-
1
-
-
49949091527
-
YASS: Yet another steganographic scheme that resists blind steganalysis
-
[Online]. Available, LNCS 4567
-
K. Solanki, A. Sarkar, and B. S. Manjunath, "YASS: Yet another steganographic scheme that resists blind steganalysis," in Proc. 9th Int. Workshop Information Hiding, 2007, pp. 16-31 [Online]. Available: http://vision.ece.ucsb.edu/data-hiding/resist-blind-steganalysis. shtml, LNCS 4567
-
(2007)
Proc. 9th Int. Workshop Information Hiding
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
2
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
LNCS 2578
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop Information Hiding, 2002, pp. 340-354, LNCS 2578.
-
(2002)
Proc. 5th Int. Workshop Information Hiding
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
-
3
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
LNCS 3727
-
G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. 7th Int. Workshop Information Hiding, 2005, pp. 262-277, LNCS 3727.
-
(2005)
Proc. 7th Int. Workshop Information Hiding
, pp. 262-277
-
-
Xuan, G.1
Shi, Y.Q.2
Gao, J.3
Zou, D.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, C.8
Chen, W.9
-
4
-
-
33750555925
-
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
-
Amsterdam, The Netherlands
-
Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, and C. Chen, "Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network," in Proc. IEEE Int. Conf. Multimedia and Expro, Amsterdam, The Netherlands, 2005.
-
(2005)
Proc. IEEE Int. Conf. Multimedia and Expro
-
-
Shi, Y.Q.1
Xuan, G.2
Zou, D.3
Gao, J.4
Yang, C.5
Zhang, Z.6
Chai, P.7
Chen, W.8
Chen, C.9
-
5
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
LNCS 3200
-
J. Fridrich, "Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes," in Proc. 6th Int. Workshop Information Hiding, 2004, pp. 67-81, LNCS 3200.
-
(2004)
Proc. 6th Int. Workshop Information Hiding
, pp. 67-81
-
-
Fridrich, J.1
-
6
-
-
34548232251
-
Merging Markov and DCT features for multiclass JPEG steganalysis
-
Security, Steganography, and Watermarking of Multimedia Contents IX
-
T. Pevny and J. Fridrich, "Merging Markov and DCT features for multiclass JPEG steganalysis," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 2005, vol.6505, pp. 3.1-3.13.
-
(2005)
Proc. SPIE Electronic Imaging
, vol.6505
, pp. 31-313
-
-
Pevny, T.1
Fridrich, J.2
-
7
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington DC
-
N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Security Symp., Washington, DC, 2001.
-
(2001)
Proc. 10th USENIX Security Symp.
-
-
Provos, N.1
-
8
-
-
0005105932
-
High capacity despite better steganalysis (F5-a steganographic algorithm)
-
LNCS 2137
-
A. Westfeld, "High capacity despite better steganalysis (F5-a steganographic algorithm)," in Proc. 4th Int. Workshop Information Hiding, 2001, pp. 289-302, LNCS 2137.
-
(2001)
Proc. 4th Int. Workshop Information Hiding
, pp. 289-302
-
-
Westfeld, A.1
-
9
-
-
33744753200
-
Model based methods for steganography and steganalysis
-
P. Sallee, "Model based methods for steganography and steganalysis," Int. J. Image Graphics, vol.5, no.1, pp. 167-190, 2005.
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
10
-
-
42949124470
-
Influence of embedding strategies on security of steganographic methods in the JPEG domain
-
Security, Steganography, and Watermarking of Multimedia Contents X San Jose, CA, Jan.
-
J. Kodovsky and J. Fridrich, "Influence of embedding strategies on security of steganographic methods in the JPEG domain," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, Jan. 28-31, 2008.
-
(2008)
Proc. SPIE Electronic Imaging
, vol.28-31
-
-
Kodovsky, J.1
Fridrich, J.2
-
11
-
-
56749160543
-
Steganalysis of YASS
-
Oxford, U.K., Sep.
-
B. Li, Y. Q. Shi, and J. Huang, "Steganalysis of YASS," in Proc. 10th ACM Workshop on Multimedia & Security (MMSEC), Oxford, U.K., Sep. 22-23, 2008.
