509-517
-
-
Yu, X.1
Tan, T.2
Wang, Y.3
-
43
-
-
85089792320
-
Extended optimization of LSB steganalysis
-
X. Yu, T. Tan, Y. Wang, Extended optimization of LSB steganalysis, in: IEEE Int. Conf. on Image Processing, vol. 2, 2005, pp. 1102-1105
-
(2005)
IEEE Int. Conf. on Image Processing
, vol.2
, pp. 1102-1105
-
-
Yu, X.1
Tan, T.2
Wang, Y.3
-
44
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
San Jose, CA
-
J. Fridrich, M. Goljan, On estimation of secret message length in LSB steganography in spatial domain, in: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, vol. 5306, 2004, pp. 23-34
-
(2004)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
47
-
-
0041308536
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Noordwijkerhout, The Netherlands
-
S. Lyu, H. Farid, Detecting hidden messages using higher-order statistics and support vector machines, in: 5th Int. Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 2002
-
(2002)
5th Int. Workshop on Information Hiding
-
-
Lyu, S.1
Farid, H.2
-
48
-
-
84947277755
-
An Implementation of Key-Based Digital Signal Steganography
-
Springer-Verlag New York
-
T. Sharp An Implementation of Key-Based Digital Signal Steganography Lecture Notes in Computer Science vol. 2137 2001 Springer-Verlag New York 13 26
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 13-26
-
-
Sharp, T.1
-
49
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
A.D. Ker Steganalysis of LSB matching in grayscale images IEEE Signal Process. Lett. 12 6 June 2005 441 444
-
(2005)
IEEE Signal Process. Lett.
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
50
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
San Jose, CA, January
-
J.J. Harmsen, W.A. Pearlman, Steganalysis of additive noise modelable information hiding, in: Proc. SPIE, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents, San Jose, CA, January 2003, pp. 131-142
-
(2003)
Proc. SPIE, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
51
-
-
34047217902
-
Image complexity and feature extraction for steganalysis of LSB matching steganography
-
Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete M. Ribeiro, Image complexity and feature extraction for steganalysis of LSB matching steganography, in: IEEE Int. Conf. on Pattern Recognition, vol. 2, 2006, pp. 267-270
-
(2006)
IEEE Int. Conf. on Pattern Recognition
, vol.2
, pp. 267-270
-
-
Liu, Q.1
Sung, A.H.2
Xu, J.3
Ribeiro, B.M.4
-
52
-
-
13244253845
-
How realistic is photorealistic
-
S. Lyu, and H. Farid How realistic is photorealistic IEEE Trans. Signal Process. 53 2 2005 845 850
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.2
, pp. 845-850
-
-
Lyu, S.1
Farid, H.2
-
55
-
-
0038758858
-
Active steganalysis of spread spectrum image steganography
-
Bangkok, Thailand, May
-
R. Chandramouli, K.P. Subbalakshmi, Active steganalysis of spread spectrum image steganography, in: IEEE Int. Symp. on Circuits and Systems, Bangkok, Thailand, vol. 3, May 2003, pp. 830-833
-
(2003)
IEEE Int. Symp. on Circuits and Systems
, vol.3
, pp. 830-833
-
-
Chandramouli, R.1
Subbalakshmi, K.P.2
-
56
-
-
84950459514
-
Adapting to unknown smoothness via wavelet shrinkage
-
D.L. Donoho, and I.M. Johnstone Adapting to unknown smoothness via wavelet shrinkage J. Amer. Statist. Assoc. 90 1995 1200 1224
-
(1995)
