-
1
-
-
49949091527
-
Yass: Yet another steganographic scheme that resists blind steganalysis
-
K. Solanki, A. Sarkar, and B. S. Manjunath, "Yass: Yet another steganographic scheme that resists blind steganalysis," in Proc. 9th International Workshop on Information Hiding, 11-13, 2007, pp. 16-31.
-
(2007)
Proc. 9th International Workshop on Information Hiding
, vol.11-13
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
2
-
-
56749160543
-
Steganalysis of yass
-
B. Li, Y. Q. Shi, and J. Huang, "Steganalysis of yass," in Proc. 10th ACM workshop on Multimedia and security, 22-23, 2008, pp. 139-148.
-
(2008)
Proc. 10th ACM Workshop on Multimedia and Security
, vol.22-23
, pp. 139-148
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
3
-
-
0005105932
-
F5-a steganographic algorithm
-
Pittsburgh, PA, USA, 25-27
-
A. Westfeld, "F5-a steganographic algorithm," in Proc. 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, 25-27, 2001, pp. 289-302.
-
(2001)
Proc. 4th International Workshop on Information Hiding
, pp. 289-302
-
-
Westfeld, A.1
-
4
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington DC, USA
-
N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX Security Symposium,Washington DC, USA, 2001, pp. 323-335.
-
(2001)
Proc. 10th USENIX Security Symposium
, pp. 323-335
-
-
Provos, N.1
-
5
-
-
35048819204
-
Model-based steganography
-
Seoul, Korea
-
P. Sallee, "Model-based steganography," in Proc. 2nd International Workshop on Digital Watermarking, Seoul, Korea, 20-22, 2003, pp. 154-167.
-
(2003)
Proc. 2nd International Workshop on Digital Watermarking
, vol.20-22
, pp. 154-167
-
-
Sallee, P.1
-
6
-
-
35248884299
-
Steganalysis of jpeg images: Breaking the f5 algorithm
-
Noordwijkerhout, The Netherlands
-
J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of jpeg images: Breaking the f5 algorithm," in Proc. 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 7-9, 2002, pp. 310-323.
-
(2002)
Proc. 5th International Workshop on Information Hiding
, vol.7-9
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
7
-
-
2642549992
-
Attacking the outguess
-
Juan-les-Pins, France
-
J. Fridrich, M. Goljan, and D. Hogea, "Attacking the outguess," in Proc. 4th ACM workshop on Multimedia and security, Juan-les-Pins, France, 2002, pp. 3-6.
-
(2002)
Proc. 4th ACM Workshop on Multimedia and Security
, pp. 3-6
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
8
-
-
33749598442
-
Breaking cauchy modelbased jpeg steganography with first order statistics
-
Sophia Antipolis, French Riviera, France
-
R. Bohme and A. Westfeld, "Breaking cauchy modelbased jpeg steganography with first order statistics," in Proc. 9th European Symposium on Research in Computer Security, Sophia Antipolis, French Riviera, France, 2004, pp. 125-140.
-
(2004)
Proc. 9th European Symposium on Research in Computer Security
, pp. 125-140
-
-
Bohme, R.1
Westfeld, A.2
-
9
-
-
20444372785
-
Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes
-
Toronto, Canada, May
-
J. Fridrich, "Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes," in Proc. 6th International Workshop on Information Hiding, Toronto, Canada, May23-25, 2004.
-
(2004)
Proc. 6th International Workshop on Information Hiding
, pp. 23-25
-
-
Fridrich, J.1
-
10
-
-
38049166461
-
A markov process based approach to effective attacking jpeg steganography
-
Alexandria, VA, USA
-
Y. Q. Shi, Chunhua Chen, andWen Chen, "A markov process based approach to effective attacking jpeg steganography," in Proc. 8th International Workshop on Information Hiding, Alexandria, VA, USA, 10-12, 2006, pp. 249-264.
-
(2006)
Proc. 8th International Workshop on Information Hiding
, vol.10-12
, pp. 249-264
-
-
Shi, Y.Q.1
Chen Andwen Chen, C.2
-
12
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," in IEEE Trans. Inform. Theory, May 2001, vol. 47, pp. 1423-1443. (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
13
-
-
42949166748
-
Further study on yass: Steganography based on randomized embedding to resist blind steganalysis
-
San Jose, California, USA
-
A. Sarkar, K. Solanki, and B. S. Manjunath, "Further study on yass: steganography based on randomized embedding to resist blind steganalysis," in Proc. SPIE,Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, California, USA, 2008, vol. 6819, pp. 681917-681917-11.
-
(2008)
Proc. SPIE,Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 681917-68191711
-
-
Sarkar, A.1
Solanki, K.2
Manjunath, B.S.3
-
15
-
-
0001585514
-
Coding theorems for turbo-like codes
-
R.J. McEliece D. Divsalar, H. Jin, "Coding theorems for turbo-like codes," in Proc. 36th Allerton Conference on Communications, Control, and Computing, 1998, pp. 201-210.
-
(1998)
Proc. 36th Allerton Conference on Communications, Control, and Computing
, pp. 201-210
-
-
McEliece, R.J.1
Divsalar, D.2
Jin, H.3
|