-
1
-
-
78149259499
-
-
July
-
P. Bas and T. Furon. BOWS-2. http://bows2.gipsa-lab.inpg.fr, July 2007.
-
(2007)
-
-
Bas, P.1
Furon, T.2
-
2
-
-
49949092593
-
MPSteg-color: A new steganographic technique for color images
-
Information Hiding, 9th International Workshop, Saint Malo, France, June 11-13
-
G. Cancelli and M. Barni. MPSteg-color: A new steganographic technique for color images. In Information Hiding, 9th International Workshop, volume 4567 of Lect. Notes in Computer Sc., pages 1-15, Saint Malo, France, June 11-13, 2007.
-
(2007)
Lect. Notes in Computer Sc.
, vol.4567
, pp. 1-15
-
-
Cancelli, G.1
Barni, M.2
-
4
-
-
0030539336
-
Markov chain Monte Carlo convergence diagnostics: A comparative review
-
June
-
M. K. Cowles and B. P. Carlin. Markov chain Monte Carlo convergence diagnostics: A comparative review. Journal of the American Statistical Association, 91(434):883-904, June 1996.
-
(1996)
Journal of the American Statistical Association
, vol.91
, Issue.434
, pp. 883-904
-
-
Cowles, M.K.1
Carlin, B.P.2
-
7
-
-
77951871502
-
Minimizing embedding impact in steganography using trellis-coded quantization
-
San Jose, CA, January 17-21
-
T. Filler, J. Judas, and J. Fridrich. Minimizing embedding impact in steganography using trellis-coded quantization. In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, volume 7541, pages 05-01-05-14, San Jose, CA, January 17-21, 2010.
-
(2010)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII
, vol.7541
, pp. 501-514
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
8
-
-
70350562893
-
The Square Root Law of steganographic capacity for Markov covers
-
San Jose, CA, January 18-21
-
T. Filler, A. D. Ker, and J. Fridrich. The Square Root Law of steganographic capacity for Markov covers. In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 08 1-08 11, San Jose, CA, January 18-21, 2009.
-
(2009)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI
, vol.7254
, pp. 081-0811
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
9
-
-
21844452710
-
Writing on wet paper
-
San Jose, CA, January 16-20
-
J. Fridrich, M. Goljan, D. Soukal, and P. Lisoněk. Writing on wet paper. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 328-340, San Jose, CA, January 16-20, 2005.
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 328-340
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
Lisoněk, P.4
-
10
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
Dallas, TX, September 20-21
-
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
11
-
-
0021518209
-
Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images
-
November
-
S. Geman and D. Geman. Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 6(6):721-741, November 1984.
-
(1984)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.6
, Issue.6
, pp. 721-741
-
-
Geman, S.1
Geman, D.2
-
12
-
-
33645695370
-
A graph-theoretic approach to steganography
-
Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21
-
S. Hetzl and P. Mutzel. A graph-theoretic approach to steganography. In Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, volume 3677 of Lect. Notes in Computer Sc., pages 119-128, Salzburg, Austria, September 19-21, 2005.
-
(2005)
Lect. Notes in Computer Sc.
, vol.3677
, pp. 119-128
-
-
Hetzl, S.1
Mutzel, P.2
-
13
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
June
-
A. D. Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6):441-444, June 2005.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
14
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
Information Hiding, 8th Intern. Workshop, Alexandria, VA, July 10-12
-
A. D. Ker. Batch steganography and pooled steganalysis. In Information Hiding, 8th Intern. Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 265-281, Alexandria, VA, July 10-12, 2006.
-
(2006)
Lect. Notes in Computer Sc.
, vol.4437
, pp. 265-281
-
-
Ker, A.D.1
-
15
-
-
56749160546
-
The Square Root Law of steganographic capacity
-
Oxford, UK, September 22-23
-
A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich. The Square Root Law of steganographic capacity. In Proceedings of the 10th ACM Multimedia & Security Workshop, pages 107-116, Oxford, UK, September 22-23, 2008.
-
(2008)
Proceedings of the 10th ACM Multimedia & Security Workshop
, pp. 107-116
-
-
Ker, A.D.1
Pevný, T.2
Kodovský, J.3
Fridrich, J.4
-
16
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Information Hiding, 8th Intern. Workshop, Alexandria, VA, July 10-12
-
Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In Information Hiding, 8th Intern. Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 314-327, Alexandria, VA, July 10-12, 2006.
-
(2006)
Lect. Notes in Computer Sc.
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
17
-
-
56749154804
-
On completeness of feature spaces in blind steganalysis
-
Oxford, UK, September 22-23
-
J. Kodovský and J. Fridrich. On completeness of feature spaces in blind steganalysis. In Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123-132, Oxford, UK, September 22-23, 2008.