J. Amer. Statist. Assoc.
, vol.90
, pp. 1200-1224
-
-
Donoho, D.L.1
Johnstone, I.M.2
-
58
-
-
40349100580
-
A new steganalysis method for adapting spread spectrum steganography
-
Ji Rongrong, Hongxun Yao, Shaohui Liu, Liang Wang, Jianchao Sun, A new steganalysis method for adapting spread spectrum steganography, in: Proc. IEEE Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, 2006
-
(2006)
Proc. IEEE Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing
-
-
Rongrong, J.1
Yao, H.2
Liu, S.3
Wang, L.4
Sun, J.5
-
59
-
-
21844460833
-
Steganalysis of spread spectrum data hiding exploiting cover memory
-
San Jose, CA, January
-
K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath, Steganalysis of spread spectrum data hiding exploiting cover memory, in: Proc. IST/SPIE 17th Annu. Symp. Electronic Imaging Science Technology, San Jose, CA, January 2005, pp. 38-46
-
(2005)
Proc. IST/SPIE 17th Annu. Symp. Electronic Imaging Science Technology
, pp. 38-46
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.S.4
-
61
-
-
17044402475
-
Reliable detection of BPCS-steganography in natural images
-
X. Yu, T. Tan, Y. Wang, Reliable detection of BPCS-steganography in natural images, in: Proc. of ICIG, 2004
-
(2004)
Proc. of ICIG
-
-
Yu, X.1
Tan, T.2
Wang, Y.3
-
62
-
-
17044423476
-
Steganalysis on BPCS steganography
-
Japan
-
C. Kiml, S. Chul, S. Lee, W. Yang, H. Lee, Steganalysis on BPCS steganography, in: Proc. of Pacific Rim Workshop on Digital Steganography, Japan, 2003
-
(2003)
Proc. of Pacific Rim Workshop on Digital Steganography
-
-
Kiml, C.1
Chul, S.2
Lee, S.3
Yang, W.4
Lee, H.5
-
63
-
-
77955429505
-
-
JPEG-JSteg-V4 http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4. diff.gz
-
-
-
-
64
-
-
0038675417
-
A fast and effective steganalytic technique against JSteg-like algorithms
-
Florida, USA, March 9-12
-
T. Zhang, X. Ping, A fast and effective steganalytic technique against JSteg-like algorithms, in: ACM Symposium on Applied Computing, Florida, USA, March 9-12, 2003
-
(2003)
ACM Symposium on Applied Computing
-
-
Zhang, T.1
Ping, X.2
-
65
-
-
84937814312
-
F5 - A steganographic algorithm. High capacity despite better steganalysis
-
A. Westfeld F5 - A steganographic algorithm. High capacity despite better steganalysis I.S. Moskowitz, Information Hiding, Fourth Int. Workshop Lecture Notes in Computer Science vol. 2137 2001 Springer-Verlag Berlin, Heidelberg 289 302
-
(2001)
Information Hiding, Fourth Int. Workshop Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
66
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Noordwijkerhout, The Netherlands, October
-
J. Fridrich, M. Goljan, D. Hogea, Steganalysis of JPEG images: Breaking the F5 algorithm, in: Proc. 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, October 2002, pp. 310-323
-
(2002)
Proc. 5th Information Hiding Workshop
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
67
-
-
1442360452
-
Quantitative steganalysis of digital images: Estimating the secret message length
-
J. Fridrich, M. Goljan, D. Hogea, and D. Soukal Quantitative steganalysis of digital images: Estimating the secret message length ACM Multimedia Systems J., Special Issue on Multimedia Security 9 3 2003 288 302
-
(2003)
ACM Multimedia Systems J., Special Issue on Multimedia Security
, vol.9
, Issue.3
, pp. 288-302
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
69
-
-
10044282531
-
On estimation of secret message length in JSteg-like steganography
-
X. Yu, Y. Wang, T. Tan, On estimation of secret message length in JSteg-like steganography, in: Proc. of 7th ICPR, 2004
-
(2004)
Proc. of 7th ICPR
-
-
Yu, X.1
Wang, Y.2
Tan, T.3
-
70
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
Springer
-
