-
2
-
-
77955715856
-
-
Wave files from
-
Audio wave files (2006). Wave files from http://www.wavsurfer.com.
-
(2006)
Audio Wave Files
-
-
-
3
-
-
31344443662
-
Audio steganalysis with content independent measures
-
I. Avcibas Audio steganalysis with content independent measures IEEE Signal Processing Letters 13 2 2006 92 95
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.2
, pp. 92-95
-
-
Avcibas, I.1
-
4
-
-
33645696636
-
Image steganalysis with binary similarity measures
-
I. Avcibas, M. Kharrazi, N. Memon, and B. Sankur Image steganalysis with binary similarity measures EURASIP Journal on Applied Signal Processing, Hindawi 1 2005 2749 2757
-
(2005)
EURASIP Journal on Applied Signal Processing, Hindawi
, vol.1
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazi, M.2
Memon, N.3
Sankur, B.4
-
6
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu Techniques for data hiding IBM Systems Journal 35 3-4 1996 313 336
-
(1996)
IBM Systems Journal
, vol.35
, Issue.34
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
7
-
-
4243801800
-
-
Available from
-
Brown, A. (2008). S-tools version 4.0. Available from http://members.tripod.com/steganography/stego/s-tools4.html.
-
(2008)
S-tools Version 4.0
-
-
Brown, A.1
-
9
-
-
84957868624
-
An information theoretic model for steganography
-
David Aucsmith (Ed.) Springer: Portland, Oregon, USA
-
Cachin, C. (1998). An information theoretic model for steganography. In David Aucsmith (Ed.), Information hiding, second international workshop, lecture notes in computer science (Vol. 1525, pp. 306-318.11). Springer: Portland, Oregon, USA.
-
(1998)
Information Hiding, Second International Workshop, Lecture Notes in Computer Science
, vol.1525
, pp. 306-31811
-
-
Cachin, C.1
-
11
-
-
77950863690
-
Evolutionary decision trees and software metrics for module defects identification
-
M. Chi Evolutionary decision trees and software metrics for module defects identification International Journal of Computer and Information Science 2 2008 273 277
-
(2008)
International Journal of Computer and Information Science
, vol.2
, pp. 273-277
-
-
Chi, M.1
-
12
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon Secure spread spectrum watermarking for multimedia IEEE Transactions on Image Processing 6 12 1997 1673 1687
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
13
-
-
52149123405
-
Steganalysis based on feature reducts of rough set by using genetic algorithm
-
Chongqing, China, 2008
-
Dai, M., Liu, Y., & Lin, J. (2008). Steganalysis based on feature reducts of rough set by using genetic algorithm. In Proceedings of the seventh world congress of intelligent control and automation, WCICA '08, IEEE (vol. 23, pp. 6764-6768). Chongqing, China, 2008,.
-
(2008)
Proceedings of the Seventh World Congress of Intelligent Control and Automation, WCICA '08, IEEE
, vol.23
, pp. 6764-6768
-
-
Dai, M.1
Liu, Y.2
Lin, J.3
-
15
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
Rochester, New York, USA
-
Farid H. (2002). Detecting hidden messages using higher-order statistical models. In Proceedings of the international conference on image processing, ICIP 2002, IEEE (pp. 905-908). Rochester, New York, USA.
-
(2002)
Proceedings of the International Conference on Image Processing, ICIP 2002, IEEE
, pp. 905-908
-
-
Farid, H.1
-
17
-
-
35048835739
-
Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
J. Fridrich Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes Jessica J. Fridrich, Information hiding, 6th international workshop, IH 2004, lecture notes in computer science Vol. 3200 2004 Springer Toronto, Canada 67 81
-
(2004)
Information Hiding, 6th International Workshop, IH 2004, Lecture Notes in Computer Science
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
18
-
-
2642549992
-
Attacking the outguess
-
J. Fridrich, M. Goljan, and D. Hogea Attacking the outguess Agnes Hui Chan, Virgil D. Gligor, Fifth international conference on information security, ICIS 2002, lecture notes in computer science Vol. 2433 2002 Springer 3 6
-
(2002)
Fifth International Conference on Information Security, ICIS 2002, Lecture Notes in Computer Science
, vol.2433
, pp. 3-6
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
19
-
-
0242497150
-
New methodology for breaking steganographic techniques for JPEGs
-
J. Fridrich, M. Goljan, and D. Hogea New methodology for breaking steganographic techniques for JPEGs E. Delp, Security and watermarking of multimedia contents V, SPIE 2003, electronic imaging science and technology Vol. 5020 2003 Society of Photo-optical Instrumentation Engineers, Santa Clara California, USA 143 155
-
(2003)
Security and Watermarking of Multimedia Contents V, SPIE 2003, Electronic Imaging Science and Technology
, vol.5020
, pp. 143-155
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
20
-
-
45149088403
-
Wavelet domain audio steganalysis based on statistical moments and PCA
-
Beijing, China
-
Fu, J., Qi, Y., & Yuan, J. (2007). Wavelet domain audio steganalysis based on statistical moments and PCA. In: Proceedings of the international conference on wavelet analysis and pattern recognition, ICWAPR '07, IEEE (pp. 619-1623). Beijing, China.