-
(2008)
Proc. 10th ACM Workshop on Multimedia & Security (MMSEC)
, vol.22-23
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
12
-
-
42949166748
-
Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis
-
Security, Steganography, and Watermarking of Multimedia Contents IX
-
A. Sarkar, K. Solanki, and B. S. Manjunath, "Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis," in Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 2008, vol.6819, pp. 17.1-17.11.
-
(2008)
Proc. SPIE Electronic Imaging
, vol.6819
, pp. 171-1711
-
-
Sarkar, A.1
Solanki, K.2
Manjunath, B.S.3
-
13
-
-
70449646940
-
Calibration revisited
-
Princeton, NJ, Sep.
-
J. Kodovsky and J. Fridrich, "Calibration revisited," in Proc. ACMMultimedia and Security Workshop, Princeton, NJ, Sep. 7-8, 2009.
-
(2009)
Proc. ACMMultimedia and Security Workshop
, vol.7-8
-
-
Kodovsky, J.1
Fridrich, J.2
-
14
-
-
77951862698
-
Modern steganalysis can detect YASS
-
San Jose, CA, Jan.
-
J. Kodovsky, T. Pevny, and J. Fridrich, "Modern steganalysis can detect YASS," in Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, Jan. 17-21, 2010.
-
Proc. SPIE, Electronic Imaging, Media Forensics and Security XII
, vol.17-21
, pp. 2010
-
-
Kodovsky, J.1
Pevny, T.2
Fridrich, J.3
-
15
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
LNCS 4437
-
Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int. Workshop Information Hiding, 2007, pp. 249-264, LNCS 4437.
-
(2007)
Proc. 8th Int. Workshop Information Hiding
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
16
-
-
51749089283
-
JPEG image steganalysis utilizing both intrablock and interblock correlations
-
Seattle, WA, May
-
C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Proc. IEEE Int. Symp. Circuits and Systems, Seattle, WA, May 18-21, 2008.
-
(2008)
Proc. IEEE Int. Symp. Circuits and Systems
, vol.18-21
-
-
Chen, C.1
Shi, Y.Q.2
-
17
-
-
9744279131
-
Robust image-adaptive data hiding using erasure and error correction
-
Dec.
-
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Robust image-adaptive data hiding using erasure and error correction," IEEE Trans. Image Process., vol.13, no.12, pp. 1627-1639, Dec. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.12
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
18
-
-
0035246564
-
Factor graphs and the sum-product algorithm
-
Feb.
-
F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, "Factor graphs and the sum-product algorithm," IEEE Trans. Inf. Theory, vol.47, no.2, pp. 498-519, Feb. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.2
, pp. 498-519
-
-
Kschischang, F.R.1
Frey, B.J.2
Loeliger, H.-A.3
-
19
-
-
69749094893
-
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme
-
San Diego, CA, Oct.
-
A. Sarkar, L. Nataraj, B. S. Manjunath, and U. Madhow, "Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme," in Proc. IEEE Int. Conf. Image Processing, San Diego, CA, Oct. 12-15, 2008.
-
(2008)
Proc. IEEE Int. Conf. Image Processing
, vol.12-15
-
-
Sarkar, A.1
Nataraj, L.2
Manjunath, B.S.3
Madhow, U.4
-
20
-
-
77955704406
-
-
[Online]. Available:
-
NRCS Photo Gallery [Online]. Available: http://photogallery.nrcs. usda.gov
-
-
-
-
21
-
-
77955672547
-
-
CorelDraw Image CD, Online]. Available:
-
CorelDraw Image CD [Online]. Available: http://www.corel.com
-
-
-
-
23
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
LNCS 4437
-
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Int.Workshop Information Hiding, 2007, pp. 314-327, LNCS 4437.
-
(2007)
Proc. 8th Int.Workshop Information Hiding
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
24
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
Dallas, TX, Sep. 20-21
-
J. Fridrich, T. Pevny, and J. Kodovsky, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. ACM Workshop on Multimedia and Security, Dallas, TX, Sep. 20-21, 2007, pp. 3-14.
-
(2007)
Proc. ACM Workshop on Multimedia and Security
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
|