-
1
-
-
84937814312
-
F5-a steganographic algorithm: High capacity despite better steganalysis
-
Information Hiding
-
A., Westfeld, " F5-a steganographic algorithm: high capacity despite better steganalysis, " in, Proc. of 4th Int. Workshop on Information Hiding, Vol. 2137, pp. 289-302, Springer, Berlin/Heidelberg (Apr. 2001). (Pubitemid 33367674)
-
(2001)
Proc. of 4th Int. Workshop on Information Hiding
, Issue.2137
, pp. 289-302
-
-
Westfeld, A.1
-
2
-
-
35048819204
-
Model-based steganography
-
P., Sallee, " Model-based steganography, " in, Proc. of Int. Workshop on Digital Watermarking, Seoul, Vol. 2939, pp. 154-167, Springer, Berlin/Heidelberg (Oct. 2003). (Pubitemid 38334550)
-
(2003)
Proc. of Int. Workshop on Digital Watermarking
, Issue.2939
, pp. 154-167
-
-
Sallee, P.1
-
3
-
-
14844321910
-
Perturbed Quantization steganography with wet paper codes
-
Proceedings of the Multimedia and Security Workshop 2004, MM and Sec'04
-
J., Fridrich, M., Goljan, and D., Soukal, " Perturbed quantization steganography with wet paper codes, " in, Proc. ACM, Multimedia Workshop, Germany, pp. 4-15, ACM, New York (2004). (Pubitemid 40338445)
-
(2004)
Proceedings of the Multimedia and Security Workshop 2004, MM and Sec'04
, pp. 4-15
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
4
-
-
49949091527
-
YASS: Yet another steganographic scheme that resists blind steganalysis
-
Springer, Berlin/Heidelberg (Jun.)
-
K., Solanki, A., Sarkar, and B. S., Manjunath, " YASS: yet another steganographic scheme that resists blind steganalysis, " in, Proc. of 9th Int. Workshop on Information Hiding, Saint Malo, Brittany, France, Vol. 4567/2008, pp. 16-31, Springer, Berlin/Heidelberg (Jun. 2007).
-
(2007)
Proc. of 9th Int. Workshoon Information Hiding, Saint Malo, Brittany, France
, vol.4567
, Issue.2008
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
5
-
-
67249089206
-
Adaptive steganography method based on contourlet transform
-
IEEE, Beijing
-
H., Sajedi and M., Jamzad, " Adaptive steganography method based on contourlet transform, " in, Proc. of 9th Int. Conf. Signal Processing, pp. 745-748, IEEE, Beijing (2008).
-
(2008)
Proc. of 9th Int. Conf. Signal Processing
, pp. 745-748
-
-
Sajedi, H.1
Jamzad, M.2
-
6
-
-
0242576325
-
Steganography capacity: A steganalysis perspective
-
spi PSISDG 0277-786X 10.1117/12.479732
-
R., Chandramouli and N. D., Memon, " Steganography capacity: a steganalysis perspective, ", Proc. SPIE, 5020, 173-177 (2003). spi PSISDG 0277-786X 10.1117/12.479732
-
(2003)
Proc. SPIE
, vol.5020
, pp. 173-177
-
-
Chandramouli, R.1
Memon, N.D.2
-
7
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
J., Fridrich, T., Pevny, and J., Kodovsky, " Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities, " in, Proc. of 10th ACM Workshop on Multimedia and Security (MM&Sec'08), Dallas, pp. 3-14, ACM, New York (Sept. 2007). (Pubitemid 351203799)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
-
8
-
-
84957868624
-
An information-theoretic model for steganography
-
Springer, Berlin/Heidelberg (Apr.)
-
C., Cachin, " An information-theoretic model for steganography, " in, Proc. of 2nd Int. Workshop on Information Hiding, Prtland, OR, Vol. 1525/1998, pp. 306-318, Springer, Berlin/Heidelberg (Apr. 1998).