-
(2007)
Proceedings of the International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR '07, IEEE
, pp. 619-1623
-
-
Fu, J.1
Qi, Y.2
Yuan, J.3
-
23
-
-
8844234222
-
Cepstral domain modification of audio signals for data embedding: Preliminary results
-
Edward J. Delp, & Ping Wah Wong (Eds.) Society of Photo-optical Instrumentation Engineers: San Jose, California, USA
-
Gopalan, K. (2004). Cepstral domain modification of audio signals for data embedding: preliminary results. In Edward J. Delp, & Ping Wah Wong (Eds.), Security, steganography, and watermarking of multimedia contents VI, SPIE 2004, electronic imaging science and technology (Vol. 5306 pp. 151-161). Society of Photo-optical Instrumentation Engineers: San Jose, California, USA.
-
(2004)
Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE 2004, Electronic Imaging Science and Technology
, vol.5306
, pp. 151-161
-
-
Gopalan, K.1
-
24
-
-
28444487777
-
-
Available from
-
Hetzl, S. (2003). Steghide. Available from http://steghide.sourceforge. net.
-
(2003)
Steghide
-
-
Hetzl, S.1
-
27
-
-
21844451413
-
Steganalysis of recorded speech
-
M.K. Johnson, S. Lyu, and H. Farid Steganalysis of recorded speech J. Fridrich, Security and watermarking of multimedia contents VII, SPIE 2005, electronic imaging science and technology Vol. 86 2005 Society of Photo-Optical Instrumentation Engineers, San Jose CA, USA 664 672
-
(2005)
Security and Watermarking of Multimedia Contents VII, SPIE 2005, Electronic Imaging Science and Technology
, vol.86
, pp. 664-672
-
-
Johnson, M.K.1
Lyu, S.2
Farid, H.3
-
28
-
-
0033716537
-
High capacity image steganographic model
-
Agadir, Morocco
-
Lee Y. K., & Chen, L. H. (2000). High capacity image steganographic model. In Proceedings of the international conference on image and signal processing, ICISP 2000, IEE (Vol. 147, no. 3, pp. 288-294). Agadir, Morocco.
-
(2000)
Proceedings of the International Conference on Image and Signal Processing, ICISP 2000, IEE
, vol.147
, Issue.3
, pp. 288-294
-
-
Lee, Y.K.1
Chen, L.H.2
-
29
-
-
0242576348
-
Audio steganography by amplitude or phase modification
-
G. Kaliappan, W.J. Stanley, A.F. Scott, and H.M. Darren Audio steganography by amplitude or phase modification Ping Wah Wong, Edward J. Delp, Security and watermarking of multimedia contents V, SPIE 2003, electronic imaging science and technology Vol. 5020 2003 Society of Photo-optical Instrumentation Engineers, Santa Clara California, USA 67 76
-
(2003)
Security and Watermarking of Multimedia Contents V, SPIE 2003, Electronic Imaging Science and Technology
, vol.5020
, pp. 67-76
-
-
Kaliappan, G.1
Stanley, W.J.2
Scott, A.F.3
Darren, H.M.4
-
32
-
-
33645685599
-
Transparency benchmarking on audio watermarks and steganography
-
Edward J. Delp, & Ping Wah Wong (Eds.) Society of Photo-optical Instrumentation Engineers, San Jose, California, USA
-
Kraetzer, C., Dittmann, J., & Lang, A. (2006). Transparency benchmarking on audio watermarks and steganography. In Edward J. Delp, & Ping Wah Wong (Eds.), Security, steganography, and watermarking of multimedia contents VIII, SPIE 2006, Electronic Imaging Science and Technology (Vol. 6072, pp. 24-36). Society of Photo-optical Instrumentation Engineers, San Jose, California, USA.
