-
1
-
-
0031143769
-
Identification of discontinuities in blurred noisy signals
-
Bruni, C., De Santi, A., Koch, G., Sinisgalli, C.: Identification of discontinuities in blurred noisy signals. IEEE Trans. on Circuit and systems-I 44(5), 422-433 (1997)
-
(1997)
IEEE Trans. on Circuit and Systems-I
, vol.44
, Issue.5
, pp. 422-433
-
-
Bruni, C.1
De Santi, A.2
Koch, G.3
Sinisgalli, C.4
-
2
-
-
79954512366
-
-
1st edn. Springer Publishing Company, Incorporated, Heidelberg
-
Böhme, R.: Advanced Statistical Steganalysis, 1st edn. Springer Publishing Company, Incorporated, Heidelberg (2010)
-
(2010)
Advanced Statistical Steganalysis
-
-
Böhme, R.1
-
3
-
-
33746587784
-
Assessment of Steganalytic Methods Using Multiple Regression Models
-
Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. Springer, Heidelberg
-
Böhme, R.: Assessment of Steganalytic Methods Using Multiple Regression Models. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 278-295. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3727
, pp. 278-295
-
-
Böhme, R.1
-
5
-
-
53349159971
-
-
2nd edn. Morgan Kaufmann, San Francisco
-
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann, San Francisco (2007)
-
(2007)
Digital Watermarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
6
-
-
4744365298
-
Detection of hiding in the least significant bit
-
Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B.: Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing 52(10), 3046-3058 (2004)
-
(2004)
IEEE Transactions on Signal Processing
, vol.52
, Issue.10
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
7
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: Proc.of SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 23-34 (2004)
-
(2004)
Proc.of SPIE Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
9
-
-
0035472155
-
Reliable detection of LSB steganography in color and grayscale images
-
Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. IEEE Multimedia 8, 22-28 (2001)
-
(2001)
IEEE Multimedia
, vol.8
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
12
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Proc. of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 501-517 (2008)
-
(2008)
Proc. of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 501-517
-
-
Ker, A.D.1
Böhme, R.2
-
13
-
-
34547881527
-
A Capacity Result for Batch Steganography
-
Ker, A.D.: A Capacity Result for Batch Steganography. IEEE Signal Processing Letters 14(8), 525-528 (2007)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
15
-
-
84990602490
-
Optimal approximations by piecewise smooth functions and associated variational problems
-
Mumford, D., Shah, J.: Optimal approximations by piecewise smooth functions and associated variational problems. Communications on Pure and Applied Mathematics (5), 577-685 (1989)
-
(1989)
Communications on Pure and Applied Mathematics
, Issue.5
, pp. 577-685
-
-
Mumford, D.1
Shah, J.2
-
16
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
Sallee, P.: Model-based methods for steganography and steganalysis. International Journal of Image and Graphics 5(1), 167-189 (2005)
-
(2005)
International Journal of Image and Graphics
, vol.5
, Issue.1
, pp. 167-189
-
-
Sallee, P.1
-
17
-
-
8844280843
-
UCID - An uncompressed colour image database
-
Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: SPIE Proceedings, vol. 5307, pp. 472-480, http://vision.cs.aston.ac.uk/ datasets/UCID/
-
SPIE Proceedings
, vol.5307
, pp. 472-480
-
-
Schaefer, G.1
Stich, M.2
-
20
-
-
33645693950
-
-
SPIE, CA
-
Wang, Y., Moulin, P.: Statistical modelling and steganalysis of DFT-based image steganography, vol. 6072, p. 607202. SPIE, CA (2006)
-
(2006)
Statistical Modelling and Steganalysis of DFT-based Image Steganography
, vol.6072
, pp. 607202
-
-
Wang, Y.1
Moulin, P.2
-
21
-
-
84892764719
-
Attacks on steganographic systems
-
Pfitzmann, A. (ed.) IH 1999. Springer, Heidelberg
-
Westfeld, A., Andreas, P.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61-76. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Andreas, P.2
-
22
-
-
80053026542
-
Statistical Decision Methods in Hidden Information Detection
-
Filler, T., et al. (eds.) IH 2011. Springer-, Heidelberg
-
Zitzmann, C., Cogranne, R., Retraint, F., Nikiforov, I., Fillatre, L., Cornu, P.: Statistical Decision Methods in Hidden Information Detection. In: Filler, T., et al. (eds.) IH 2011. LNCS, vol. 6958, pp. 163-177. Springer-, Heidelberg (2011)
-
(2011)
LNCS
, vol.6958
, pp. 163-177
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
|