-
1
-
-
33749589438
-
Statistical restoration for robust and secure steganography
-
K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Statistical restoration for robust and secure steganography," in Proceedings of ICIP, Genoa, Italy, Sept. 2005.
-
Proceedings of ICIP, Genoa, Italy, Sept. 2005
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
2
-
-
84957868624
-
An information theoretic model for steganography
-
C. Cachin, "An information theoretic model for steganography," LNCS: 2nd Int'l Workshop on Information Hiding, vol. 1525, pp. 306-318, 1998.
-
(1998)
LNCS: 2nd Int'l Workshop on Information Hiding
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
3
-
-
34547528640
-
Determining achievable rates for secure, zero divergence, steganography
-
K. Sullivan, K. Solanki, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, "Determining achievable rates for secure, zero divergence, steganography," in Proceedings of ICIP, Atlanta, GA, USA, Oct. 2006.
-
Proceedings of ICIP, Atlanta, GA, USA, Oct. 2006
-
-
Sullivan, K.1
Solanki, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.S.5
-
5
-
-
0036029074
-
A communications approach to image steganography
-
J. J. Eggers, R. Bauml, and B. Girod, "A communications approach to image steganography," in Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, CA, Jan. 2002.
-
Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, CA, Jan. 2002
-
-
Eggers, J.J.1
Bauml, R.2
Girod, B.3
-
7
-
-
0036030779
-
Applied public-key steganography
-
P. Guillon, T. Furon, and P. Duhamel, "Applied public-key steganography," in Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, CA, Jan. 2002.
-
Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IV, San Jose, CA, Jan. 2002
-
-
Guillon, P.1
Furon, T.2
Duhamel, P.3
-
8
-
-
20444456703
-
A stochastic QIM algorithm for robust, undetectable image watermarking
-
P. Moulin and A. Briassouli, "A stochastic QIM algorithm for robust, undetectable image watermarking," in Proceedings of ICIP, Singapore, Oct. 2004.
-
Proceedings of ICIP, Singapore, Oct. 2004
-
-
Moulin, P.1
Briassouli, A.2
-
9
-
-
0242408734
-
Digital image steganography using stochastic modulation
-
J. Fridrich and M. Goljan, "Digital image steganography using stochastic modulation," in Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IV, Santa Clara, CA, USA, Jan. 2002, pp. 191-202.
-
Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents IV, Santa Clara, CA, USA, Jan. 2002
, pp. 191-202
-
-
Fridrich, J.1
Goljan, M.2
-
10
-
-
78649848496
-
Writing on wet paper
-
J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on wet paper," in ACM workshop on Multimedia and Security, Magdeburg, Germany, Sept. 2004.
-
ACM Workshop on Multimedia and Security, Magdeburg, Germany, Sept. 2004
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
11
-
-
35048819204
-
Model-based steganography
-
IWDW 2003, Oct.
-
P. Sallee, "Model-based steganography," in IWDW 2003, LNCS 2939, Oct. 2003, pp. 154-167.
-
(2003)
LNCS
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
12
-
-
33749598442
-
Breaking Cauchy model-based JPEG steganography with first order statistics
-
P. Samarati et al (Eds.): ESORICS 2004
-
R. Bohme and A. Westfeld, "Breaking Cauchy model-based JPEG steganography with first order statistics," P. Samarati et al (Eds.): ESORICS 2004, LNCS 3193, pp. 125-140, 2004.
-
(2004)
LNCS
, vol.3193
, pp. 125-140
-
-
Bohme, R.1
Westfeld, A.2
-
13
-
-
9744279131
-
Robust image-adaptive data hiding based on erasure and error correction
-
Dec.
-
K. Solanki, N. Jacobsen, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, "Robust image-adaptive data hiding based on erasure and error correction," IEEE Trans. on Image Processing, vol. 13, no. 12, pp. 1627-1639, Dec. 2004.
-
(2004)
IEEE Trans. on Image Processing
, vol.13
, Issue.12
, pp. 1627-1639
-
-
Solanki, K.1
Jacobsen, N.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
14
-
-
0018734781
-
On optimal and data-based histograms
-
D. W. Scott, "On optimal and data-based histograms," Biometrika, vol. 66, no. 3, pp. 605-610, 1979.
-
(1979)
Biometrika
, vol.66
, Issue.3
, pp. 605-610
-
-
Scott, D.W.1
-
15
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," in Lecture notes in computer science: 5th Int'l Workshop on Information Hiding, 2002, vol. 2578, pp. 310-323.
-
(2002)
Lecture Notes in Computer Science: 5th Int'l Workshop on Information Hiding
, vol.2578
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
16
-
-
0034313871
-
The earth movers distance as a metric for image retrieval
-
Y. Rubner, C. Tomasi, and L. J. Guibas, "The earth movers distance as a metric for image retrieval," International Journal of Computer Vision, vol. 40, no. 2, pp. 99-121, 2000.
-
(2000)
International Journal of Computer Vision
, vol.40
, Issue.2
, pp. 99-121
-
-
Rubner, Y.1
Tomasi, C.2
Guibas, L.J.3
|