-
1
-
-
0032070303
-
On the limits of steganography
-
R. J. Anderson and Fabien A. P. Petitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 474-481, 1998.
-
(1998)
IEEE Journal On Selected Areas In Communications
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
2
-
-
84955568589
-
Information hiding terminology-results of an informal plenary meeting and additional proposals
-
Springer
-
Birgit P tzmann, Information hiding terminology-results of an informal plenary meeting and additional proposals, Proc. of the First International Workshop on Information Hiding, vol. 1174, pp. 347-350. Springer, 1996.
-
(1996)
Proc. of the First International Workshop On Information Hiding
, vol.1174
, pp. 347-350
-
-
Tzmann, B.P.1
-
3
-
-
11844252006
-
Cyber warfare: Steganography vs. steganalysis
-
Huaiqing Wang and Shuozhong Wang, Cyber warfare: Steganography vs. steganalysis, Communications of the ACM, vol. 47, no. 10, pp. 76-82, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.10
, pp. 76-82
-
-
Wang, H.1
Wang, S.2
-
5
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
Niels Provos and Peter Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, vol. 1, no.3, pp. 32-44, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
6
-
-
33847692468
-
-
Springer
-
R. Chandramouli, M. Kharrazi, and N. Memon, Image steganography and steganalysis concepts and practice, Proc. of IWDW'03, vol. 2939, pp. 35-49, Springer, 2003.
-
(2003)
Image Steganography and Steganalysis Concepts and Practice, Proc. of IWDW'03
, vol.2939
, pp. 35-49
-
-
Chandramouli, R.1
Kharrazi, M.2
Memon, N.3
-
7
-
-
0001217738
-
Simmons, The prisoners' problem and the subliminal channel
-
Gustavus J. Simmons, The prisoners' problem and the subliminal channel, Proc. of CRYPTO'83, pp. 51-67, 1983.
-
(1983)
Proc. of CRYPTO'83
, pp. 51-67
-
-
Gustavus, J.1
-
9
-
-
3042519430
-
An information-theoretic model for steganography
-
Christian Cachin, An information-theoretic model for steganography, Information and Computation, vol. 192, no. 1, pp. 41-56, 2004.
-
(2004)
Information and Computation
, vol.192
, Issue.1
, pp. 41-56
-
-
Cachin, C.1
-
11
-
-
0034515656
-
Data hiding in digital binary image
-
M. Wu, E. Tang, and B. Lin, Data hiding in digital binary image, Proc. of 2000 IEEE International Conference on Multimedia and Expo, vol. 1, pp. 393-396, 2000.
-
(2000)
Proc. of 2000 IEEE International Conference On Multimedia and Expo
, vol.1
, pp. 393-396
-
-
Wu, M.1
Tang, E.2
Lin, B.3
-
12
-
-
34547405250
-
Steganography in binary image by checking data-carrying eligibility of boundary pixels
-
G. Liang, S. Wang, and X. Zhang, Steganography in binary image by checking data-carrying eligibility of boundary pixels, Journal of Shanghai University, vol. 11, no. 3, pp. 272-277, 2007.
-
(2007)
Journal of Shanghai University
, vol.11
, Issue.3
, pp. 272-277
-
-
Liang, G.1
Wang, S.2
Zhang, X.3
-
13
-
-
0038527408
-
Data hiding on 3-d triangle meshes
-
F. Cayre and B. Macq, Data hiding on 3-d triangle meshes, IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 939-949, 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 939-949
-
-
Cayre, F.1
Macq, B.2
-
14
-
-
0034787093
-
Reliable detection of lsb steganography in color and grayscale images
-
ACM Press
-
Jessica Fridrich, Miroslav Goljan, and Rui Du, Reliable detection of lsb steganography in color and grayscale images. Proc. of 2001 ACM workshop on Multimedia and security: new challenges, pp. 27-30, ACM Press, 2001.
-
(2001)
Proc. of 2001 ACM Workshop On Multimedia and Security: New Challenges
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Rui, D.3
-
15
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM System Journal, vol. 35, no. 3, pp. 313-336, 1996.
-
(1996)
IBM System Journal
, vol.35
, Issue.3
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
16
-
-
0032634270
-
Principle and applications of bpcs steganography
-
SPIE
-
Eiji Kawaguchi and Richard O. Eason, Principle and applications of bpcs steganography, In Multimedia Systems and Applications, vol. 3528, pp. 464-473, SPIE, 1998.