-
(1998)
Proc. of 2nd Int. Workshoon Information Hiding, Prtland, or
, vol.1525
, Issue.1998
, pp. 306-318
-
-
Cachin, C.1
-
9
-
-
0036709581
-
A framework for evaluating the data-hiding capacity of image sources
-
DOI 10.1109/TIP.2002.802512, PII 1011092002802512
-
P., Moulin and M. K., Mihcak, " A framework for evaluating the data hiding capacity of image sources, ", IEEE Trans. Image Process., 11, 1029-1042 (2002). iei IIPRE4 1057-7149 10.1109/TIP.2002.802512 (Pubitemid 35250386)
-
(2002)
IEEE Transactions on Image Processing
, vol.11
, Issue.9
, pp. 1029-1042
-
-
Moulin, P.1
Mihcak, M.K.2
-
10
-
-
38049111044
-
Batch Steganography and pooled steganalysis
-
Springer, Berlin/Heidelberg (Jul.)
-
A. D., Ker, " Batch Steganography and pooled steganalysis, " in, Proc. of 8th Information Hiding Workshop, IH 2006, Alexandria, VA, pp. 265-281, Springer, Berlin/Heidelberg (Jul. 2006).
-
(2006)
Proc. of 8th Information Hiding Workshop, IH 2006, Alexandria, VA
, pp. 265-281
-
-
Ker, A.D.1
-
11
-
-
57149128996
-
Perturbation hiding and the batch steganography problem
-
Springer, Berlin/Heidelberg (May)
-
A. D., Ker, " Perturbation hiding and the batch steganography problem, " in, Proc. of 10th Information Hiding Workshop, IH 2008, Santa Barbara, CA, pp. 45-59, Springer, Berlin/Heidelberg (May, 2008).
-
(2008)
Proc. of 10th Information Hiding Workshop, IH 2008, Santa Barbara, CA
, pp. 45-59
-
-
Ker, A.D.1
-
12
-
-
32044463268
-
Boosting SVM classifiers by ensemble
-
ACM, New York
-
Y., Dong and K., Han, " Boosting SVM classifiers by ensemble, " in, Proc. of 14th Int. Conf. ACM on World Wide Web, pp. 1072-1073, ACM, New York (2005).
-
(2005)
Proc. of 14th Int. Conf. ACM on World Wide Web
, pp. 1072-1073
-
-
Dong, Y.1
Han, K.2
-
13
-
-
34547881527
-
A capacity result for batch steganography
-
DOI 10.1109/LSP.2006.891319
-
A. D., Ker, " A capacity result for batch steganography, ", IEEE Signal Process. Lett., 14 (8), 525-528 (2007). isp ISPLEM 1070-9908 10.1109/LSP.2006.891319 (Pubitemid 47250022)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
14
-
-
21844448558
-
Is image steganography natural?
-
HP Laboratories Palo Alto
-
A., Martin, G., Sapiro, and G., Seroussi, " Is image steganography natural? " Tech. Report, Information Theory Research Group, HP Laboratories Palo Alto (2004).
-
(2004)
Tech. Report, Information Theory Research Group
-
-
Martin, A.1
Sapiro, G.2
Seroussi, G.3
-
15
-
-
33947106261
-
A new fuzzy support vector machine based on the weighted margin
-
10.1007/s11063-004-1640-5
-
T., Qing and W., Jue, " A new fuzzy support vector machine based on the weighted margin, ", Neural Process. Lett., 20 (3), 139-150 (2004). 10.1007/s11063-004-1640-5
-
(2004)
Neural Process. Lett.