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE 2006, Electronic Imaging Science and Technology
, vol.6072
, pp. 24-36
-
-
Kraetzer, C.1
Dittmann, J.2
Lang, A.3
-
33
-
-
0020910013
-
Binary tree versus single level tree classification of while blood cells
-
G. Landeweerd, T. Timmers, E. Gelsema, M. Bins, and M. Halic Binary tree versus single level tree classification of while blood cells Pattern Recognition 16 1983 571 577
-
(1983)
Pattern Recognition
, vol.16
, pp. 571-577
-
-
Landeweerd, G.1
Timmers, T.2
Gelsema, E.3
Bins, M.4
Halic, M.5
-
34
-
-
0022597806
-
Tree classifier design with a permutation statistic
-
X. Li, and R.C. Dubes Tree classifier design with a permutation statistic Pattern Recognition 19 1986 229 235
-
(1986)
Pattern Recognition
, vol.19
, pp. 229-235
-
-
Li, X.1
Dubes, R.C.2
-
37
-
-
33750990501
-
A feature selection methodology for steganalysis
-
Springer Berlin, Heidelberg, Istanbul, Turkey
-
Y. Miche, B. Roue, A. Lendasse, and P. Bas A feature selection methodology for steganalysis Proceedings of the international workshop on multimedia content representation, classification and security 2006 Springer Berlin, Heidelberg, Istanbul, Turkey 49 56
-
(2006)
Proceedings of the International Workshop on Multimedia Content Representation, Classification and Security
, pp. 49-56
-
-
Miche, Y.1
Roue, B.2
Lendasse, A.3
Bas, P.4
-
38
-
-
38049075376
-
A novel intrusion detection method based on combining ensemble learning with induction-enhanced particle swarm algorithm
-
Haikou, Hainan, China
-
Minn, F. (2007). A novel intrusion detection method based on combining ensemble learning with induction-enhanced particle swarm algorithm. In Proceedings of the international conference on natural computation, ICNC '07, IEEE (pp. 520-524). Haikou, Hainan, China.
-
(2007)
Proceedings of the International Conference on Natural Computation, ICNC '07, IEEE
, pp. 520-524
-
-
Minn, F.1
-
40
-
-
0032075445
-
Robust image watermarking in the spatial domain
-
N. Nikolaidis, and I. Pitas Robust image watermarking in the spatial domain Signal Processing 66 1998 385 403
-
(1998)
Signal Processing
, vol.66
, pp. 385-403
-
-
Nikolaidis, N.1
Pitas, I.2
-
41
-
-
29044433896
-
A feature based classification technique for blind image steganalysis
-
L.W. Nung, and L.G. Shiang A feature based classification technique for blind image steganalysis IEEE Transactions on Multimedia 7 6 2005 1007 1020
-
(2005)
IEEE Transactions on Multimedia
, vol.7
, Issue.6
, pp. 1007-1020
-
-
Nung, L.W.1
Shiang, L.G.2
-
42
-
-
85027395348
-
Averaging over decision stumps
-
J.J. Oliver, and D. Hand Averaging over decision stumps Francesco Bergadano, Luc De Raedt, Proceedings of the European conference on machine learning, ECML-'94, lecture notes in computer science Vol. 784 1994 Springer 231 241
-
(1994)
Proceedings of the European Conference on Machine Learning, ECML-'94, Lecture Notes in Computer Science
, vol.784
, pp. 231-241
-
-
Oliver, J.J.1
Hand, D.2
-
43
-
-
0242576352
-
Steganalysis of audio based on audio quality metrics
-
H. Özer, B. Sankur, N. Memon, and I. Avcibas Steganalysis of audio based on audio quality metrics Ping Wah Wong, Edward J. Delp, Security and watermarking of multimedia contents V, SPIE 2003, electronic imaging science and technology Vol. 5020 2003 Society of Photo-optical Instrumentation Engineers, Santa Clara California, USA 55 66
-
(2003)
Security and Watermarking of Multimedia Contents V, SPIE 2003, Electronic Imaging Science and Technology
, vol.5020
, pp. 55-66
-
-
Özer, H.1
Sankur, B.2
Memon, N.3
Avcibas, I.4
-
44
-
-
33745384504
-
Detection of audio covert channels using statistical footprints of hidden messages
-
H. Özer, B. Sankur, N. Memon, and I. Avcibas Detection of audio covert channels using statistical footprints of hidden messages Elsevier Digital Signal Processing 16 2006 389 401
-
(2006)
Elsevier Digital Signal Processing
, vol.16
, pp. 389-401
-
-
Özer, H.1
Sankur, B.2
Memon, N.3
Avcibas, I.4
-
48
-
-
0026154509
-
A survey of decision tree classifier methodology
-
S. Rasoul Safavian, and David Landgrebe A survey of decision tree classifier methodology IEEE Transactions on Systems, Man, and Cybernetics 21 3 1991 660 674
-
(1991)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.21
, Issue.3
, pp. 660-674
-
-
Rasoul Safavian, S.1
Landgrebe, D.2
-
49
-
-
28444486015
-
Steganalysis of audio: Attacking the StegHide
-
S. Daniel Yeung, Zhi-Qiang Liu, Xizhao Wang, & Hong Yan (Eds.) Guangzhou, China
-
Ru, X., Zhang, H., & Huang, X. (2005). Steganalysis of audio: attacking the StegHide. In S. Daniel Yeung, Zhi-Qiang Liu, Xizhao Wang, & Hong Yan (Eds.), Proceedings of the international conference on machine learning and cybernetics, ICMLC '05, IEEE (pp. 3937-3942). Guangzhou, China.
