-
2
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, "Digital image steganography: survey and analysis of current methods," Signal Process. 90(3), 727-752 (2010).
-
(2010)
Signal Process.
, vol.90
, Issue.3
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Mc Kevitt, P.4
-
3
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
J. Fridrich, T. Pevny, and J. Kodovsky, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. ACM 9th Workshop on Multimedia and Security, Dallas, Texas, pp. 3-14, ACM, Washington, DC (2007). (Pubitemid 351203799)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
-
4
-
-
85084160704
-
Defending against statistical steganalysis
-
ACM, Washington DC
-
N. Provos, "Defending Against Statistical Steganalysis," in Proc. 10th USENIX Security Symposium, pp. 323-335, ACM, Washington DC (2001).
-
(2001)
Proc. 10th USENIX Security Symposium
, pp. 323-335
-
-
Provos, N.1
-
5
-
-
84937814312
-
F5-a steganographic algorithm: high capacity despite better steganalysis
-
Information Hiding
-
A. Westfeld, "High Capacity Despite Better Steganalysis (F5-A SteganographicAlgorithm)," in 4th Intl.Workshop on InformationHiding, Lect. Notes Comp. Sci. 2137, 289-302 (2001). (Pubitemid 33367674)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 289-302
-
-
Westfeld, A.1
-
6
-
-
35048819204
-
Model-based steganography
-
P. Sallee, "Model-based steganography," in Proc. Intl. Workshop Digital Watermarking, Lect. Notes Comp. Sci. 2939, 154-167 (2003). (Pubitemid 38334550)
-
(2003)
Lecture Notes in Computer Science
, Issue.2939
, pp. 154-167
-
-
Sallee, P.1
-
7
-
-
30744445178
-
Perturbed quantization steganography
-
DOI 10.1007/s00530-005-0194-3
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography," ACM Multimedia System Journal 11(2), 98-107 (2005). (Pubitemid 43099511)
-
(2005)
Multimedia Systems
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
8
-
-
49949091527
-
YASS: Yet another steganographic scheme that resists blind steganalysis
-
K. Solanki, A. Sarkar, and B. S. Manjunath, "YASS: Yet another steganographic scheme that resists blind steganalysis," in Proc. 9th Intl. Information Hiding Workshop, Lect. Notes Comp. Sci. 4567, 16-31 (2007).
-
(2007)
Proc. 9th Intl. Information Hiding Workshop, Lect. Notes Comp. Sci.
, vol.4567
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
9
-
-
44649167523
-
High-performance JPEG steganography using complementary embedding strategy
-
C. Liu and S. Liao, "High-performance JPEG steganography using complementary embedding strategy," Pattern Recogn. 41, 2945-2955 (2008).
-
(2008)
Pattern Recogn.
, vol.41
, pp. 2945-2955
-
-
Liu, C.1
Liao, S.2
-
10
-
-
55549107155
-
PM1 steganography in JPEG images using genetic algorithm
-
L. Yu, Y. Zhao, R. Ni, and Z. Zhu, "PM1 steganography in JPEG images using genetic algorithm," Soft Comput. 13(4), 393-400 (2009).
-
(2009)
Soft Comput.
, vol.13
, Issue.4
, pp. 393-400
-
-
Yu, L.1
Zhao, Y.2
Ni, R.3
Zhu, Z.4
-
11
-
-
44649098085
-
A review on blind detection for image steganography
-
X. Y. Luo, D. S. Wang, P. Wang, and F. L. Liu, "A review on blind detection for image steganography," Signal Process. 88(9), 2138-2157 (2008).
-
(2008)
Signal Process.
, vol.88
, Issue.9
, pp. 2138-2157
-
-
Luo, X.Y.1
Wang, D.S.2
Wang, P.3
Liu, F.L.4
-
12
-
-
2642549992
-
Attacking the outguess
-
ACM, Juan-les-Pins, France
-
J. Fridrich, M. Goljan, and D. Hogea, "Attacking the outguess," in Proc. ACM Workshop Multimedia Security, ACM, Juan-les-Pins, France (2002).
-
(2002)
Proc. ACM Workshop Multimedia Security
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
13
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
S. Dumitrescu,X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," IEEE Trans. Signal Process. 51(7), 1995-2007 (2003).
