-
1
-
-
44649098085
-
A review on blind detection for image steganography
-
X. Y. Luo, D. S. Wang, P. Wang, and F. L. Liu, "A review on blind detection for image steganography," Signal Process. 88(9), 2138-2157 (2008).
-
(2008)
Signal Process.
, vol.88
, Issue.9
, pp. 2138-2157
-
-
Luo, X.Y.1
Wang, D.S.2
Wang, P.3
Liu, F.L.4
-
2
-
-
84937814312
-
F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis
-
Information Hiding
-
A. Westfeld, "F5 a steganographic algorithm: High capacity despite better steganalysis," in Proc. 4th Int. Workshop on Information Hiding, Pittsburgh, pp. 289-302, Springer Verlag, Berlin (2001). (Pubitemid 33367674)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 289-302
-
-
Westfeld, A.1
-
3
-
-
85084160704
-
Defending against statistical steganalysis
-
Washington, DC, USENIX Assoc., Berkeley, CA
-
N. Provos, "Defending against statistical steganalysis," in Proc. 10th Usenix Security Symp, Washington, DC, pp. 323-335, USENIX Assoc., Berkeley, CA (2001).
-
(2001)
Proc. 10th Usenix Security Symp
, pp. 323-335
-
-
Provos, N.1
-
4
-
-
14844326111
-
Model based steganography
-
Seoul, Korea, Springer Verlag, Berlin
-
P. Sallee, "Model based steganography," in Proc. Digital Watermarking: 2 Int. Workshop, Seoul, Korea, pp. 174-188, Springer Verlag, Berlin (2003).
-
(2003)
Proc. Digital Watermarking: 2 Int. Workshop
, pp. 174-188
-
-
Sallee, P.1
-
5
-
-
33645695370
-
A graph-theoretic approach to steganography
-
Salzburg, Austria, Springer Verlag, Berlin
-
S. Hetzl and P. Mutzel, "A graph-theoretic approach to steganography," in Proc. 9th Int. Conf. on Communications and Multimedia Security, Salzburg, Austria, pp. 119-128, Springer Verlag, Berlin (2005).
-
(2005)
Proc. 9th Int. Conf. on Communications and Multimedia Security
, pp. 119-128
-
-
Hetzl, S.1
Mutzel, P.2
-
6
-
-
0034775171
-
Steganalysis of watermarking techniques using image quality metrics
-
DOI 10.1117/12.435436
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis of watermarking techniques using image quality metrics," in Proc. Security and Watermarking of Multimedia Contents III, San Jose, Ca, pp. 523-531, SPIE Press, Bellingham, WA (2001). (Pubitemid 33012271)
-
(2001)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
8
-
-
33845426373
-
Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA)
-
4283 LNCS, Digital Watermarking - 5th International Workshop, IWDW 2006, Proceedings
-
G. R. Xuan, Y. Q. Shi, C. Huang, D. D. Fu, X. M. Zhu, P. Q. Chai, and J. J. Gao, "Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non-principal components analysis (CNPCA)," in Proc. of 5th Int. Workshop on Digital Watermarking, Cheju Island, South Korea, pp. 49-60, Springer Verlag, Berlin (2006). (Pubitemid 44891625)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 49-60
-
-
Xuan, G.1
Shi, Y.Q.2
Huang, C.3
Fu, D.4
Zhu, X.5
Chai, P.6
Gao, J.7
-
9
-
-
0038343416
-
Steganalysis using image quality metrics
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Trans. Image Process. 12(2), 221-229 (2003).
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
10
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
Rochester, NY
-
H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, pp. 905-908 (2002).
-
(2002)
Proc. IEEE Int. Conf. Image Processing
, pp. 905-908
-
-
Farid, H.1
-
11
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Berlin, Springer Verlag, Berlin
-
S. Lyu and H. Farid, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop on Information Hiding Information Hiding, Berlin, pp. 340-354, Springer Verlag, Berlin (2003).