-
(2005)
Proceedings of the International Conference on Machine Learning and Cybernetics, ICMLC '05, IEEE
, pp. 3937-3942
-
-
Ru, X.1
Zhang, H.2
Huang, X.3
-
50
-
-
47349085165
-
Blind multi-class steganalysis system using wavelet statistics
-
Kaohsiung, Taiwan
-
Savoldi, A., & Gubian, P. (2007). Blind multi-class steganalysis system using wavelet statistics. In Proceedings of the third international conference on intelligent information hiding and multimedia signal processing, IIHMSP '07, IEEE computer society (pp. 27-29). Kaohsiung, Taiwan.
-
(2007)
Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP '07, IEEE Computer Society
, pp. 27-29
-
-
Savoldi, A.1
Gubian, P.2
-
51
-
-
77953759247
-
Decision tree classifier for network intrusion detection with GA-based feature selection
-
G. Stein, B. Chen, A.S. Wu, and K.A. Hua Decision tree classifier for network intrusion detection with GA-based feature selection Mário Guimarães, Proceedings of the 43rd annual southeast regional conference Vol. 2 2005 ACM Kennesaw, Georgia, Alabama, USA 136 141
-
(2005)
Proceedings of the 43rd Annual Southeast Regional Conference
, vol.2
, pp. 136-141
-
-
Stein, G.1
Chen, B.2
Wu, A.S.3
Hua, K.A.4
-
53
-
-
10844269694
-
High capacity image steganography using wavelet-based fusion
-
Alexandria, Egypt
-
Tolba, M. F., Ghonemy, M. A. -S., Taha I. A. -H., & Khalifa A. S. (2004). High capacity image steganography using wavelet-based fusion. In: Proceedings of the ninth IEEE symposium on computers and communications, ISCC'04, IEEE computer society (pp. 430-435). Alexandria, Egypt.
-
(2004)
Proceedings of the Ninth IEEE Symposium on Computers and Communications, ISCC'04, IEEE Computer Society
, pp. 430-435
-
-
Tolba, M.F.1
Ghonemy, M.A.-S.2
Taha, I.A.-H.3
Khalifa, A.S.4
-
57
-
-
35148862628
-
Improved BSS based schemes for active steganalysis
-
Feng Wenying, Feng Gao (Eds.) Qingdao, China
-
Xu, B., Zhang, Z., Wang, J., & Liu, X. (2007). Improved BSS based schemes for active steganalysis. In Feng Wenying, Feng Gao (Eds.), Proceedings of the ACIS conference on software engineering, artificial intelligence, networking and parallel distributed computing, SNPD 2007, IEEE computer society (pp. 815-818), Qingdao, China.
-
(2007)
Proceedings of the ACIS Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing, SNPD 2007, IEEE Computer Society
, pp. 815-818
-
-
Xu, B.1
Zhang, Z.2
Wang, J.3
Liu, X.4
-
58
-
-
54249096638
-
An algorithm of echo steganalysis based on Bayes classifier
-
ICIA '08, IEEE computer society Zhangjiajie, Hunan, China
-
Zeng, W., Ai, H., Hu, R., & Gao, S. (2008). An algorithm of echo steganalysis based on Bayes classifier. In Proceedings of the third international conference on information and automation, ICIA '08, IEEE computer society (pp. 1667-1670). Zhangjiajie, Hunan, China.
-
(2008)
Proceedings of the Third International Conference on Information and Automation
, pp. 1667-1670
-
-
Zeng, W.1
Ai, H.2
Hu, R.3
Gao, S.4
-
59
-
-
79955595823
-
A LSB steganography detection algorithm
-
Beijing, China
-
Zhi, L., Fen, S. A., & Xian, Y. Y. (2003). A LSB steganography detection algorithm. In Proceedings of the fourteenth international conference on personal, indoor and mobile radio communication, PIMRC 2003, IEEE signal processing (pp. 2780-2783). Beijing, China.
-
(2003)
Proceedings of the Fourteenth International Conference on Personal, Indoor and Mobile Radio Communication, PIMRC 2003, IEEE Signal Processing
, pp. 2780-2783
-
-
Zhi, L.1
Fen, S.A.2
Xian, Y.Y.3
|