-
1
-
-
80053005547
-
Break our steganographic system - The ins and outs of organizing BOSS
-
Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) IH 2011. Springer, Heidelberg
-
Bas, P., Filler, T., Pevný, T.: Break our steganographic system - the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) IH 2011. LNCS, vol. 6958, pp. 59-70. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
4
-
-
35248846436
-
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
-
Petitcolas, F.A.P. (ed.) IH 2002. Springer, Heidelberg
-
Farid, H., Siwei, L.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340-354. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2578
, pp. 340-354
-
-
Farid, H.1
Siwei, L.2
-
6
-
-
80053003434
-
Breaking HUGO - The process discovery
-
Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) IH 2011. Springer, Heidelberg
-
Fridrich, J., Kodovský, J., Goljan, M., Holub, V.: Breaking HUGO - the process discovery. In: Filler, T., Pevný, T., Ker, A., Craver, S. (eds.) IH 2011. LNCS, vol. 6958, pp. 85-101. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6958
, pp. 85-101
-
-
Fridrich, J.1
Kodovský, J.2
Goljan, M.3
Holub, V.4
-
7
-
-
33645676686
-
New blind steganalysis and its implications
-
Delp, E.J., Wong, P.W. (eds.)
-
Goljan, M., Fridrich, J., Holotyak, T.: New blind steganalysis and its implications. In: Delp, E.J., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, January 16-19, vol. 6072, pp. 1-13 (2006)
-
(2006)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, January 16-19
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
8
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Ker, A.D.: Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters 12(6), 441-444 (2005)
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
9
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
Delp, E.J., Wong, P.W. (eds.)
-
Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Delp, E.J., Wong, P.W. (eds.) Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 27-31, vol. 6819, pp. 5 1-5 17 (2008)
-
(2008)
Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 27-31
, vol.6819
, pp. 51-517
-
-
Ker, A.D.1
Böhme, R.2
-
10
-
-
70449646940
-
Calibration revisited
-
Dittmann, J., Craver, S., Fridrich, J. (eds.)
-
Kodovský, J., Fridrich, J.: Calibration revisited. In: Dittmann, J., Craver, S., Fridrich, J. (eds.) Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, September 7-8, pp. 63-74 (2009)
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop, Princeton, NJ, September 7-8
, pp. 63-74
-
-
Kodovský, J.1
Fridrich, J.2
-
11
-
-
79954474492
-
Steganalysis in high dimensions: Fusing classifiers built on random subspaces
-
Memon, N.D., Delp, E.J., Wong, P.W., Dittmann, J. (eds.)
-
Kodovský, J., Fridrich, J.: Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In: Memon, N.D., Delp, E.J., Wong, P.W., Dittmann, J. (eds.) Proceedings SPIE, Electronic Imaging, Watermarking, Security, and Forensics of Multimedia XIII, San Francisco, CA, January 23-26, vol. 7880 (2011)
-
(2011)
Proceedings SPIE, Electronic Imaging, Watermarking, Security, and Forensics of Multimedia XIII, San Francisco, CA, January 23-26
, vol.7880
-
-
Kodovský, J.1
Fridrich, J.2
-
12
-
-
77951862698
-
Modern steganalysis can detect YASS
-
Memon, N.D., Delp, E.J.,Wong, P.W., Dittmann, J. (eds.)
-
Kodovský, J., Pevný, T., Fridrich, J.: Modern steganalysis can detect YASS. In: Memon, N.D., Delp, E.J.,Wong, P.W., Dittmann, J. (eds.) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, San Jose, CA, January 17-21, vol. 7541, pp. 02-01-02-11 (2010)
-
(2010)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, San Jose, CA, January 17-21
, vol.7541
-
-
Kodovský, J.1
Pevný, T.2
Fridrich, J.3
-
13
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Pevný, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2), 215-224 (2010)
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
14
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. Springer, Heidelberg
-
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161-177. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
15
-
-
38049166461
-
A markov process based approach to effective attacking JPEG steganography
-
Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. Springer, Heidelberg
-
Shi, Y.Q., Chen, C., Chen, W.: A markov process based approach to effective attacking JPEG steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249-264. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
|