-
(2003)
Proc. 5th Int. Workshop on Information Hiding Information Hiding
, pp. 340-354
-
-
Lyu, S.1
Farid, H.2
-
12
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
DOI 10.1109/TIFS.2006.890517
-
Y. Wang and P. Moulin, "Optimized feature extraction for learningbased image steganalysis," IEEE Trans. Inf. Forensics Security 2(1), 31-45 (2007). (Pubitemid 46375829)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
13
-
-
33746647772
-
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
-
Berlin, Springer Verlag, Berlin
-
G. R. Xuan, Y. Q. Shi, J. J. Gao, D. Zou, C. Y. Yang, Z. P. Zhang, P. Q. Chai, C. H. Chen, and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," in Proc. 4th Int. Workshop on Information Hiding, Berlin, pp. 262-277, Springer Verlag, Berlin (2005).
-
(2005)
Proc. 4th Int. Workshop on Information Hiding
, pp. 262-277
-
-
Xuan, G.R.1
Shi, Y.Q.2
Gao, J.J.3
Zou, D.4
Yang, C.Y.5
Zhang, Z.P.6
Chai, P.Q.7
Chen, C.H.8
Chen, W.9
-
14
-
-
42949152730
-
Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function
-
Atlanta
-
H. Chen, Y. Q. Shi, W. Chen, and G. R. Xuan, "Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function," in Proc. IEEE Int. Conf. on Image Processing, Atlanta, pp. 105-108 (2006).
-
(2006)
Proc. IEEE Int. Conf. on Image Processing
, pp. 105-108
-
-
Chen, H.1
Shi, Y.Q.2
Chen, W.3
Xuan, G.R.4
-
15
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
Alexandria, VA, Springer Verlag, Berlin
-
Y. Q. Shi, C. H. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int. Workshop on Information Hiding, Alexandria, VA, pp. 249-264, Springer Verlag, Berlin (2006).
-
(2006)
Proc. 8th Int. Workshop on Information Hiding
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.H.2
Chen, W.3
-
16
-
-
51749089283
-
JPEG image steganalysis utilizing both intrablock and interblock correlations
-
Seattle
-
C. H. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Proc. IEEE Int. Symp. on Circuits and Systems, Seattle, pp. 3029-3032 (2008).
-
(2008)
Proc. IEEE Int. Symp. on Circuits and Systems
, pp. 3029-3032
-
-
Chen, C.H.1
Shi, Y.Q.2
-
17
-
-
29044433896
-
A feature-based classification technique for blind image steganalysis
-
DOI 10.1109/TMM.2005.858377
-
W.-N. Lie and G.-S. Lin, "A feature-based classification technique for blind image steganalysis," IEEE Trans. Multimedia 7(6), 1007-1020 (2005). (Pubitemid 41789113)
-
(2005)
IEEE Transactions on Multimedia
, vol.7
, Issue.6
, pp. 1007-1020
-
-
Lie, W.-N.1
Lin, G.-S.2
-
18
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
San Jose, SPIE Press, Bellingham, WA
-
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," in Proc. 9th Conf. on Security, Steganography, and Watermarking of Multimedia Contents, San Jose, pp. 50503-50503, SPIE Press, Bellingham, WA (2007).
-
(2007)
Proc. 9th Conf. on Security, Steganography, and Watermarking of Multimedia Contents
, pp. 50503-50503
-
-
Pevný, T.1
Fridrich, J.2
-
19
-
-
60149088819
-
Steganalysis of JPEG images with joint transform features
-
Tokyo, Springer Verlag, Berlin
-
Z. Khan and A. Bin Mansoor, "Steganalysis of JPEG images with joint transform features," in Proc. 3rd Pacific-Rim Symposium on Image and Video Technology, Tokyo, pp. 965-975, Springer Verlag, Berlin (2009).
-
(2009)
Proc. 3rd Pacific-Rim Symposium on Image and Video Technology
, pp. 965-975
-
-
Khan, Z.1
Bin Mansoor, A.2
-
20
-
-
56749154804
-
On completeness of feature spaces in steganalysis
-
Oxford, ACM, New York
-
J. Kodovský and J. Fridrich, "On Completeness of Feature Spaces in Steganalysis," in Proc. 10th ACM Workshop on Multimedia and Security, Oxford, pp. 123-132, ACM, New York (2008).