J. Fridrich Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes Proc. Inf. Hiding Workshop Lecture Notes in Computer Science vol. 3200 2004 Springer 67 81
-
(2004)
Proc. Inf. Hiding Workshop Lecture Notes in Computer Science
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
72
-
-
33749598442
-
Breaking Cauchy model-based JPEG steganography with first order statistics
-
R. Bohme, and A. Westfeld Breaking Cauchy model-based JPEG steganography with first order statistics ESORICS 2004 Lecture Notes in Computer Science vol. 3193 2004 125 140
-
(2004)
ESORICS 2004 Lecture Notes in Computer Science
, vol.3193
, pp. 125-140
-
-
Bohme, R.1
Westfeld, A.2
-
74
-
-
34250775433
-
JPEG steganalysis using empirical transition matrix in block DCT domain
-
October
-
Fu Dongdong, Yun Q. Shi, Dekun Zuo, Guorong Xuan, JPEG steganalysis using empirical transition matrix in block DCT domain, in: IEEE 8th Workshop on Multimedia Signal Processing, October 2006, pp. 310-313
-
(2006)
IEEE 8th Workshop on Multimedia Signal Processing
, pp. 310-313
-
-
Dongdong, F.1
Shi, Y.Q.2
Zuo, D.3
Xuan, G.4
-
76
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen, and G.W. Wornell Quantization index modulation: A class of provably good methods for digital watermarking and information embedding IEEE Trans. Inform. Theory 47 4 2001 1423 1443 (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
78
-
-
84908566572
-
Neural network based steganalysis in still images
-
July
-
Shaohui Liu, Yao Hongnun, Wen Goa, Neural network based steganalysis in still images, in: Proc. Int. Conf. on Multimedia and Expo, ICME2003, vol. 2, July 2003, pp. 509-512
-
(2003)
Proc. Int. Conf. on Multimedia and Expo, ICME2003
, vol.2
, pp. 509-512
-
-
Liu, S.1
Hongnun, Y.2
Goa, W.3
-
79
-
-
4444292018
-
Steganalysis based on wavelet texture analysis and neural network
-
HangZhou, China
-
Shaohui Liu, Hongxun Yao, Wen Goa, Steganalysis based on wavelet texture analysis and neural network, in: Proc. of WCICA 2004, HangZhou, China, 2004
-
(2004)
Proc. of WCICA 2004
-
-
Liu, S.1
Yao, H.2
Goa, W.3
-
80
-
-
0036474679
-
Wavelet-based texture retrival using generalized Gaussian density and Kullback-Leibler distance
-
Minh N. Do, and Martin Vetterli Wavelet-based texture retrival using generalized Gaussian density and Kullback-Leibler distance IEEE Trans. Image Process. II 2 2002 146 158
-
(2002)
IEEE Trans. Image Process.
, vol.2
, Issue.2
, pp. 146-158
-
-
Do, M.N.1
Vetterli, M.2
-
81
-
-
20444447558
-
Steganalysis of quantization index modulation data hiding
-
Singapore, October
-
K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, B.S. Manjunath, Steganalysis of quantization index modulation data hiding, in: Proc. ICIP, Singapore, October 2004, pp. 1165-1168
-
(2004)
Proc. ICIP
, pp. 1165-1168
-
-
Sullivan, K.1
Bi, Z.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.S.5
-
82
-
-
21844435251
-
Stochastic approach to secret message length estimation in ±k embedding steganography
-
DOI 10.1117/12.584201, 67, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
-
T. Holotyak, J. Fridrich, D. Soukal, Stochastic approach to secret message length estimation in ±k embedding steganography, in: Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, 2005, pp. 673-684 (Pubitemid 40953023)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5681
, pp. 673-684
-
-
Holotyak, T.1
Fridrich, J.2
Soukal, D.3
-
83
-
-
0030701261
-
Image coding based on mixture modeling of wavelet coefficients and a fast estimation quantization framework
-
March
-
S.M. LoPresto, K. Ramchandran, M.T. Orchard, Image coding based on mixture modeling of wavelet coefficients and a fast estimation quantization framework, in: Proc. Data Compression Conf., March 1997
-
(1997)
Proc. Data Compression Conf.
