-
1
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
[Proc. 5th Information Hiding Workshop], Springer
-
Farid, H. and Lyu, S., "Detecting hidden messages using higher-order statistics and support vector machines," in [Proc. 5th Information Hiding Workshop], Springer LNCS 2578, 340-354 (2002).
-
(2002)
LNCS
, vol.2578
, pp. 340-354
-
-
Farid, H.1
Lyu, S.2
-
2
-
-
33645676686
-
New blind steganalysis and its implications
-
Security, Steganography and Watermarking of Multimedia Contents VIII
-
Goljan, M., Fridrich, J., and Holotyak, T., "New blind steganalysis and its implications," in [Security, Steganography and Watermarking of Multimedia Contents VIII], Proc. SPIE 6072, 0101-0113 (2006).
-
(2006)
Proc. SPIE
, vol.6072
, pp. 101-113
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
3
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
[Proc. 8th Information Hiding Workshop], Springer
-
Shi, Y., Chen, C., and Chen, W., "A Markov process based approach to effective attacking JPEG steganography," in [Proc. 8th Information Hiding Workshop], Springer LNCS 4437, 249-264 (2006).
-
(2006)
LNCS
, vol.4437
, pp. 249-264
-
-
Shi, Y.1
Chen, C.2
Chen, W.3
-
4
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
Security, Steganography and Watermarking of Multimedia Contents IX
-
Pevný, T. and Fridrich, J., "Merging Markov and DCT features for multi-class JPEG steganalysis," in [Security, Steganography and Watermarking of Multimedia Contents IX], Proc. SPIE 6505, 0301-0314 (2007).
-
(2007)
Proc. SPIE
, vol.6505
, pp. 301-314
-
-
Pevný, T.1
Fridrich, J.2
-
5
-
-
77951862698
-
Modern steganalysis can detect YASS
-
Media Forensics and Security XII
-
Kodovsky, J., Pevný, T., and Fridrich, J., "Modern steganalysis can detect YASS," in [Media Forensics and Security XII], Proc. SPIE 7541, 0201-0211 (2010).
-
(2010)
Proc. SPIE
, vol.7541
, pp. 201-211
-
-
Kodovsky, J.1
Pevný, T.2
Fridrich, J.3
-
6
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Pevný, T., Bas, P., and Fridrich, J., "Steganalysis by subtractive pixel adjacency matrix," IEEE Transactions on Information Forensics and Security 5(2), 215-224 (2010).
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
7
-
-
14844285173
-
Some notes on steganography
-
available from
-
Crandall, R., "Some notes on steganography," (1998). Steganography Mailing List, available from http://os.inf.tu-dresden.de/ ~westfeld/crandall.pdf.
-
(1998)
Steganography Mailing List
-
-
Crandall, R.1
-
8
-
-
38049181797
-
On steganographic embedding efficiency
-
[Proc. 8th Information Hiding Workshop], Springer
-
Fridrich, J., Lisoněk, P., and Soukal, D., "On steganographic embedding efficiency," in [Proc. 8th Information Hiding Workshop], Springer LNCS 4437, 282-296 (2006).
-
(2006)
LNCS
, vol.4437
, pp. 282-296
-
-
Fridrich, J.1
Lisoněk, P.2
Soukal, D.3
-
9
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
[Proc. 8th Information Hiding Workshop], Springer
-
Kim, Y., Duric, Z., and Richards, D., "Modified matrix encoding technique for minimal distortion steganography," in [Proc. 8th Information Hiding Workshop], Springer LNCS 4437, 314-327 (2006).
-
(2006)
LNCS
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
10
-
-
77951871502
-
Minimizing embedding impact in steganography using trellis-coded quantization
-
Media Forensics and Security XII
-
Filler, T., Judas, J., and Fridrich, J., "Minimizing embedding impact in steganography using trellis-coded quantization," in [Media Forensics and Security XII], Proc. SPIE 7541, 0501-0514 (2010).
-
(2010)
Proc. SPIE
, vol.7541
, pp. 501-514
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
11
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
[Proc. 12th Information Hiding Workshop], Springer
-
Pevný, T., Filler, T., and Bas, P., "Using high-dimensional image models to perform highly undetectable steganography," in [Proc. 12th Information Hiding Workshop], Springer LNCS 6387, 161-177 (2010).
-
(2010)
LNCS
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
13
-
-
0002975203
-
On the generalised distance in statistics
-
Mahalanobis, P., "On the generalised distance in statistics," in [Proceedings National Institute of Science, India], 2(1), 49-55 (1936).
-
(1936)
Proceedings National Institute of Science, India
, vol.2
, Issue.1
, pp. 49-55
-
-
Mahalanobis, P.1
-
14
-
-
77955372544
-
Evaluation of distance measures for multi-class classification in binary SVM decision tree
-
Artificial Intelligence and Soft Computing, Springer
-
Madzarov, G. and Gjorgjevikj, D., "Evaluation of distance measures for multi-class classification in binary SVM decision tree," in [Artificial Intelligence and Soft Computing], Springer LNCS 6113, 437-444 (2010).
-
(2010)
LNCS
, vol.6113
, pp. 437-444
-
-
Madzarov, G.1
Gjorgjevikj, D.2
-
16
-
-
26444479778
-
Optimization by simulated annealing
-
Kirkpatrick, S., Gelatt, C., and Vecchi, M., "Optimization by simulated annealing," Science 220(4598), 671-680 (1983).
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt, C.2
Vecchi, M.3
-
18
-
-
0030493826
-
A reflective newton method for minimizing a quadratic function subject to bounds on some of the variables
-
Coleman, T. and Li, Y., "A reflective newton method for minimizing a quadratic function subject to bounds on some of the variables," SIAM Journal on Optimization 6(4), 1040-1058 (1996).
-
(1996)
SIAM Journal on Optimization
, vol.6
, Issue.4
, pp. 1040-1058
-
-
Coleman, T.1
Li, Y.2
-
20
-
-
70350499655
-
Feature reduction and payload location with WAM steganalysis
-
Media Forensics and Security XI
-
Ker, A. and Lubenko, I., "Feature reduction and payload location with WAM steganalysis," in [Media Forensics and Security XI], Proc. SPIE 7254, 0801-0811 (2009).
-
(2009)
Proc. SPIE
, vol.7254
, pp. 801-811
-
-
Ker, A.1
Lubenko, I.2
-
22
-
-
0019342691
-
Randomised algorithms
-
Welsh, D., "Randomised algorithms," Discrete Applied Mathematics 5(1), 133-145 (1983).
-
(1983)
Discrete Applied Mathematics
, vol.5
, Issue.1
, pp. 133-145
-
-
Welsh, D.1
|