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescux. Wu, S.1
Wang, Z.2
-
14
-
-
20444447558
-
Steganalysis of quantization index modulation data hiding
-
2004 International Conference on Image Processing, ICIP 2004
-
K. Sullivan, Z. Bi, U. Madhow, S. Chandrasekaran, B. S. Manjunath, "Steganalysis of quantization index modulation data hiding," in Proc. IEEE Int. Conf. Image Processing, pp. 1165-1168, IEEE, Singapore (2004). (Pubitemid 40820246)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.5
, pp. 1165-1168
-
-
Sullivan, K.1
Bi, Z.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.S.5
-
15
-
-
21844460833
-
Security, steganography, and watermarking of multimedia contents VII
-
IS&T and SPIE, San Jose, CA
-
K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, "Security, Steganography, and Watermarking of Multimedia Contents VII," in Proc. IST/SPIE 17th Annu. Symp. Electron. Imaging Sci. Technol. pp. 38-46, IS&T and SPIE, San Jose, CA (2005).
-
(2005)
Proc. IST/SPIE 17th Annu. Symp. Electron. Imaging Sci. Technol.
, pp. 38-46
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.S.4
-
16
-
-
33845385696
-
Category attack for LSB steganalysis of JPEG images
-
Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
K. Lee, A. Westfeld, and S. Lee, "Category attack for LSB steganalysis of JPEG images," in InternationalWorkshop on DigitalWatermarking, Y. Q. Shi, B. Jeon, Eds., Lect. Notes Comp. Sci. 4283, 35-48 (2006). (Pubitemid 44891624)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4283
, pp. 35-48
-
-
Kwangsoo, L.1
Westfeld, A.2
Sangjin, L.3
-
18
-
-
56749160543
-
Steganalysis of YASS
-
ACM, Oxford, United Kingdom
-
B. Li, Y. Shi, and J. Huang, "Steganalysis of YASS," in Proc. 10th ACM Workshop on Multimedia and Security, pp. 139-148, ACM, Oxford, United Kingdom (2008).
-
(2008)
Proc. 10th ACM Workshop on Multimedia and Security
, pp. 139-148
-
-
Li, B.1
Shi, Y.2
Huang, J.3
-
19
-
-
0034775171
-
Steganalysis of watermarking techniques using image quality metrics
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis of watermarking techniques using image quality metrics," in Security andWatermarking of Multimedia Contents II, Proc. SPIE 4314, 523-531 (2000).
-
(2000)
Security AndWatermarking of Multimedia Contents II Proc. SPIE
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
20
-
-
0036530067
-
Statistical evaluation of image quality measures
-
DOI 10.1117/1.1455011
-
I. Avcibas, B. Sankur, and K. Sayood, "Statistical evaluation of image quality measures," J. Electron. Imaging 11(2), 206-223 (2002). (Pubitemid 34536986)
-
(2002)
Journal of Electronic Imaging
, vol.11
, Issue.2
, pp. 206-223
-
-
Avcibas, I.1
Sankur, B.2
Sayood, K.3
-
21
-
-
0038343416
-
Steganalysis using image quality metrics
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Trans. Image Process. 12(2), 221-229 (2003).
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
22
-
-
0004064292
-
Detecting steganographic messages in digital images
-
Dartmouth College, Hanover, NH
-
H. Farid, "Detecting steganographic messages in digital images," Technical Report TR2001-412, Dartmouth College, Hanover, NH (2001).
-
(2001)
Technical Report TR2001-412
-
-
Farid, H.1
-
24
-
-
0141607645
-
Wavelet based steganalysis using a computational immune system approach
-
J. T. Jackson, G. H. Gunsch, R. L. Claypoole, and G. B. Lamont, "Wavelet based steganalysis using a computational immune system approach," in Visual Communications and Image Processing, Proc. SPIE 5150, 1884-1894 (2003).
-
(2003)
Visual Communications and Image Processing Proc. SPIE
, vol.5150
, pp. 1884-1894
-
-
Jackson, J.T.1
Gunsch, G.H.2
Claypoole, R.L.3
Lamont, G.B.4
-
25
-
-
33646134392
-
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
-
T. Holotyak, J. Fridrich, and S. Voloshynovskiy, "Blind statistical steganalysis of additive steganography using wavelet higher order statistics," in Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Lect. Notes Comp. Sci. 3677, 273-274 (2005).
-
(2005)
Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Lect. Notes Comp. Sci.
, vol.3677
, pp. 273-274
-
-
Holotyak, T.1
Fridrich, J.2
Voloshynovskiy, S.3
-
26
-
-
77954397333
-
Image steganalysis based on spatial domain and DWT domain features
-
IEEE, Wuhan, Hubei, China
-
C. Liu, C. Ouyang, M. Guo, and H. Chen, "Image Steganalysis Based on Spatial Domain and DWT Domain Features," 2nd Intl. Conf. Networks Security, Wireless Communications and Trusted Computing, pp. 329-331, IEEE, Wuhan, Hubei, China (2010).
