-
1
-
-
1442360452
-
Quantitative steganalysis of digital images: Estimating the secret message length
-
J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, "Quantitative steganalysis of digital images: Estimating the secret message length", ACM Multimedia Syst. J., vol. 9, no. 3, pp. 288-302, 2003.
-
(2003)
ACM Multimedia Syst. J.
, vol.9
, Issue.3
, pp. 288-302
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
2
-
-
71449120465
-
From blind to quantitative steganalysis
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21
-
T. Pevný, J. Fridrich, and A. D. Ker, "From blind to quantitative steganalysis", in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21, 2009, vol. 7254, pp. 0C 1-0C 14.
-
(2009)
Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI
, vol.7254
-
-
Pevný, T.1
Fridrich, J.2
Ker, A.D.3
-
3
-
-
33645678198
-
A two-factor error model for quantitative steganalysis
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19
-
R. Böhme and A. D. Ker, "A two-factor error model for quantitative steganalysis", in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19, 2006, vol. 6072, pp. 59-74.
-
(2006)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 59-74
-
-
Böhme, R.1
Ker, A.D.2
-
4
-
-
78649411583
-
Detection of hidden information, covert channels and information flows
-
J. G. Voeller, Ed. New York: Wiley, Apr. 4
-
N. F. Johnson and P. Sallee, "Detection of hidden information, covert channels and information flows", in Wiley Handbook of Science Technology for Homeland Security, J. G. Voeller, Ed. New York: Wiley, Apr. 4, 2008.
-
(2008)
Wiley Handbook of Science Technology for Homeland Security
-
-
Johnson, N.F.1
Sallee, P.2
-
6
-
-
0001849187
-
Attacks on steganographic systems
-
A. Pfitzmann, Ed., Dresden, Germany, Sep. 29-Oct. 1, Lecture Notes in Computer Science, Springer-Verlag, New York
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems", in Proc. 3rd Int. Workshop Information Hiding, A. Pfitzmann, Ed., Dresden, Germany, Sep. 29-Oct. 1 1999, vol. 1768, Lecture Notes in Computer Science, pp. 61-75, Springer-Verlag, New York.
-
(1999)
Proc. 3rd Int. Workshop Information Hiding
, vol.1768
, pp. 61-75
-
-
Westfeld, A.1
Pfitzmann, A.2
-
7
-
-
0038675417
-
A fast and effective steganalytic technique against Jsteg-like algorithms
-
Melbourne, FL, Mar. 9-12
-
T. Zhang and X. Ping, "A fast and effective steganalytic technique against Jsteg-like algorithms", in Proc. ACM Symp. Applied Computing, Melbourne, FL, Mar. 9-12, 2003, pp. 307-311.
-
(2003)
Proc. ACM Symp. Applied Computing
, pp. 307-311
-
-
Zhang, T.1
Ping, X.2
-
8
-
-
10044282531
-
On estimation of secret message length in JSteg-like steganography
-
F. A. P. Petitcolas, Ed., Cambridge, U. K., Aug. 23-26
-
X. Yu, Y. Wang, and T. Tan, "On estimation of secret message length in JSteg-like steganography", in Proc. 17th Int. Conf. Pattern Recognition, F. A. P. Petitcolas, Ed., Cambridge, U. K., Aug. 23-26, 2004, vol. 4, pp. 673-676.
-
(2004)
Proc. 17th Int. Conf. Pattern Recognition
, vol.4
, pp. 673-676
-
-
Yu, X.1
Wang, Y.2
Tan, T.3
-
9
-
-
38849120767
-
Category attack for LSB embedding of JPEG images
-
Y.-Q. Shi, B. Jeon, Y. Shi, and B. Jeon, Eds., Jeju Island, Korea, Nov. 8-10, Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
K. Lee, A. Westfeld, and S. Lee, "Category attack for LSB embedding of JPEG images", in Proc. 5th Int. Workshop Digital Watermarking, Y.-Q. Shi, B. Jeon, Y. Shi, and B. Jeon, Eds., Jeju Island, Korea, Nov. 8-10, 2006, vol. 4283, Lecture Notes in Computer Science, pp. 35-48, Springer-Verlag, Berlin.