-
(1998)
Multimedia Systems and Applications
, vol.3528
, pp. 464-473
-
-
Kawaguchi, E.1
Eason, R.O.2
-
17
-
-
84892764719
-
Attacks on steganographic systems-breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools-and some lessons learned
-
Springer
-
A. Westfeld and A. Pfitzmann, Attacks on steganographic systems-breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools-and some lessons learned. Proc. of the 3rd Information Hiding Workshop, vol. 1768, pp. 61-76, Springer, 1999.
-
(1999)
Proc. of the 3rd Information Hiding Workshop
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
18
-
-
84947277755
-
An implementation of key-based digital signal steganography
-
Springer
-
T. Sharp, An implementation of key-based digital signal steganography, Proc. of the 4th Information Hiding Workshop, vol. 2137, pp. 13-26, Springer, 2001.
-
(2001)
Proc. of the 4th Information Hiding Workshop
, vol.2137
, pp. 13-26
-
-
Sharp, T.1
-
19
-
-
33645814428
-
Lsb matching revisited
-
J. Mielikainen, Lsb matching revisited, IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.5
, pp. 285-287
-
-
Mielikainen, J.1
-
20
-
-
59149086522
-
A generalization of lsb matching
-
X. Li, B. Yang, D. Cheng, and T. Zeng, A generalization of lsb matching, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, 2009.
-
(2009)
IEEE Signal Processing Letters
, vol.16
, Issue.2
, pp. 69-72
-
-
Li, X.1
Yang, B.2
Cheng, D.3
Zeng, T.4
-
21
-
-
21844461602
-
Maximum likelihood estimation of secret message length embedded using pmk steganography in spatial domain
-
J. Fridrich, D. Soukal, and M. Goljan, Maximum likelihood estimation of secret message length embedded using pmk steganography in spatial domain, Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 595-606, 2005.
-
(2005)
Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 595-606
-
-
Fridrich, J.1
Soukal, D.2
Goljan, M.3
-
23
-
-
0037410595
-
A steganographic method for images by pixel-value diRerencing
-
D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value diRerencing, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613-1626, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
24
-
-
11844253853
-
Steganography using multiple-base notational system and human vision sensitivity
-
Xinpeng Zhang and Shuozhong Wang, Steganography using multiple-base notational system and human vision sensitivity, IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67-70, 2005.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.1
, pp. 67-70
-
-
Zhang, X.1
Wang, S.2
-
25
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
B. Chen and G. W. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
-
(2001)
IEEE Trans. Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
26
-
-
32644446054
-
High-performance jpeg steganography using quantization index modulation in dct domain
-
H. Noda, M. Niimi, and E. Kawaguchi, High-performance jpeg steganography using quantization index modulation in dct domain, Pattern Recognition Letters, vol. 27, no. 5, pp. 455-461, 2006.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.5
, pp. 455-461
-
-
Noda, H.1
Niimi, M.2
Kawaguchi, E.3
-
27
-
-
0037737759
-
Scalar costa scheme for information embedding
-
J.J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1003-1019, 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1003-1019
-
-
Eggers, J.J.1
Bauml, R.2
Tzschoppe, R.3
Girod, B.4
-
28
-
-
84871249493
-
-
Derek Upham, Jsteg
-
Derek Upham, Jsteg, http://zooid.org/ paul/crypto/jsteg/.
-
-
-
-
29
-
-
84871181561
-
-
Allan Latham, Jphide
-
Allan Latham, Jphide, http://linux01.gwdg.de/ alatham/stego.html.
-
-
-
-
30
-
-
84937814312
-
F5-a steganographic algorithm: High capacity despite better steganalysis
-
Springer
-
Andrew Westfeld, F5-a steganographic algorithm: high capacity despite better steganalysis, Proc. of the 4th Information Hiding Workshop, vol. 2137, pp. 289-302, Springer, 2001.
-
(2001)
Proc. of the 4th Information Hiding Workshop
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
33
-
-
49949091527
-
Yass: Yet another steganographic scheme that resists blind steganalysis
-
Springer
-
K. Solanki, A. Sarkar, and B. S. Manjunath, Yass: Yet another steganographic scheme that resists blind steganalysis,Proc. of the 9th Information Hiding Workshop, Springer, vol. 4567, pp. 16-31, 2007.