-
2nd Intl. Conf. Networks Security, Wireless Communications and Trusted Computing
, vol.2010
, pp. 329-331
-
-
Liu, C.1
Ouyang, C.2
Guo, M.3
Chen, H.4
-
28
-
-
34548232251
-
Merging Markov and DCT features for multiclass JPEG steganalysis
-
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multiclass JPEG steganalysis," in Electron. Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proc. SPIE 6505, 650503 (2007).
-
(2007)
Electron. Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX Proc. SPIE
, vol.6505
, pp. 650503
-
-
Pevný, T.1
Fridrich, J.2
-
29
-
-
70449646940
-
Calibration revisited
-
ACM, Princeton, NJ
-
J. Kodovský and J. Fridrich, "Calibration revisited," in Proc. 11th ACM Workshop on Multimedia and Security, pp. 63-74, ACM, Princeton, NJ (2009).
-
(2009)
Proc. 11th ACM Workshop on Multimedia and Security
, pp. 63-74
-
-
Kodovský, J.1
Fridrich, J.2
-
30
-
-
34147139894
-
Blind image steganalysis based on statistical analysis of empirical matrix
-
DOI 10.1109/ICPR.2006.332, 1699719, Proceedings - 18th International Conference on Pattern Recognition, ICPR 2006
-
X. C. Chen, Y. H. Wang, T. N. Tan, and L. Guo, "Blind image steganalysis based on statistical analysis of empirical matrix," in Proc. 18th Intl. Conf. Pattern Recognition, Vol. 3, 1107-1110, IEEE, Hong Kong, China (2006). (Pubitemid 46553314)
-
(2006)
Proceedings - International Conference on Pattern Recognition
, vol.3
, pp. 1107-1110
-
-
Chen, X.1
Wang, Y.2
Tan, T.3
Guo, L.4
-
31
-
-
34250775433
-
JPEG steganalysis using empirical transitionmatrix in block DCT domain
-
IEEE, Victoria, BC, Canada
-
D. D. Fu, Y. Q. Shi, D. K. Zou, and G. R. Xuan, "JPEG steganalysis using empirical transitionmatrix in block DCT domain," in Proc. IEEE Intl. Workshop Multimedia Signal Processing, pp. 310-313, IEEE, Victoria, BC, Canada (2006).
-
(2006)
Proc. IEEE Intl. Workshop Multimedia Signal Processing
, pp. 310-313
-
-
Fu, D.D.1
Shi, Y.Q.2
Zou, D.K.3
Xuan, G.R.4
-
32
-
-
33845426373
-
Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA)
-
Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
G. R. Xuan, Y. Q. Shi, C. Huang, D. D. Fu, X. M. Zhu, P. Q. Chai, and J. J. Gao, "Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA)," in Proc. Intl. Workshop Digital Watermarking, Lect. Notes Comp. Sci. 4283, 49-60 (2006). (Pubitemid 44891625)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4283
, pp. 49-60
-
-
Xuan, G.1
Shi, Y.Q.2
Huang, C.3
Fu, D.4
Zhu, X.5
Chai, P.6
Gao, J.7
-
33
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
J. J. Harmsen and W. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Electron. Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Proc. SPIE 5020, 131-142 (2003).
-
(2003)
Electron. Imaging, Security, Steganography, and Watermarking of Multimedia Contents v Proc. SPIE
, vol.5020
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
34
-
-
29044433896
-
A feature-based classification technique for blind image steganalysis
-
W. N. Lie and G. S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Trans. Multimedia 7(6), 1007-1020 (2005).
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.6
, pp. 1007-1020
-
-
Lie, W.N.1
Lin, G.S.2
-
35
-
-
80055096091
-
JPEG image steganalysis using joint discrete cosine transform domain features
-
Z. Xia, X. Sun,W. Liang, J. Qin, and F. Li, "JPEG image steganalysis using joint discrete cosine transform domain features," J. Electron. Imaging 19, 023006 (2010).
-
(2010)
J. Electron. Imaging
, vol.19
, pp. 023006
-
-
Xia, Z.1
Sunw. Liang, X.2
Qin, J.3
Li, F.4
-
36
-
-
80055086123
-
ABS: Adaptive batch steganography
-
H. Sajedi and M. Jamzad, "ABS: Adaptive Batch Steganography," J. Opt. Eng. 48(8), 087002 (2009).
-
(2009)
J. Opt. Eng.
, vol.48
, Issue.8
, pp. 087002
-
-
Sajedi, H.1
Jamzad, M.2
-
37
-
-
0022808786
-
A computational approach to edge detection
-
J. Canny, "A computational approach to edge detection," IEEE Trans. Pattern Anal. Mach. Intell. 8, 679-698 (1986).
-
(1986)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.8
, pp. 679-698
-
-
Canny, J.1
|