-
1
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J. 35(3), 313-336 (1996).
-
(1996)
IBM Syst. J.
, vol.35
, Issue.3
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
2
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
N. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE Comput. Sci. Eng. 31(2), 26-34 (1998). (Pubitemid 128555329)
-
(1998)
Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
3
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography," IEEE Security Privacy 1, 32-44 (2003).
-
(2003)
IEEE Security Privacy
, vol.1
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
4
-
-
85013855044
-
-
Morgan Kaufmann, San Francisco
-
I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, pp. 429-495, Morgan Kaufmann, San Francisco (2008).
-
(2008)
Digital Watermarking and Steganography
, pp. 429-495
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
Fridrich, J.4
Kalker, T.5
-
5
-
-
84957868624
-
An information-theoretic model for steganography
-
Springer-Verlag, Berlin
-
C. Cachin, "An information-theoretic model for steganography," in 2nd Int. Workshop on Information Hiding, Portland, Oregon, Lecture Notes in Computer Science, vol. 1525, pp. 306-318, Springer-Verlag, Berlin (1998).
-
(1998)
2nd Int. Workshop on Information Hiding, Portland, Oregon, Lecture Notes in Computer Science
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
6
-
-
84904224992
-
Steganalysis of images created using current steganographic software
-
Springer-Verlag, Berlin
-
N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganographic software," in Proc. 2nd Int. Workshop on Information Hiding, Portland, Oregon, Lecture Notes in Computer Science, vol. 1525, pp. 273-289, Springer-Verlag, Berlin (1998).
-
(1998)
Proc. 2nd Int. Workshop on Information Hiding, Portland, Oregon, Lecture Notes in Computer Science
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
7
-
-
0001849187
-
Attacks on steganographic systems
-
Springer-Verlag, Berlin
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Proc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, Lecture Notes in Computer Science, vol. 1768, , pp. 61-76, Springer-Verlag, Berlin (1999).
-
(1999)
Proc. 3rd Int. Workshop on Information Hiding, Dresden, Germany, Lecture Notes in Computer Science
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
8
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Springer-Verlag, Berlin
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science, vol. 2578, pp. 340-354, Springer-Verlag, Berlin (2002).
-
(2002)
Proc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science
, vol.2578
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
-
9
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Springer-Verlag, Berlin
-
J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," in Proc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science, vol. 2578, pp. 310-323, Springer-Verlag, Berlin (2002).
-
(2002)
Proc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science
, vol.2578
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
10
-
-
35248901820
-
Detection of LSB steganography via sample pair analysis
-
Springer-Verlag, Berlin
-
S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," in Proc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science, vol. 2578, pp. 355-372, Springer-Verlag, Berlin (2002).
-
(2002)
Proc. 5th Int. Workshop on Information Hiding, Noordwijkerhout, the Netherlands, Lecture Notes in Computer Science
, vol.2578
, pp. 355-372
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
11
-
-
21844435251
-
Stochastic approach to secret message length estimation in k embedding steganography
-
DOI 10.1117/12.584201, 67, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
-
J. Fridrich, T. S. Holotyak, and D. Soukal, "Stochastic approach to secret message length estimation in k embedding steganography," Proc. SPIE 16(20), 673-684 (2005). (Pubitemid 40953023)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5681
, pp. 673-684
-
-
Holotyak, T.1
Fridrich, J.2
Soukal, D.3
-
12
-
-
84875603539
-
-
Jan. 21
-
A. Brown, "S-Tool V4," http://www.spychecker.com/program/ stiils.html, Jan. 21 (2009).
-
(2009)
"S-Tool V4
-
-
Brown, A.1
-
13
-
-
84875590145
-
-
Jan. 21
-
H. Repp, "Hide4PGP," http://www.heinz-repp.onlinehome.de/ hide4PGP.htm, Jan. 21 (2009).
-
(2009)
"Hide4PGP
-
-
Repp, H.1
-
14
-
-
84880360661
-
-
D. Upham, "JPEG-JSteg," http://www.funet.fi/pub/crypt/ stefanography/jpeg-jsteg-v4.diff.gzee (1997).
-
(1997)
"JPEG-JSteg
-
-
Upham, D.1
-
16
-
-
78651538207
-
-
N. Provos, "Outguess," http://www.outguesst.orgoutguest-0.2. tar.gz (2001).
-
(2001)
"Outguess
-
-
Provos, N.1
-
18
-
-
0142057129
-
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
-
C. C. Thien and J. C. Lin, "A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function," Pattern Recogn., 36(12), 2875-2881 (2003).
-
(2003)
Pattern Recogn.
, vol.36
, Issue.12
, pp. 2875-2881
-
-
Thien, C.C.1
Lin, J.C.2
-
19
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
DOI 10.1016/j.patcog.2003.08.007
-
C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recogn. 37(3), 469-474 (2004). (Pubitemid 38003086)
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.-K.1
Cheng, L.M.2
-
20
-
-
84875632848
-
-
Jan. 21
-
R. Machado, "\Stego," http://www.stego.com, Jan. 21 (2009).
-
(2009)
"\Stego
-
-
Machado, R.1
-
21
-
-
84940448623
-
Secure steganographic methods for palette images
-
Springer-Verlag, New York
-
J. Fridrich and R. Du, "Secure steganographic methods for palette images," in Proc. 3rd Information Hiding Workshop, Dresden, Germany, Lecture Notes in Computer Science, Vol. 1768, pp. 47-60, Springer-Verlag, New York (2000).