-
(2007)
Proc. of the 9th Information Hiding Workshop
, vol.4567
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
34
-
-
35048835739
-
Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes
-
Springer
-
J. Fridrich, Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes, Proc. of the 6th Information Hiding Workshop, Springer, vol. 3200, pp. 67-81, 2004.
-
(2004)
Proc. of the 6th Information Hiding Workshop
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
35
-
-
34548232251
-
Merging markov and dct features for multi-class jpeg steganalysis
-
Tomas Pevny and Jessica Fridrich, Merging markov and dct features for multi-class jpeg steganalysis. Proc. of SPIE: Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, pp. 3-14, 2007.
-
(2007)
Proc. of SPIE: Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
, pp. 3-14
-
-
Pevny, T.1
Fridrich, J.2
-
36
-
-
78349262285
-
A high-performance yass-like scheme using randomized big-blocks
-
Lifang Yu, Yao Zhao, Rongrong Ni, and Yun Q. Shi, A high-performance yass-like scheme using randomized big-blocks, Proc. of the IEEE International Conference on Multimidea and Expo (ICME 2010),2010.
-
Proc. of the IEEE International Conference On Multimidea and Expo (ICME 2010)
, pp. 2010
-
-
Lifang, Y.1
Zhao, Y.2
Ni, R.3
Shi, Y.Q.4
-
37
-
-
77955691327
-
An experimental study on the security performance of yass
-
Fangjun Huang, Jiwu Huang, and Yun Qing Shi, An experimental study on the security performance of yass, IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 374-380, 2010.
-
(2010)
IEEE Trans. Information Forensics and Security
, vol.5
, Issue.3
, pp. 374-380
-
-
Huang, F.1
Huang, J.2
Shi, Y.Q.3
-
38
-
-
38049166461
-
A morkov process based approach to eRective attacking jpeg steganography
-
Y. Q. Shi, C. Chen, and W. Chen, A morkov process based approach to eRective attacking jpeg steganography. Proc. of the 8th Information Hiding Workshop, Springer, vol. 4437, pp. 249-264, 2006.
-
(2006)
Proc. of the 8th Information Hiding Workshop, Springer
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
39
-
-
51749089283
-
Jpeg image steganalysis utilizing both intra-block and inter-block correlations
-
C. Chen and Y. Q. Shi, Jpeg image steganalysis utilizing both intra-block and inter-block correlations, Proc. of ISCAS'08, pp. 3029-3032, 2008.
-
(2008)
Proc. of ISCAS'08
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.Q.2
-
41
-
-
0037524382
-
Detection of lsb steganography via sample pair analysis
-
S. Dumitrescu, X. L. Wu, and Z. Wang, Detection of lsb steganography via sample pair analysis, IEEE Trans. Signal Processing, vol. 51, no. 7, pp. 1995-2007, 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.L.2
Wang, Z.3
-
42
-
-
8844243986
-
On estimation of secret message length in lsb steganography in spatial domain
-
J. Fridrich and M. Goljan, On estimation of secret message length in lsb steganography in spatial domain. Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 23-34, 2004.
-
(2004)
Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
43
-
-
33746613626
-
A general framework for the structural steganalysis of lsb replacement
-
A. D. Ker, A general framework for the structural steganalysis of lsb replacement, Proc. of the 7th Information Hiding Workshop, Springer, vol. 3727, pp. 296-311, 2005.
-
(2005)
Proc. of the 7th Information Hiding Workshop, Springer
, vol.3727
, pp. 296-311
-
-
Ker, A.D.1
-
44
-
-
33645652933
-
Fourth-order structural steganalysis and analysis of cover assumptions
-
A. D. Ker, Fourth-order structural steganalysis and analysis of cover assumptions, Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1-14, 2006.
-
(2006)
Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 1-14
-
-
Ker, A.D.1
-
45
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
J. Harmsen and W. Pearlman, Steganalysis of additive noise modelable information hiding, Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, pp. 131-142, 2003.
-
(2003)
Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents V
, vol.5020
, pp. 131-142
-
-
Harmsen, J.1
Pearlman, W.2
-
46
-
-
20444404178
-
Steganalysis of lsb matching in grayscale images
-
A. D. Ker. Steganalysis of lsb matching in grayscale images, IEEE Signal Processing Letters, vol. 12, no. 6, pp. 441-444, 2005.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
47
-
-
56749179690
-
Detecting lsb matching by applying calibration technique for diRerence image
-
Xiaolong Li, Tieyong Zeng, and Bin Yang, Detecting lsb matching by applying calibration technique for diRerence image. Proc. of the 10th ACM workshop on Multimedia and Security, ACM Press, pp. 133-138, 2008.