-
-
Lopresto, S.M.1
Ramchandran, K.2
Orchard, M.T.3
-
84
-
-
0043064009
-
Wavelet-based denoising using non-stationary stochastic geometrical image priors
-
Santa Clara, CA
-
S. Voloshynovskiy, O. Koval, T. Pun, Wavelet-based denoising using non-stationary stochastic geometrical image priors, in: Proc. SPIE, Electronic Imaging, Image and Video Communications and Processing V, Santa Clara, CA, 2003
-
(2003)
Proc. SPIE, Electronic Imaging, Image and Video Communications and Processing v
-
-
Voloshynovskiy, S.1
Koval, O.2
Pun, T.3
-
86
-
-
20444438003
-
Quantitative steganalysis of binary images
-
M. Jiang, X. Wu, E.K. Wong, N. Memon, Quantitative steganalysis of binary images, in: Proc. IEEE ICIP, 2004, pp. 29-32
-
(2004)
Proc. IEEE ICIP
, pp. 29-32
-
-
Jiang, M.1
Wu, X.2
Wong, E.K.3
Memon, N.4
-
88
-
-
37649032963
-
Steganalysis of degraded document images
-
October
-
M. Jiang, E.K. Wong, N. Memon, X. Wu, Steganalysis of degraded document images, in: IEEE 7th Workshop on Multimedia Signal Processing, October 2005, pp. 1-4
-
(2005)
IEEE 7th Workshop on Multimedia Signal Processing
, pp. 1-4
-
-
Jiang, M.1
Wong, E.K.2
Memon, N.3
Wu, X.4
-
89
-
-
21244441580
-
A simple technique for estimating message lengths for additive noise steganography
-
China, December 6-9
-
Ming Jiang, Edward Wong, Nasir Memon, Xiaolin Wu, A simple technique for estimating message lengths for additive noise steganography, in: Int. Conf. on Control, Automation, Robotics and Vision, China, December 6-9, 2004
-
(2004)
Int. Conf. on Control, Automation, Robotics and Vision
-
-
Jiang, M.1
Wong, E.2
Memon, N.3
Wu, X.4
-
90
-
-
11244267101
-
Steganalysis of boundary-based steganography using autoregressive model of digital boundaries
-
M. Jiang, X. Wu, E.K. Wong, N. Memon, Steganalysis of boundary-based steganography using autoregressive model of digital boundaries, in: IEEE Int. Conf. on Pattern Recognition, 2004
-
(2004)
IEEE Int. Conf. on Pattern Recognition
-
-
Jiang, M.1
Wu, X.2
Wong, E.K.3
Memon, N.4
-
91
-
-
63249084694
-
Steganalysis of data hiding in binary text images
-
J. Cheng, A.C. Kot, J. Liu, H. Cao, Steganalysis of data hiding in binary text images, in: Proc. of IEEE Int. Symp. on Circuits and Systems, 2005
-
(2005)
Proc. of IEEE Int. Symp. on Circuits and Systems
-
-
Cheng, J.1
Kot, A.C.2
Liu, J.3
Cao, H.4
-
92
-
-
3743128603
-
Text image compression using soft pattern matching
-
Paul G. Howard Text image compression using soft pattern matching Comput. J. 40 2-3 1997 146 156
-
(1997)
Comput. J.
, vol.40
, Issue.23
, pp. 146-156
-
-
Howard, P.G.1
-
93
-
-
33646757239
-
Steganalysis of binary text images
-
March
-
J. Cheng, A.C. Kot, J. Liu, H. Cao, Steganalysis of binary text images, in: Proc. of IEEE ICASSP, IV, March 2005, pp. 689-692
-
(2005)
Proc. of IEEE ICASSP, IV
, pp. 689-692
-
-
Cheng, J.1
Kot, A.C.2
Liu, J.3
Cao, H.4
-
94
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
Rochester, NY, September
-
H. Farid, Detecting hidden messages using higher-order statistical models, in: Proc. IEEE Int. Conf. Image Process., Rochester, NY, vol. 2, September 2002, pp. 905-908
-
(2002)
Proc. IEEE Int. Conf. Image Process.
, vol.2
, pp. 905-908
-
-
Farid, H.1
-
95
-
-
0023383122
-
Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques
-
P. Vaidyanathan Quadrature mirror filter banks, M-band extensions and perfect reconstruction techniques IEEE ASSP Magaz. 4 3 1987 4 20
-
(1987)
IEEE ASSP Magaz.
, vol.4
, Issue.3
, pp. 4-20
-
-
Vaidyanathan, P.1
-
96
-
-
0023311471
-
A theory of multirate filter banks
-
M. Vetterli A theory of multirate filter banks IEEE Trans. ASSP 35 3 1987 356 372
-
(1987)
IEEE Trans. ASSP
, vol.35
, Issue.3
, pp. 356-372
-
-
Vetterli, M.1
-
97
-
-
0001153439
-
Subband transforms
-
Kluwer Academic Publishers
-
E. Simoncelli, and E. Adelson Subband transforms Subband Image Coding 1990 Kluwer Academic Publishers 143 192
-
(1990)
Subband Image Coding
, pp. 143-192
-
-
Simoncelli, E.1
Adelson, E.2
-
98
-
-
0000764772
-
The use of multiple measures in taxonomic problems
-
R. Fisher The use of multiple measures in taxonomic problems Ann. Eugenics 7 1936 179 188
-
(1936)
Ann. Eugenics
, vol.7
, pp. 179-188
-
-
Fisher, R.1
-
102
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C.J.C. Burges A tutorial on support vector machines for pattern recognition Data Mining Knowl. Discov. 2 1998 121 167
-
(1998)
Data Mining Knowl. Discov.