-
(2008)
Proc. 10th ACM Workshop on Multimedia and Security
, pp. 123-132
-
-
Kodovský, J.1
Fridrich, J.2
-
21
-
-
56749170425
-
Multi-class detector of current steganographic methods for JPEG format
-
T. Pevný and J. Fridrich, "Multi-class detector of current steganographic methods for JPEG format," IEEE Trans. Inf. Forensics Security 3(4), 635-650 (2008).
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 635-650
-
-
Pevný, T.1
Fridrich, J.2
-
22
-
-
56749097011
-
Novelty detection in blind steganalysis
-
Oxford, ACM, New York
-
T. Pevný and J. Fridrich, "Novelty detection in blind steganalysis," in Proc. 10th ACM Workshop on Multimedia and Security, Oxford, pp. 167-176, ACM, New York (2008).
-
(2008)
Proc. 10th ACM Workshop on Multimedia and Security
, pp. 167-176
-
-
Pevný, T.1
Fridrich, J.2
-
23
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th ACM Workshop on Multimedia & Security, Dallas, pp. 3-14, ACM, New York (2007). (Pubitemid 351203799)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
-
24
-
-
80455127868
-
Influence of embedding strategies on security of steganographic methods in the JPEG domain
-
San Jose, SPIE Press, Bellingham, WA
-
J. Kodovský and J. Fridrich, "Influence of embedding strategies on security of steganographic methods in the JPEG domain," in Proc. Conf. on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, pp. 0201-0203, SPIE Press, Bellingham, WA (2008).
-
(2008)
Proc. Conf. on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, pp. 0201-0203
-
-
Kodovský, J.1
Fridrich, J.2
-
25
-
-
0036871099
-
Context-based entropy coding of block transform coefficients for image compression
-
J. Tu and T. D. Tran, "Context-based entropy coding of block transform coefficients for image compression," IEEE Trans. Image Process. 11(11), 1271-1283 (2002).
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.11
, pp. 1271-1283
-
-
Tu, J.1
Tran, T.D.2
-
26
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. J. C. Burges, "A tutorial on support vector machines for pattern recognition," Data Min. Knowl. Discov. 2(2), 121-167 (1998). (Pubitemid 128695475)
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
29
-
-
80455161894
-
Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images
-
San Jose, SPIE Press, Bellingham, WA
-
T. Pevný and J. Fridrich, "Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images," in Proc. Conf. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, pp. 1101-1113, SPIE Press, Bellingham, WA (2008).
-
(2008)
Proc. Conf. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, pp. 1101-1113
-
-
Pevný, T.1
Fridrich, J.2
-
30
-
-
34548832563
-
Effect of recompression on attacking JPEG steganographic schemes - An experimental study
-
4252876, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
-
Y. Q. Shi, C. H. Chen, W. Chen, and M. P. Kaundinya, "Effect of recompression on attacking JPEG steganographic schemes-An experimental study," in Proc. IEEE Int. Symp. on Circuits and Systems, New Orleans, pp. 1265-1268, IEEE, Piscataway, NJ (2007). (Pubitemid 47448746)
-
(2007)
Proceedings - IEEE International Symposium on Circuits and Systems
, pp. 1265-1268
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
Kaundinya, M.P.4
-
31
-
-
34250775433
-
JPEG steganalysis using empirical transition matrix in block DCT domain
-
Victoria, Canada, IEEE, Piscataway, NJ
-
D. D. Fu, Y. Q. Shi, D. K. Zou, and G. R. Xuan, "JPEG steganalysis using empirical transition matrix in block DCT domain," in Proc. IEEE Workshop on Multimedia Signal Processing, Victoria, Canada, pp. 310-313, IEEE, Piscataway, NJ (2006).
-
(2006)
Proc. IEEE Workshop on Multimedia Signal Processing
, pp. 310-313
-
-
Fu, D.D.1
Shi, Y.Q.2
Zou, D.K.3
Xuan, G.R.4
|