-
1
-
-
78649422691
-
-
Jul, Online. Available
-
P. Bas and T. Furon, BOWS-2 Jul. 2007 [Online]. Available: http://bows2.gipsa-lab.inpg.fr
-
(2007)
BOWS-2
-
-
Bas, P.1
Furon, T.2
-
2
-
-
33749598442
-
Breaking Cauchy model-based JPEG steganography with first order statistics
-
P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, Eds., Sophia Antipolis, France, Sep. 13-15, Lecture Notes in Computer Science, Springer, Berlin
-
R. Böhme and A. Westfeld, "Breaking Cauchy model-based JPEG steganography with first order statistics", in Proc. 9th Eur. Symp. Research in Computer Security (ESORICS 2004), P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, Eds., Sophia Antipolis, France, Sep. 13-15, 2004, vol. 3193, Lecture Notes in Computer Science, pp. 125-140, Springer, Berlin.
-
(2004)
Proc. 9th Eur. Symp. Research in Computer Security (ESORICS 2004)
, vol.3193
, pp. 125-140
-
-
Böhme, R.1
Westfeld, A.2
-
3
-
-
49949092593
-
MPSteg-color: A new steganographic technique for color images
-
T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
G. Cancelli and M. Barni, "MPSteg-color: A new steganographic technique for color images", in Proc. 9th Int. Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 1-15, Springer-Verlag, Berlin.
-
(2007)
Proc. 9th Int. Workshop Information Hiding
, vol.4567
, pp. 1-15
-
-
Cancelli, G.1
Barni, M.2
-
5
-
-
0030539336
-
Markov chain Monte Carlo convergence diagnostics: A comparative review
-
Jun
-
M. K. Cowles and B. P. Carlin, "Markov chain Monte Carlo convergence diagnostics: A comparative review", J. Amer. Statist. Assoc., vol. 91, no. 434, pp. 883-904, Jun. 1996.
-
(1996)
J. Amer. Statist. Assoc.
, vol.91
, Issue.434
, pp. 883-904
-
-
Cowles, M.K.1
Carlin, B.P.2
-
6
-
-
14844285173
-
Some notes on steganography
-
Online. Available
-
R. Crandall, "Some notes on steganography", Steganography Mailing List 1998 [Online]. Available: http://os.inf.tu-dresden. de/~westfeld/crandall.pdf
-
(1998)
Steganography Mailing List
-
-
Crandall, R.1
-
7
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
to be published
-
T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes", IEEE Trans. Inf. Forensics Security, to be published.
-
IEEE Trans. Inf. Forensics Security
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
8
-
-
77951871502
-
Minimizing embedding impact in steganography using trellis-coded quantization
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21
-
T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization", in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21, 2010, vol. 7541, pp. 05-01-05-14.
-
(2010)
Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XII
, vol.7541
, pp. 0501-0514
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
10
-
-
34548216307
-
Practical methods for minimizing embedding impact in steganography
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1
-
J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography", in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1 2007, vol. 6505, pp. 02-03.
-
(2007)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
, pp. 02-03
-
-
Fridrich, J.1
Filler, T.2
-
11
-
-
30744445178
-
Perturbed quantization steganography
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography", ACM Multimedia Syst. J., vol. 11, no. 2, pp. 98-107, 2005.
-
(2005)
ACM Multimedia Syst. J.
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
12
-
-
21844452710
-
Writing on wet paper
-
DOI 10.1117/12.583160, 33, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
-
J. Fridrich, M. Goljan, D. Soukal, and P. Lisoněk, "Writing on wet paper", in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-20, 2005, vol. 5681, pp. 328-340. (Pubitemid 40952993)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5681
, pp. 328-340
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
13
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities", in Proc. 9th ACM Multimedia & Security Workshop, J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21, 2007, pp. 3-14.
-
(2007)
Proc. 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
14
-
-
0021518209
-
Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images
-
Nov
-
S. Geman and D. Geman, "Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images", IEEE Trans. Pattern Anal. Mach. Intell., vol. 6, no. 6, pp. 721-741, Nov. 1984.
-
(1984)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.6
, Issue.6
, pp. 721-741
-
-
Geman, S.1
Geman, D.2
-
15
-
-
33645695370
-
A graph-theoretic approachto steganography
-
J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., Salzburg, Austria, Sep. 19-21, Lecture Notes in Computer Science
-
S. Hetzl and P. Mutzel, "A graph-theoretic approachto steganography", in Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security (CMS 2005), J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., Salzburg, Austria, Sep. 19-21, 2005, vol. 3677, Lecture Notes in Computer Science, pp. 119-128.