-
(2008)
Proc. of the 10th ACM Workshop On Multimedia and Security, ACM Press
, pp. 133-138
-
-
Li, X.1
Zeng, T.2
Yang, B.3
-
48
-
-
48149108030
-
Steganalysis for lsb matching in images with high-frequency noise
-
J. Zhang, I. J. Cox, and G. Doerr, Steganalysis for lsb matching in images with high-frequency noise, Proc. of IEEE Workshop on Multimedia Signal Processing, pp. 385-388, 2007.
-
(2007)
Proc. of IEEE Workshop On Multimedia Signal Processing
, pp. 385-388
-
-
Zhang, J.1
Cox, I.J.2
Doerr, G.3
-
49
-
-
69949122982
-
Detection of +/-1 lsb steganography based on the amplitude of histogram local extrema
-
G. Cancelli, G. Doerr, I. J. Cox, and M. Barni, Detection of +/-1 lsb steganography based on the amplitude of histogram local extrema, Proc. of ICIP'08, pp. 1288-1291, 2008.
-
(2008)
Proc. of ICIP'08
, pp. 1288-1291
-
-
Cancelli, G.1
Doerr, G.2
Cox, I.J.3
Barni, M.4
-
50
-
-
48149084629
-
Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels
-
F. J. Huang, B. Li, and J. W. Huang, Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels, Proc. of ICIP'07, vol. 1, pp. 401-404, 2007.
-
(2007)
Proc. of ICIP'07
, vol.1
, pp. 401-404
-
-
Huang, F.J.1
Li, B.2
Huang, J.W.3
-
52
-
-
33646169148
-
A new approach to estimating hidden message length in stochastic modulation steganography
-
J. H. He, J. W. Huang, and G. P. Qiu, A new approach to estimating hidden message length in stochastic modulation steganography, Proc. of the 4th Internation Workshop on Digital Watermarking, Springer, vol 3710, pp. 1-14, 2005.
-
(2005)
Proc. of the 4th Internation Workshop On Digital Watermarking, Springer
, vol.3710
, pp. 1-14
-
-
He, J.H.1
Huang, J.W.2
Qiu, G.P.3
-
53
-
-
33750175796
-
Steganalysis of stochastic modulation steganography
-
J. H. He and J. W. Huang, Steganalysis of stochastic modulation steganography, Science in China Series: F-Information Sciences, vol. 49, no. 3, pp. 273-285, 2006.
-
(2006)
Science In China Series: F-Information Sciences
, vol.49
, Issue.3
, pp. 273-285
-
-
He, J.H.1
Huang, J.W.2
-
54
-
-
0034769448
-
Intensity histogram steganalysis in bpcssteganography
-
M. Niimi, R. O. Eason, H. Noda, and E. Kawaguchi, Intensity histogram steganalysis in bpcssteganography. Proc. of IST/SPIE Electronic Imaging: Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 555-564, 2001.
-
(2001)
Proc. of IST/SPIE Electronic Imaging: Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 555-564
-
-
Niimi, M.1
Eason, R.O.2
Noda, H.3
Kawaguchi, E.4
-
55
-
-
0347355319
-
Vulnerability of pixel-value diRerencing steganography to histogram analysis and modication for enhanced security
-
X. P. Zhang and S. Z. Wang, Vulnerability of pixel-value diRerencing steganography to histogram analysis and modication for enhanced security, Pattern Recognition Letters, vol. 25, no. 3, pp. 331-339,2004.
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.3
, pp. 331-339
-
-
Zhang, X.P.1
Wang, S.Z.2
-
56
-
-
67650175930
-
Steganalysis of multiple-base notational system steganography
-
Bin Li, Yanmei Fang, and Jiwu Huang, Steganalysis of multiple-base notational system steganography, IEEE Signal Processing Letters, vol. 15, no. 493-496, 2008.
-
(2008)
IEEE Signal Processing Letters
, vol.15
, Issue.493-496
-
-
Li, B.1
Fang, Y.2
Huang, J.3
-
57
-
-
20444447558
-
Steganalysis of quantization index modulation data hiding
-
K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, Steganalysis of quantization index modulation data hiding, Proc. of 2004 IEEE International Conference on Image Processing, vol. 2, pp. 1165-1168, 2004.