, vol.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
103
-
-
8844256156
-
Steganalysis using color wavelet statistics and one-class vector support machines
-
S. Lyu, H. Farid, Steganalysis using color wavelet statistics and one-class vector support machines, in: Proc. SPIE, Security, Steganography, Watermarking of Multimedia Contents, vol. 5306, 2004, pp. 35-45
-
(2004)
Proc. SPIE, Security, Steganography, Watermarking of Multimedia Contents
, vol.5306
, pp. 35-45
-
-
Lyu, S.1
Farid, H.2
-
104
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
B. Scholkopf, J. Platt, J. Shawe-Taylor, A.J. Smola, and R.C. Williamson Estimating the support of a high-dimensional distribution Neural Computation 2001 1443 1471
-
(2001)
Neural Computation
, pp. 1443-1471
-
-
Scholkopf, B.1
Platt, J.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
106
-
-
33646760642
-
Steganalysis, of halftone images
-
18-23 March
-
M. Jiang, E.K. Wong, N. Memon, X. Wu Steganalysis, of halftone images, in: IEEE ICASSP'05, vol. 2, 18-23 March 2005, pp. 793-796
-
(2005)
IEEE ICASSP'05
, vol.2
, pp. 793-796
-
-
Jiang, M.1
Wong, E.K.2
Memon, N.3
Wu, X.4
-
107
-
-
29044433896
-
A feature based classification technique for blind image steganalysis
-
Wen-Nung Lie, and Guo-Shiang Lin A feature based classification technique for blind image steganalysis IEEE Trans. Multimedia 7 6 December 2005 1007 1020
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.6
, pp. 1007-1020
-
-
Lie, W.-N.1
Lin, G.-S.2
-
108
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
Springer-Verlag Berlin
-
G. Xuan Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions Lecture Notes in Computer Science vol. 3727 2005 Springer-Verlag Berlin 262 277
-
(2005)
Lecture Notes in Computer Science
, vol.3727
, pp. 262-277
-
-
Xuan, G.1
-
110
-
-
34247562352
-
Steganalysis based on Markov model of thresholded prediction-error image
-
Dekun Zou, Yun Q. Shi, Wei Su, Guorong Xuan, Steganalysis based on Markov model of thresholded prediction-error image, IEEE, ICME, 2006
-
(2006)
IEEE, ICME
-
-
Zou, D.1
Shi, Y.Q.2
Su, W.3
Xuan, G.4
-
111
-
-
33750555925
-
Image steganalysis based on moments of characteristic functions using wavelet decomposition
-
Yun Q. Shi, et al., Image steganalysis based on moments of characteristic functions using wavelet decomposition, in: Prediction-Error Image and Neural Network, ICME, 2005, pp. 269-272
-
(2005)
Prediction-Error Image and Neural Network, ICME
, pp. 269-272
-
-
Shi, Y.Q.1
-
112
-
-
77955418570
-
Blind image steganalysis based on statistical analysis of empirical matrix
-
Xiaochuan Chen, Yunghong Wang, Tieniu Tan, Lei Guo, Blind image steganalysis based on statistical analysis of empirical matrix, IEEE, ICPR, 2006
-
(2006)
IEEE, ICPR
-
-
Chen, X.1
Wang, Y.2
Tan, T.3
Guo, L.4
-
113
-
-
0242576337
-
Active steganalysis of sequential steganography
-
Santa Clara, CA
-
S. Trivedi, R. Chandramouli, Active steganalysis of sequential steganography, in: SPIE Conf., Santa Clara, CA, 2003, pp. 123-130
-
(2003)
SPIE Conf.
, pp. 123-130
-
-
Trivedi, S.1
Chandramouli, R.2
-
114
-
-
15844379524
-
Texture based steganalysis: Results for color images
-
Patricia Lafferty, Farid Ahmad, Texture based steganalysis: Results for color images, in: Proc. of SPIE, vol. 5561, 2004
-
(2004)
Proc. of SPIE
, vol.5561
-
-
Lafferty, P.1
Ahmad, F.2
|