-
(2005)
Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security (CMS 2005)
, vol.3677
, pp. 119-128
-
-
Hetzl, S.1
Mutzel, P.2
-
16
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Jun
-
A. D. Ker, "Steganalysis of LSB matching in grayscale images", IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, Jun. 2005.
-
(2005)
IEEE Signal Process. Lett.
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
17
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer-Verlag, New York
-
A. D. Ker, "Batch steganography and pooled steganalysis", in Proc. 8th Int. Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 265-281, Springer-Verlag, New York.
-
(2006)
Proc. 8th Int. Workshop Information Hiding
, vol.4437
, pp. 265-281
-
-
Ker, A.D.1
-
18
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer-Verlag, New York
-
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography", in Proc. 8th Int. Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 314-327, Springer-Verlag, New York.
-
(2006)
Proc. 8th Int. Workshop Information Hiding
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
19
-
-
56749154804
-
On completeness of feature spaces in blind steganalysis
-
A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U. K., Sep. 22-23
-
J. Kodovský and J. Fridrich, "On completeness of feature spaces in blind steganalysis", in Proc. 10th ACM Multimedia & Security Workshop, A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U. K., Sep. 22-23, 2008, pp. 123-132.
-
(2008)
Proc. 10th ACM Multimedia & Security Workshop
, pp. 123-132
-
-
Kodovský, J.1
Fridrich, J.2
-
20
-
-
77951862698
-
Modern steganalysis can detect YASS
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21
-
J. Kodovský, T. Pevný, and J. Fridrich, "Modern steganalysis can detect YASS", in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21, 2010, vol. 7541, pp. 02-01-02-11.
-
(2010)
Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XII
, vol.7541
, pp. 0201-0211
-
-
Kodovský, J.1
Pevný, T.2
Fridrich, J.3
-
22
-
-
70449644855
-
Steganalysis by subtractive pixel adjacency matrix
-
J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix", in Proc. 11th ACM Multimedia & Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 75-84.
-
(2009)
Proc. 11th ACM Multimedia & Security Workshop
, pp. 75-84
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
23
-
-
78649409548
-
Using high-dimensional image models to perform highly undetectable steganography
-
R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, Jun. 28-30, Lecture Notes in Computer Science, Springer-Verlag, New York
-
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography", in Proc. 12th Int. Workshop Information Hiding, R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, Jun. 28-30, 2010, Lecture Notes in Computer Science, Springer-Verlag, New York.
-
(2010)
Proc. 12th Int. Workshop Information Hiding
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
24
-
-
34548232251
-
Merging Markov and DCT features for multiclass JPEG steganalysis
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1
-
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multiclass JPEG steganalysis", in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1 2007, vol. 6505, pp. 3 1-3 14.
-
(2007)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
, pp. 31-314
-
-
Pevný, T.1
Fridrich, J.2
-
25
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington, DC, Aug. 13-17
-
N. Provos, "Defending against statistical steganalysis", in Proc. 10th USENIX Security Symp., Washington, DC, Aug. 13-17, 2001, pp. 323-335.
-
(2001)
Proc. 10th USENIX Security Symp.
, pp. 323-335
-
-
Provos, N.1
-
26
-
-
60449120149
-
Fields of experts
-
Jan
-
S. Roth and M. J. Black, "Fields of experts", Int. J. Comput. Vision, vol. 82, no. 2, pp. 205-229, Jan. 2009.
-
(2009)
Int. J. Comput. Vision
, vol.82
, Issue.2
, pp. 205-229
-
-
Roth, S.1
Black, M.J.2
-
27
-
-
70449657749
-
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
-
J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
-
V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding", in Proc. 11th ACM Multimedia & Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 131-140.
-
(2009)
Proc. 11th ACM Multimedia & Security Workshop
, pp. 131-140
-
-
Sachnev, V.1
Kim, H.J.2
Zhang, R.3
-
28
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
P. Sallee, "Model-based methods for steganography and steganalysis", Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
29
-
-
69749094893
-
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme
-
San Diego, CA, Oct. 12-15
-
A. Sarkar, L. Nataraj, B. S. Manjunath, and U. Madhow, "Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-A randomized block based hiding scheme", in Proc. IEEE, Int. Conf. Image Processing (ICIP 2008), San Diego, CA, Oct. 12-15, 2008, pp. 1292-1295.