-
(2004)
Proc. of 2004 IEEE International Conference On Image Processing
, vol.2
, pp. 1165-1168
-
-
Sullivan, K.1
Bi, Z.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.S.5
-
58
-
-
0036030779
-
Applied public-key steganography
-
P. Guillon, T. Furon, and P. Duhamel, Applied public-key steganography, IST/SPIE Electronic Imaging: Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 38-49, 2002.
-
(2002)
IST/SPIE Electronic Imaging: Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 38-49
-
-
Guillon, P.1
Furon, T.2
Duhamel, P.3
-
59
-
-
38849105460
-
Steganalysis of qim-based data hiding using kernel density estimation
-
ACM Press
-
Haz Malik, K. P. Subbalakshmi, and Rajarathnam Chandramouli, Steganalysis of qim-based data hiding using kernel density estimation. Proc. of the 9th ACM Workshop on Multimedia and Security, ACM Press, pp. 149-160, 2007.
-
(2007)
Proc. of the 9th ACM Workshop On Multimedia and Security
, pp. 149-160
-
-
Malik, H.1
Subbalakshmi, K.P.2
Chandramouli, R.3
-
61
-
-
42949085230
-
Non-parametric steganalysis of qim data hiding using approximate entropy
-
H. Malik, K. P. Subbalakshmi, and R. Chandramouli, Non-parametric steganalysis of qim data hiding using approximate entropy, Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Content X, vol. 6819, pp. 1-12, 2008.
-
(2008)
Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Content X
, vol.6819
, pp. 1-12
-
-
Malik, H.1
Subbalakshmi, K.P.2
Chandramouli, R.3
-
62
-
-
35248884299
-
Steganalysis of jpeg images: Breaking the f5 algorithm
-
J. Fridrich, M. Goljan, and D. Hogea, Steganalysis of jpeg images: Breaking the f5 algorithm, Proc. of the 5th Information Hiding Workshop, Springer, vol. 2578, pp. 310-323, 2002.
-
(2002)
Proc. of the 5th Information Hiding Workshop, Springer
, vol.2578
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
63
-
-
2642549992
-
Attacking the outguess
-
J. Fridrich, M. Goljan, and D. Hogea, Attacking the outguess, Proc. of 2002 ACM Workshop on Multimedia and Security, ACM Press, pp. 3-6, 2002.
-
(2002)
Proc. of 2002 ACM Workshop On Multimedia and Security, ACM Press
, pp. 3-6
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
64
-
-
33749598442
-
Breaking cauchy model-based jpeg steganography with first order statistics
-
R. BAohme and A. Westfeld, Breaking cauchy model-based jpeg steganography with first order statistics, Proc. of the 9th European Symposium On Research in Computer Security, Springer, vol. 3193, pp. 125-140, 2004.
-
(2004)
Proc. of the 9th European Symposium On Research In Computer Security, Springer
, vol.3193
, pp. 125-140
-
-
Baohme, R.1
Westfeld, A.2
-
65
-
-
56749160543
-
Steganalysis of yass
-
Bin Li, Yun Q. Shi, and Jiwu Huang, Steganalysis of yass, Proc. of the 10th ACM workshop on Multimedia and security, ACM Press, pp. 139-148, 2008.
-
(2008)
Proc. of the 10th ACM Workshop On Multimedia and Security, ACM Press
, pp. 139-148
-
-
Li, B.1
Shi, Y.Q.2
Huang, J.3
-
66
-
-
44649098085
-
A review on blind detection for image steganography
-
X. Y. Luo, D. S. Wang, P. Wang, and F. L. Liu, A review on blind detection for image steganography, Signal Processing, vol. 88, no. 9, pp. 2138-2157, 2008.
-
(2008)
Signal Processing
, vol.88
, Issue.9
, pp. 2138-2157
-
-
Luo, X.Y.1
Wang, D.S.2
Wang, P.3
Liu, F.L.4
-
67
-
-
0038343416
-
Steganalysis using image quality metrics
-
I. Avcibas, N. Memon, and B. Sankur, Steganalysis using image quality metrics, IEEE Trans. Image Processing, vol. 12, no. 2, pp. 221-229, 2003.