, vol.20
, Issue.3
, pp. 139-150
-
-
Qing, T.1
Jue, W.2
-
16
-
-
0035158947
-
Support vector machine learning for image retrieval
-
L., Zhang, F., Lin, and B., Zhang, " Support vector machine learning for image retrieval, " in, Proc. IEEE Int. Conf. on Image Processing, pp. 721-724, IEEE, Piscataway, NJ (2001). (Pubitemid 33057807)
-
(2001)
IEEE International Conference on Image Processing
, vol.2
, pp. 721-724
-
-
Zhang, L.1
Lin, F.2
Zhang, B.3
-
17
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
DOI 10.1023/A:1009715923555
-
C. J. C., Burges, " A tutorial on support vector machines for pattern recognition, ", Data Min. Knowl. Discov., 2, 121-167 (1998). awj DMKDFD 1384-5810 10.1023/A:1009715923555 (Pubitemid 128126769)
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-168
-
-
Burges, C.J.C.1
-
18
-
-
0242288813
-
The support vector machine under test
-
DOI 10.1016/S0925-2312(03)00431-4
-
D., Meyer, F., Leisch, and K., Hornik, " The support vector machine under test, ", Neurocomputing, 55, 169-186 (2003). 9g3 NRCGEO 0925-2312 10.1016/S0925-2312(03)00431-4 (Pubitemid 37336675)
-
(2003)
Neurocomputing
, vol.55
, Issue.1-2
, pp. 169-186
-
-
Meyer, D.1
Leisch, F.2
Hornik, K.3
-
19
-
-
21844474312
-
Benchmarking steganographic and steganalysis techniques
-
DOI 10.1117/12.587375, 26, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
-
M., Kharrazi, T. H., Sencar, and N., Memon, " Benchmarking steganographic and steganalysis techniques, " in, Security, Steganography, and Watermarking of Multimedia Contents VII, Proc. SPIE, 5681, 252-263 (2005). spi PSISDG 0277-786X 10.1117/12.587375 (Pubitemid 40952986)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5681
, pp. 252-263
-
-
Kharrazi, M.1
Sencar, H.T.2
Memon, N.3
-
20
-
-
33645696636
-
Image steganalysis with binary similarity measures
-
DOI 10.1155/ASP.2005.2749, PII S1110865705505110
-
I., Avcibas, M., Kharrazi, N., Memon, and B., Sankur, " Image steganalysis with binary similarity measures, ", EURASIP J. Appl. Signal Process. 2005, 2749-2757 (2005). cws ZZZZZZ 1110-8657 10.1155/ASP.2005.2749 (Pubitemid 44178258)
-
(2005)
Eurasip Journal on Applied Signal Processing
, vol.2005
, Issue.17
, pp. 2749-2757
-
-
Avcibas, I.1
Kharrazi, M.2
Memon, N.3
Sankur, B.4
-
21
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
The Netherlands, Springer-Verlag (Oct.)
-
S., Lyu and H., Farid, " Detecting hidden messages using higher-order statistics and support vector machines, " in, Proc. of 5th Int. Workshop on Information Hiding, The Netherlands, pp. 340-354, Springer-Verlag (Oct. 2002).
-
(2002)
Proc. of 5th Int. Workshoon Information Hiding
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
-
22
-
-
8844256156
-
Steganalysis using color wavelet statistics and one-class support vector machines
-
spi PSISDG 0277-786X 10.1117/12.526012
-
S., Lyu and H., Farid, " Steganalysis using color wavelet statistics and one-class support vector machines, " in, Security Steganography, and Watermarking of Multimedia Contents VI, Proc. SPIE, 5306, 35-45 (2004). spi PSISDG 0277-786X 10.1117/12.526012
-
(2004)
Security Steganography, and Watermarking of Multimedia Contents VI, Proc. SPIE
, vol.5306
, pp. 35-45
-
-
Lyu, S.1
Farid, H.2
-
23
-
-
35048835739
-
Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes
-
J., Fridrich, " Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes, in, ", Proc. of 6th Int. Workshop on Information Hiding, Toronto, Ontario, Canada, pp. 67-81, Springer, Berlin/Heidelberg (May, 2004). (Pubitemid 39745168)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
24
-
-
80053403826
-
Ensemble methods in machine learning
-
9fi LNCSD9 0302-9743 10.1007/3-540-45014-9-1
-
T. G., Dietterich, " Ensemble methods in machine learning, " in, Multiple Classifier Systems, Lect. Notes Comput. Sci., 1857, 1-15, (2001). 9fi LNCSD9 0302-9743 10.1007/3-540-45014-9-1
-
(2001)
Multiple Classifier Systems, Lect. Notes Comput. Sci.