-
(2008)
Proc. IEEE, Int. Conf. Image Processing (ICIP 2008)
, pp. 1292-1295
-
-
Sarkar, A.1
Nataraj, L.2
Manjunath, B.S.3
Madhow, U.4
-
30
-
-
34547514532
-
Secure steganography: Statistical restoration of the second order dependencies for improved security
-
Apr. 15-20
-
A. Sarkar, K. Solanki, U. Madhow, and B. S. Manjunath, "Secure steganography: Statistical restoration of the second order dependencies for improved security", in Proc. IEEE, Int. Conf. Acoustics, Speech, and Signal Processing, Apr. 15-20, 2007, vol. 2, pp. II-277-II-280.
-
(2007)
Proc. IEEE, Int. Conf. Acoustics, Speech, and Signal Processing
, vol.2
-
-
Sarkar, A.1
Solanki, K.2
Madhow, U.3
Manjunath, B.S.4
-
31
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer-Verlag, New York
-
Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography", in Proc. 8th Int. Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 249-264, Springer-Verlag, New York.
-
(2006)
Proc. 8th Int. Workshop Information Hiding
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
32
-
-
49949091527
-
YASS: Yet another steganographic scheme that resists blind steganalysis
-
T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer-Verlag, New York
-
K. Solanki, A. Sarkar, and B. S. Manjunath, "YASS: Yet another steganographic scheme that resists blind steganalysis", in Proc. 9th Int. Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 16-31, Springer-Verlag, New York.
-
(2007)
Proc. 9th Int. Workshop Information Hiding
, vol.4567
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
33
-
-
78649828992
-
Provably secure steganography: Achieving zero K-L divergence using statistical restoration
-
Atlanta, GA, Oct. 8-11
-
K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Provably secure steganography: Achieving zero K-L divergence using statistical restoration", in Proc. IEEE, Int. Conf. Image Processing (ICIP 2006), Atlanta, GA, Oct. 8-11, 2006, pp. 125-128.
-
(2006)
Proc. IEEE, Int. Conf. Image Processing (ICIP 2006)
, pp. 125-128
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
34
-
-
78649417993
-
Erasure entropy
-
Seattle, WA, Jul. 9-14
-
S. Verdú and T. Weissman, "Erasure entropy", in Proc. ISIT, Seattle, WA, Jul. 9-14, 2006.
-
(2006)
Proc. ISIT
-
-
Verdú, S.1
Weissman, T.2
-
35
-
-
55349119524
-
The information lost in erasures
-
Nov
-
S. Verdú and T. Weissman, "The information lost in erasures", IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5030-5058, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5030-5058
-
-
Verdú, S.1
Weissman, T.2
-
36
-
-
39749147672
-
Determining the density of states for classical statistical models: A random walk algorithm to produce a flat histogram
-
arXiv:cond-mat/0107006v1
-
F. Wang and D. P. Landau, "Determining the density of states for classical statistical models: A random walk algorithm to produce a flat histogram", Phys. Rev. E, vol. 64, no. 5, p. 056101, 2001, arXiv:cond-mat/0107006v1.
-
(2001)
Phys. Rev. E
, vol.64
, Issue.5
, pp. 056101
-
-
Wang, F.1
Landau, D.P.2
-
37
-
-
35048813035
-
Exploiting preserved statistics for steganalysis
-
J. Fridrich, Ed., Toronto, Canada, May 23-25, Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
A. Westfeld and R. Böhme, "Exploiting preserved statistics for steganalysis", in Proc. 6th Int. Workshop Information Hiding, J. Fridrich, Ed., Toronto, Canada, May 23-25, 2004, vol. 3200, Lecture Notes in Computer Science, pp. 82-96, Springer-Verlag, Berlin.
-
(2004)
Proc. 6th Int. Workshop Information Hiding
, vol.3200
, pp. 82-96
-
-
Westfeld, A.1
Böhme, R.2
-
39
-
-
34247247816
-
Efficient double-layered steganographic embedding
-
Apr
-
X. Zhang, W. Zhang, and S. Wang, "Efficient double-layered steganographic embedding", Electron. Lett., vol. 43, pp. 482-483, Apr. 2007.
-
(2007)
Electron. Lett.
, vol.43
, pp. 482-483
-
-
Zhang, X.1
Zhang, W.2
Wang, S.3
|