-
(2003)
IEEE Trans. Image Processing
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
68
-
-
84868516320
-
Detecting hidden message using higher-order statistics and support vector machines
-
Lyu Siwei and H. Farid, Detecting hidden message using higher-order statistics and support vector machines, Proc. of the 5th Information Hiding Workshop, Springer, vol. 2578, pp. 131-142, 2002.
-
(2002)
Proc. of the 5th Information Hiding Workshop, Springer
, vol.2578
, pp. 131-142
-
-
Siwei, L.1
Farid, H.2
-
69
-
-
33645676686
-
New blind steganalysis and its implications
-
M. Goljan, J. Fridrich, and T. Holotyak, New blind steganalysis and its implications, IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1-13, 2006.
-
(2006)
IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
70
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
G. R. Xuan, Y. Q. Shi, J. J. Gao, D. Zou, C. Y. Yang, Z. P. Zhang, P. Q. Chai, C. H. Chen, and W. Chen, Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions, Proc. of the 7th Information Hiding Workshop, Springer, vol. 3727, pp. 262-277, 2005.
-
(2005)
Proc. of the 7th Information Hiding Workshop, Springer
, vol.3727
, pp. 262-277
-
-
Xuan, G.R.1
Shi, Y.Q.2
Gao, J.J.3
Zou, D.4
Yang, C.Y.5
Zhang, Z.P.6
Chai, P.Q.7
Chen, C.H.8
Chen, W.9
-
71
-
-
33750555925
-
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network
-
Y. Q. Shi, Guorong Xuan D. Zou, Jianjiong Gao, Chengyun Yang, Zhenping Zhang, Peiqi Chai, W. Chen, and C. Chen, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. Proc. of IEEE International Conference on Multimedia and Expo, IEEE Computer Society, vol. 1, pp. 269-272, 2005.
-
(2005)
Proc. of IEEE International Conference On Multimedia and Expo, IEEE Computer Society
, vol.1
, pp. 269-272
-
-
Shi, Y.Q.1
Zou, G.X.D.2
Gao, J.3
Yang, C.4
Zhang, Z.5
Chai, P.6
Chen, W.7
Chen, C.8
-
72
-
-
42749106257
-
Image steganalysis based on statistical moments of wavelet subband histograms in dft domain
-
Guorong Xuan, Jianjiong Gao, Y.Q. Shi, and D. Zou, Image steganalysis based on statistical moments of wavelet subband histograms in dft domain, Proc. of IEEE International Workshop on Multimedia Signal Processing, pp. 1-4, 2005.
-
(2005)
Proc. of IEEE International Workshop On Multimedia Signal Processing
, pp. 1-4
-
-
Xuan, G.1
Gao, J.2
Shi, Y.Q.3
Zou, D.4
-
73
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
Y. Wang and P. Moulin, Optimized feature extraction for learning-based image steganalysis, IEEE Trans. Information Forensics and Security, vol. 2, no. 1, pp. 31-45, 2007.
-
(2007)
IEEE Trans. Information Forensics and Security
, vol.2
, Issue.1
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
74
-
-
33744728031
-
Steganalysis for markov cover data with applications to images
-
K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, Steganalysis for markov cover data with applications to images, IEEE Trans. Information Forensics and Security, vol. 1, no. 2, pp. 275-287, 2006.
-
(2006)
IEEE Trans. Information Forensics and Security
, vol.1
, Issue.2
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.S.4
-
75
-
-
33645695834
-
-
Posted on steganography mailing list, 1998
-
R. Crandall, Some notes on steganography, Posted on steganography mailing list, http://os.inf.tudresden.de/ westfeld/crandall.pdf, 1998.
-
Some Notes On Steganography
-
-
Crandall, R.1
-
76
-
-
33748096430
-
Matrix embedding for large payloads
-
J. Fridrich and D. Soukal, Matrix embedding for large payloads, IEEE Trans. Information Forensics and Security, vol. 1, no. 3, pp. 390-395, 2006.
-
(2006)
IEEE Trans. Information Forensics and Security
, vol.1
, Issue.3
, pp. 390-395
-
-
Fridrich, J.1
Soukal, D.2
-
77
-
-
36248978560
-
A double layered plus-minus one data embedding scheme
-
W. M. Zhang, X. P. Zhang, and S. Z. Wang, A double layered plus-minus one data embedding scheme, IEEE Signal Processing Letters, vol. 14, no. 11, pp. 848-851, 2007.