-
(2006)
Proc. 5th Int. Workshop Digital Watermarking
, vol.4283
, pp. 35-48
-
-
Lee, K.1
Westfeld, A.2
Lee, S.3
-
10
-
-
56749107134
-
Weighted stego-image steganalysis for JPEG covers
-
K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science, Springer-Verlag, New York
-
R. Böhme, "Weighted stego-image steganalysis for JPEG covers", in Proc. 10th Int. Workshop Information Hiding, K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, 2007, vol. 5284, Lecture Notes in Computer Science, pp. 178-194, Springer-Verlag, New York.
-
(2007)
Proc. 10th Int. Workshop Information Hiding
, vol.5284
, pp. 178-194
-
-
Böhme, R.1
-
11
-
-
49949111194
-
Generalized category attack-improving histogram-based attack on JPEG LSB embedding
-
T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
K. Lee and A. Westfeld, "Generalized category attack-improving histogram-based attack on JPEG LSB embedding", in Proc. 9th Int. Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 378-392, Springer-Verlag, Berlin.
-
(2007)
Proc. 9th Int. Workshop Information Hiding
, vol.4567
, pp. 378-392
-
-
Lee, K.1
Westfeld, A.2
-
12
-
-
56749177021
-
Generic adoption of spatial steganalysis to transformed domain
-
K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science, Springer-Verlag, New York
-
A. Westfeld, "Generic adoption of spatial steganalysis to transformed domain", in Proc. 10th Int. Workshop Information Hiding, K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, 2007, vol. 5284, Lecture Notes in Computer Science, pp. 161-177, Springer-Verlag, New York.
-
(2007)
Proc. 10th Int. Workshop Information Hiding
, vol.5284
, pp. 161-177
-
-
Westfeld, A.1
-
13
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
DOI 10.1109/93.959097
-
J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images", IEEE Multimedia, Special Issue on Security, vol. 8, no. 4, pp. 22-28, Oct./Dec. 2001. (Pubitemid 33018249)
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
14
-
-
35248901820
-
Detection of LSB steganography via sample pairs analysis
-
F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 7-9, Lecture Notes in Computer Science, Springer-Verlag, New York
-
S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pairs analysis", in Proc. 5th Int. Workshop Information Hiding, F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 7-9, 2002, vol. 2578, Lecture Notes in Computer Science, pp. 355-372, Springer-Verlag, New York.
-
(2002)
Proc. 5th Int. Workshop Information Hiding
, vol.2578
, pp. 355-372
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
15
-
-
0242665592
-
Higher-order statistical steganalysis of palette images
-
E. J. Delp and P. W. Wong, Eds., Santa Clara, CA, Jan. 21-24
-
J. Fridrich, M. Goljan, and D. Soukal, "Higher-order statistical steganalysis of palette images", in Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, E. J. Delp and P. W. Wong, Eds., Santa Clara, CA, Jan. 21-24, 2003, pp. 178-190.
-
(2003)
Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V
, pp. 178-190
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
16
-
-
4744365298
-
Detection of hiding in the least significant bit
-
Oct
-
O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, "Detection of hiding in the least significant bit", IEEE Trans. Signal Process., vol. 52, no. 10, pt. 2, pp. 3046-3058, Oct. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.2-10 PART
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.S.5
-
17
-
-
21844433748
-
ML detection of steganography
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-20
-
M. T. Hogan, N. J. Hurley, G. C. M. Silvestre, F. Balado, and K. M. Whelan, "ML detection of steganography", in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-20, 2005, vol. 5681.
-
(2005)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
-
-
Hogan, M.T.1
Hurley, N.J.2
Silvestre, G.C.M.3
Balado, F.4
Whelan, K.M.5
-
18
-
-
49949117942
-
Afusionofmaximal likelihood and structural steganalysis
-
T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
A. D. Ker, "Afusionofmaximal likelihood and structural steganalysis", in Proc. 9th Int. Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 204-219, Springer-Verlag, Berlin.
