-
2
-
-
80053049588
-
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics
-
Fridrich, J., Holotyak, T., Voloshynovskiy, S.: Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. In: Proc. of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, September 19-21 (2005)
-
Proc. of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria, September 19-21 (2005)
-
-
Fridrich, J.1
Holotyak, T.2
Voloshynovskiy, S.3
-
3
-
-
0036034444
-
Practical Steganalysis-State of the Art
-
January
-
Fridrich, J., Goljan, M.: Practical Steganalysis-State of the Art. In: Proc. SPIE Photonics West Electronic Imaging Security and Watermarking of Multimedia Contents, San Jose, California, vol. 4675, pp. 1-13 (January 2002)
-
(2002)
Proc. SPIE Photonics West Electronic Imaging Security and Watermarking of Multimedia Contents, San Jose, California
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
4
-
-
0035472155
-
Detecting LSB Steganography in Color and Gray- Scale Images
-
Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray- Scale Images. IEEE Multimedia 8(4), 22-28 (2001)
-
(2001)
IEEE Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
6
-
-
77952641834
-
Steganalysis by Subtractive Pixel Adjacency Matrix
-
Pevny, T., Bas, P., Fridrich, J.: Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transaction on Information Forensics and Security 5(2), 215-224 (2010)
-
(2010)
IEEE Transaction on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
7
-
-
84957868624
-
An Information-Theoretic Model for Steganography
-
Aucsmith, D. (ed.) IH 1998. Springer, Heidelberg
-
Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306-318. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
8
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. Springer, Heidelberg
-
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161-177. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
10
-
-
0028547556
-
Floating Search Methods in Feature Selection
-
Pudil, P., Novovicova, J., Kittler, J.: Floating Search Methods in Feature Selection. Pattern Recognition Letters 15(2), 1119-1125 (1994)
-
(1994)
Pattern Recognition Letters
, vol.15
, Issue.2
, pp. 1119-1125
-
-
Pudil, P.1
Novovicova, J.2
Kittler, J.3
-
11
-
-
33947588637
-
Steganalytic Features for JPEG Compression-Based Perturbed Quantization
-
Gul, G., Dirik, A.E., Avcibas, I.: Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters 14(3), 204-208 (2007)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.3
, pp. 204-208
-
-
Gul, G.1
Dirik, A.E.2
Avcibas, I.3
-
12
-
-
80053027578
-
-
accessed Januray 31, 2011
-
http://boss.gipsa-lab.grenoble-inp.fr/ (accessed Januray 31, 2011)
-
-
-
-
13
-
-
80053030995
-
-
accessed Januray 31, 2011
-
http://www.csie.ntu.edu.tw/~cjlin/libsvm/ (accessed Januray 31, 2011)
-
-
-
|