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.11
, pp. 848-851
-
-
Zhang, W.M.1
Zhang, X.P.2
Wang, S.Z.3
-
78
-
-
38049181797
-
On steganographic embedding efficiency
-
J. Fridrich, P. Lisonek, and D. Soukal, On steganographic embedding efficiency, Proc. of the 8th Information Hiding Workshop, Springer, no. 4437, pp. 282-296, 2007.
-
(2007)
Proc. of the 8th Information Hiding Workshop, Springer
, vol.4437
, pp. 282-296
-
-
Fridrich, J.1
Lisonek, P.2
Soukal, D.3
-
79
-
-
45449087266
-
Constructing good covering codes for applications in steganography, LNCS Trans
-
JAurgen Bierbrauer and Jessica Fridrich, Constructing good covering codes for applications in steganography, LNCS Trans. Data Hiding and Multimedia Security III, vol. 4920, pp. 1-22, 2008.
-
(2008)
Data Hiding and Multimedia Security III
, vol.4920
, pp. 1-22
-
-
Bierbrauer, J.1
Fridrich, J.2
-
80
-
-
38149033612
-
Modified matrix encoding for minimal distortion steganography
-
Y. Kim, Z. Duric, and D. Richards, Modified matrix encoding for minimal distortion steganography. Proc. of the 8th Information Hiding Workshop, Springer, vol. 4437, pp. 314-327, 2006.
-
(2006)
Proc. of the 8th Information Hiding Workshop, Springer
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
81
-
-
38849102269
-
Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities
-
Jessica Fridrich, Tomas Pevny, and Jan Kodovsky, Statistically undetectable jpeg steganography: dead ends challenges, and opportunities, Proc. of the 9th workshop on Multimedia and security, ACM Press, pp. 3-14, 2007.
-
(2007)
Proc. of the 9th Workshop On Multimedia and Security, ACM Press
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
-
82
-
-
42949124470
-
Influence of embedding strategies on security of steganographic methods in the jpeg domain
-
Jan Kodovsky and J. Fridrich, Influence of embedding strategies on security of steganographic methods in the jpeg domain, Proc. of IST/SPIE Electronic Imaging: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 1-13, 2008.
-
(2008)
Proc. of IST/SPIE Electronic Imaging: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 1-13
-
-
Kodovsky, J.1
Fridrich, J.2
-
84
-
-
78649869719
-
Cover selection for steganographic embedding
-
M. Kharrazi, H. T. Sencar, and N. Memon, Cover selection for steganographic embedding, In Proc. of IEEE International Conference on Image Processing, pp. 117-120, 2006.
-
(2006)
Proc. of IEEE International Conference On Image Processing
, pp. 117-120
-
-
Kharrazi, M.1
Sencar, H.T.2
Memon, N.3
-
85
-
-
0036031193
-
Adaptive steganography
-
Grace Li, Nasir Memon, and R. Chandramouli, Adaptive steganography, Proc. of SPIE: Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 69-78, 2002.
-
(2002)
Proc. of SPIE: Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 69-78
-
-
Li, G.1
Memon, N.2
Chandramouli, R.3
-
87
-
-
33645660635
-
Multiclass blind steganalysis for jpeg images
-
Tomas Pevny and J. Fridrich, Multiclass blind steganalysis for jpeg images, Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 1-13, 2006.
-
(2006)
Proc. of IST/SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 1-13
-
-
Pevny, T.1
Fridrich, J.2
-
88
-
-
56749170425
-
Multiclass detector of current steganographic methods for jpeg format
-
Tomas Pevny and J. Fridrich, Multiclass detector of current steganographic methods for jpeg format, IEEE Trans. Information Forensics and Security, vol. 3, no. 4, pp. 635-650, 2008.
-
(2008)
IEEE Trans. Information Forensics and Security
, vol.3
, Issue.4
, pp. 635-650
-
-
Pevny, T.1
Fridrich, J.2
-
89
-
-
34250330047
-
A survey of passive technology for digital image forensics
-
Weiqi Luo, Zhenhua Qu, Feng Pan, and Jiwu Huang, A survey of passive technology for digital image forensics, Frontiers of Computer Science in China, vol. 1, pp. 166-179, 2007.
-
(2007)
Frontiers of Computer Science In China
, vol.1
, pp. 166-179
-
-
Luo, W.1
Zhenhua, Q.2
Pan, F.3
Huang, J.4
|