-
(2007)
Proc. 9th Int. Workshop Information Hiding
, vol.4567
, pp. 204-219
-
-
Ker, A.D.1
-
19
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
P. Sallee, "Model-based methods for steganography and steganalysis", Int. J. Image Graphics, vol. 5, no. 1, pp. 167-190, 2005.
-
(2005)
Int. J. Image Graphics
, vol.5
, Issue.1
, pp. 167-190
-
-
Sallee, P.1
-
20
-
-
0036450555
-
On steganalysis of random LSB embedding in continuous-tone images
-
Rochester, NY, Sep. 22-25
-
S. Dumitrescu, X. Wu, and N. D. Memon, "On steganalysis of random LSB embedding in continuous-tone images", in Proc. IEEE, Int. Conf. Image Processing (ICIP 2002), Rochester, NY, Sep. 22-25, 2002, pp. 324-339.
-
(2002)
Proc. IEEE, Int. Conf. Image Processing (ICIP 2002)
, pp. 324-339
-
-
Dumitrescu, S.1
Wu, X.2
Memon, N.D.3
-
21
-
-
35048859775
-
An improved sample pairs method for detection of LSB embedding
-
J. Fridrich, Ed., Toronto, Canada, May 23-25, Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
P. Lu, X. Luo, Q. Tang, and L. Shen, "An improved sample pairs method for detection of LSB embedding", in Proc. 6th Int. Workshop Information Hiding, J. Fridrich, Ed., Toronto, Canada, May 23-25, 2004, vol. 3200, Lecture Notes in Computer Science, pp. 116-127, Springer-Verlag, Berlin.
-
(2004)
Proc. 6th Int. Workshop Information Hiding
, vol.3200
, pp. 116-127
-
-
Lu, P.1
Luo, X.2
Tang, Q.3
Shen, L.4
-
22
-
-
33645663780
-
A general framework for structural analysis of LSB replacement
-
M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez- González, Eds., Barcelona, Spain, Jun. 6-8, Lecture Notes in Computer Science, Springer-Verlag, Berlin
-
A. D. Ker, "A general framework for structural analysis of LSB replacement", in Proc. 7th Int. Workshop Information Hiding, M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez-González, Eds., Barcelona, Spain, Jun. 6-8, 2005, vol. 3727, Lecture Notes in Computer Science, pp. 296-311, Springer-Verlag, Berlin.
-
(2005)
Proc. 7th Int. Workshop Information Hiding
, vol.3727
, pp. 296-311
-
-
Ker, A.D.1
-
23
-
-
34548277537
-
Optimally weighted least-squares steganalysis
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1
-
A. D. Ker, "Optimally weighted least-squares steganalysis", in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1 2007, vol. 6505, pp. 6 1-6 16.
-
(2007)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
, pp. 61-616
-
-
Ker, A.D.1
-
24
-
-
34249326204
-
Derivation of error distribution in least squares steganalysis
-
Jun
-
A. D. Ker, "Derivation of error distribution in least squares steganalysis", IEEE Trans. Inf. Forensics Security, vol. 2, no. 2, pp. 140-148, Jun. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.2
, pp. 140-148
-
-
Ker, A.D.1
-
25
-
-
70449646940
-
Calibration revisited
-
J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
-
J. Kodovský and J. Fridrich, "Calibration revisited", in Proc. 11th ACM Multimedia & Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009.
-
(2009)
Proc. 11th ACM Multimedia & Security Workshop
-
-
Kodovský, J.1
Fridrich, J.2
-
26
-
-
70350562893
-
The square root law of steganographic capacity for Markov covers
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21
-
T. Filler, A. D. Ker, and J. Fridrich, "The Square Root Law of steganographic capacity for Markov covers", in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21, 2009, vol. 7254, pp. 08 1-08 11.
-
(2009)
Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI
, vol.7254
, pp. 081-0811
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
28
-
-
51749089283
-
JPEG image steganalysis utilizing both intrablock and interblock correlations
-
May
-
C. Chen and Y. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations", in IEEE Int. Symp. Circuits and Systems, 2008 (ISCAS 2008), May 2008, pp. 3029-3032.
-
(2008)
IEEE Int. Symp. Circuits and Systems, 2008 (ISCAS 2008)
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.2
|