-
(2008)
Proceedings of the 10th ACM Multimedia & Security Workshop
, pp. 123-132
-
-
Kodovský, J.1
Fridrich, J.2
-
18
-
-
77951862698
-
Modern steganalysis can detect YASS
-
San Jose, CA, January 17-21
-
J. Kodovský, T. Pevný, and J. Fridrich. Modern steganalysis can detect YASS. In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, volume 7541, pages 02-01-02-11, San Jose, CA, January 17-21, 2010.
-
(2010)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII
, vol.7541
, pp. 201-211
-
-
Kodovský, J.1
Pevný, T.2
Fridrich, J.3
-
20
-
-
70449644855
-
Steganalysis by subtractive pixel adjacency matrix
-
Princeton, NJ, September 7-8
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. In Proceedings of the 11th ACM Multimedia & Security Workshop, pages 75-84, Princeton, NJ, September 7-8, 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 75-84
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
21
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Information Hiding, 12th International Conference, Calgary, Alberta, Canada, June 28-30. Springer-Verlag, New York
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, 12th International Conference, Lect. Notes in Computer Sc., Calgary, Alberta, Canada, June 28-30, 2010. Springer-Verlag, New York.
-
(2010)
Lect. Notes in Computer Sc.
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
22
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
San Jose, CA, January 29-February 1
-
T. Pevný and J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1-3 14, San Jose, CA, January 29-February 1, 2007.
-
(2007)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
, pp. 31-314
-
-
Pevný, T.1
Fridrich, J.2
-
24
-
-
70449657749
-
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
-
Princeton, NJ, Sept.
-
V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131-140, Princeton, NJ, Sept. 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 131-140
-
-
Sachnev, V.1
Kim, H.J.2
Zhang, R.3
-
25
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
P. Sallee. Model-based methods for steganography and steganalysis. International Journal of Image Graphics, 5(1):167-190, 2005.
-
(2005)
International Journal of Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
26
-
-
69749094893
-
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - A randomized block based hiding scheme
-
A. Sarkar, L. Nataraj, B. S. Manjunath, and U. Madhow. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme. In Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on, pages 1292-1295, 2008.
-
(2008)
Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on
, pp. 1292-1295
-
-
Sarkar, A.1
Nataraj, L.2
Manjunath, B.S.3
Madhow, U.4
-
27
-
-
34547514532
-
Secure steganography: Statistical restoration of the second order dependencies for improved security
-
April 15-20
-
A. Sarkar, K. Solanki, U. Madhow, and B. S. Manjunath. Secure steganography: Statistical restoration of the second order dependencies for improved security. In Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE Intern. Conf. on, volume 2, pages II-277-II-280, April 15-20, 2007.
-
(2007)
Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE Intern. Conf. on
, vol.2
-
-
Sarkar, A.1
Solanki, K.2
Madhow, U.3
Manjunath, B.S.4
-
28
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
Information Hiding, 8th Intern. Workshop, Alexandria, VA, July 10-12
-
Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In Information Hiding, 8th Intern. Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 249-264, Alexandria, VA, July 10-12, 2006.
-
(2006)
Lect. Notes in Computer Sc.
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
29
-
-
78649828992
-
Provably secure steganography: Achieving zero K-L divergence using statistical restoration
-
October 8-11
-
K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Provably secure steganography: Achieving zero K-L divergence using statistical restoration. In Image Processing, 2006 IEEE International Conference on, pages 125-128, October 8-11, 2006.
-
(2006)
Image Processing, 2006 IEEE International Conference on
, pp. 125-128
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
30
-
-
21844461602
-
Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 16-20
-
D. Soukal, J. Fridrich, and M. Goljan. Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 595-606, San Jose, CA, January 16-20, 2005.
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 595-606
-
-
Soukal, D.1
Fridrich, J.2
Goljan, M.3
-
31
-
-
78149275991
-
Erasure entropy
-
S. Verdú and T. Weissman. Erasure entropy. In Proc. of ISIT, Seattle, WA, July 9-14, 2006.
-
Proc. of ISIT, Seattle, WA, July 9-14, 2006
-
-
Verdú, S.1
Weissman, T.2
-
32
-
-
55349119524
-
The information lost in erasures
-
November
-
S. Verdú and T. Weissman. The information lost in erasures. IEEE Trans. on Information Theory, 54(11):5030-5058, November 2008.
-
(2008)
IEEE Trans. on Information Theory
, vol.54
, Issue.11
, pp. 5030-5058
-
-
Verdú, S.1
Weissman, T.2
-
33
-
-
39749147672
-
Determining the density of states for classical statistical models: A random walk algorithm to produce a flat histogram
-
arXiv:cond-mat/0107006v1
-
F. Wang and D. P. Landau. Determining the density of states for classical statistical models: A random walk algorithm to produce a flat histogram. Phys. Rev. E, 64(5):056101, 2001. arXiv:cond-mat/0107006v1.
-
(2001)
Phys. Rev. E
, vol.64
, Issue.5
, pp. 056101
-
-
Wang, F.1
Landau, D.P.2
|