-
(2000)
Proc. 3rd Information Hiding Workshop, Dresden, Germany, Lecture Notes in Computer Science
, vol.1768
, pp. 47-60
-
-
Fridrich, J.1
Du, R.2
-
22
-
-
0032682054
-
Spread spectrum image steganography
-
L. M. Marvel Jr., C. G. Boncelet, and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. Image Process., 8, 1075-1083 (1999).
-
(1999)
IEEE Trans. Image Process.
, vol.8
, pp. 1075-1083
-
-
Marvel Jr., L.M.1
Boncelet, C.G.2
Retter, C.T.3
-
23
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington, DC, Usenix Assoc.
-
N. Provos, "Defending against statistical steganalysis," in Proc. 10th Usenix Security Symp., Washington, DC, pp. 323-335, Usenix Assoc. (2001).
-
(2001)
Proc. 10th Usenix Security Symp.
, pp. 323-335
-
-
Provos, N.1
-
24
-
-
84937814312
-
F5-a steganographic algorithm: High capacity despite better steganalysis
-
Information Hiding
-
A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," in Proc. 4th Int. Workshop on Information Hiding, Pittsburg, PA, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, Springer-Verlag, Berlin (2001). (Pubitemid 33367674)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 289-302
-
-
Westfeld, A.1
-
26
-
-
84875607015
-
-
Jan. 21
-
http://www.jigzone.com, Jan. 21 (2009).
-
(2009)
-
-
-
27
-
-
84875631957
-
-
Jan. 21
-
http://www.jigsawpuzzles.ws, Jan. 21 (2009).
-
(2009)
-
-
-
28
-
-
84875591876
-
-
Jan. 21
-
http://www.pajersoft.com/winshweb.htm, Jan. 21 (2009).
-
(2009)
-
-
-
29
-
-
84875575817
-
-
Jan. 21
-
http://www.kraisoft.com/puzzle-games/jigsaw, Jan. 21 (2009).
-
(2009)
-
-
-
30
-
-
84875621016
-
-
Jan. 21
-
http://www.spintop-games.com/jigsaw-game-download-jigsaw-landscapes.html , Jan. 21 (2009).
-
(2009)
-
-
-
31
-
-
84875633640
-
-
Jan. 21
-
http://www.spintop-games.com/jigsaw-game-download/jigsaw-nature.html, Jan. 21 (2009).
-
(2009)
-
-
-
32
-
-
84875585324
-
-
Jan. 21
-
Yell, "Picture puzzle," http://www.onlinegameshq.com/game/867/ picture-puzzle.html, Jan. 21 (2009).
-
(2009)
Picture Puzzle
-
-
Yell1
-
33
-
-
34547295064
-
Jigsaw puzzles, edge matching, and polyomino packing: Connections and complexity
-
E. D. Demaine and M. L. Demaine, "Jigsaw puzzles, edge matching, and polyomino packing: Connections and complexity," Graphs and Combinatorics 23, 195-208 (2007).
-
(2007)
Graphs and Combinatorics
, vol.23
, pp. 195-208
-
-
Demaine, E.D.1
Demaine, M.L.2
-
34
-
-
50149084504
-
Solving jigsaw puzzles using image features
-
T. R. Nielsen, P. Drewsen, and K. Hansen, "Solving jigsaw puzzles using image features," Pattern Recogn. Lett., 14(29), 1923-1933 (2008).
-
(2008)
Pattern Recogn. Lett.
, vol.14
, Issue.29
, pp. 1923-1933
-
-
Nielsen, T.R.1
Drewsen, P.2
Hansen, K.3
-
35
-
-
78651290047
-
A puzzle solver and its application in speech descrambling
-
Gold Coast, Australia, World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, WI
-
Y. X. Zhao, M. C. Su, Z. L. Chou, and J. Lee, "A puzzle solver and its application in speech descrambling," in Proc. 2007 WSEAS Int. Conf. Computer Engineering and Applications, Gold Coast, Australia, pp. 171-176, World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, WI (2007).
-
(2007)
Proc. 2007 WSEAS Int. Conf. Computer Engineering and Applications
, pp. 171-176
-
-
Zhao, Y.X.1
Su, M.C.2
Chou, Z.L.3
Lee, J.4
-
36
-
-
31144464783
-
Automated reassembly of fragmented images
-
A. Pal, K. Shanmugasundaram, and N. Memon, "Automated reassembly of fragmented images," IEEE Trans. Image Process., 15(2), 385-393 (2003).
-
(2003)
IEEE Trans. Image Process.
, vol.15
, Issue.2
, pp. 385-393
-
-
Pal, A.1
Shanmugasundaram, K.2
Memon, N.3
|