, vol.1857
, pp. 1-15
-
-
Dietterich, T.G.1
-
25
-
-
0001963082
-
A short introduction to boosting
-
Y., Freund and R., Schapire, " A short introduction to boosting, ", J. Jpn. Soc. Artif. Intell., 14 (5), 771-780 (1999).
-
(1999)
J. Jpn. Soc. Artif. Intell.
, vol.14
, Issue.5
, pp. 771-780
-
-
Freund, Y.1
Schapire, R.2
-
26
-
-
56749160546
-
The square root law of steganographic capacity
-
ACM, New York
-
A. D., Ker, T., Penvy, J., Kodovsky, and J., Fridrich, " The square root law of steganographic capacity, " in, Proc. of International Multimedia Conf. 10th ACM Workshop on Multimedia and Security, Oxford, UK, pp. 107-116, ACM, New York (2008).
-
(2008)
Proc. of International Multimedia Conf. 10th ACM Workshoon Multimedia and Security, Oxford, UK
, pp. 107-116
-
-
Ker, A.D.1
Penvy, T.2
Kodovsky, J.3
Fridrich, J.4
-
27
-
-
84857147141
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
spi PSISDG 0277-786X 10.1117/12.793470
-
T., Pevny and J., Fridrich, " Merging Markov and DCT features for multi-class JPEG steganalysis, " in, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proc. SPIE, 6819, 681901 (2008). spi PSISDG 0277-786X 10.1117/12.793470
-
(2008)
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proc. SPIE
, vol.6819
, pp. 681901
-
-
Pevny, T.1
Fridrich, J.2
-
28
-
-
42949152730
-
Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function
-
Atlanta, IEEE
-
C., Chen, Y. Q., Shi, W., Chen, and G., Xuan, " Statistical moments based universal steganalysis using JPEG-2D array and 2-D characteristic function, " in, Proc. of ICIP, Atlanta, IEEE, pp. 105-108 (2006).
-
(2006)
Proc. of ICIP
, pp. 105-108
-
-
Chen, C.1
Shi, Y.Q.2
Chen, W.3
Xuan, G.4
-
29
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
Springer-Verlag GmbH (Jun.)
-
G., Xuan, Y. Q., Shi, J., Gao, D., Zou, C., Yang, C., Yang, Z., Zhang, P., Chai, C., Chen, and W., Chen, " Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions, " in, Proc. of 7th Int. Workshop on Information Hiding, Barcelona, Spain, Vol. 3727/2005, pp. 262-277, Springer-Verlag GmbH (Jun. 2005).
-
(2005)
Proc. of 7th Int. Workshoon Information Hiding, Barcelona, Spain
, vol.3727
, Issue.2005
, pp. 262-277
-
-
Xuan, G.1
Shi, Y.Q.2
Gao, J.3
Zou, D.4
Yang, C.5
Yang, C.6
Zhang, Z.7
Chai, P.8
Chen, C.9
Chen, W.10
-
30
-
-
54049086630
-
A steganalysis method based on contourlet transform coefficients
-
IEEE Computer Society, Washington, DC
-
H., Sajedi and M., Jamzad, " A steganalysis method based on contourlet transform coefficients, " in, Proc. of 4th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Harbin, China, pp. 245-248, IEEE Computer Society, Washington, DC (2008).
-
(2008)
Proc. of 4th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Harbin, China
, pp. 245-248
-
-
Sajedi, H.1
Jamzad, M.2
-
32
-
-
33847325331
-
Achieving higher stability in watermarking according to image complexity
-
M., Jamzad and F., Yaghmaee, " Achieving higher stability in watermarking according to image complexity, ", Scientia Iranica J., 13 (4), 404-412 (2006). (Pubitemid 46321900)
-
(2006)
Scientia Iranica
, vol.13
, Issue.4
, pp. 404-412
-
-
Jamzad, M.1
Yaghmaee, F.2
|