-
1
-
-
78049291761
-
A reversible data hiding scheme using complementary embedding strategy
-
C.-C. Chang, and T.D. Kieu A reversible data hiding scheme using complementary embedding strategy Inform. Sci. 180 16 2010 3045 3058
-
(2010)
Inform. Sci.
, vol.180
, Issue.16
, pp. 3045-3058
-
-
Chang, C.-C.1
Kieu, T.D.2
-
3
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
S. Dumitrescu, X. Wu, and Z. Wang Detection of LSB steganography via sample pair analysis IEEE Trans. Signal Process. 51 7 2003 1995 2007
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
4
-
-
0034787093
-
Reliable detection of LSB steganography in color and grayscale images
-
J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in color and grayscale images, in: Proceedings ACM Workshop Multimedia and Security, 2001, pp. 27-30. (Pubitemid 32962403)
-
(2001)
Proceedings of the ACM International Multimedia Conference and Exhibition
, Issue.2
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
5
-
-
62349133484
-
A secure covert communication model based on video steganography
-
A.A. Hanafy, G.I. Salama, Y.Z. Mohasseb, A secure covert communication model based on video steganography, in: Proceedings of the 2008 IEEE Military Communications Conference, 2008, pp. 1-6.
-
(2008)
Proceedings of the 2008 IEEE Military Communications Conference
, pp. 1-6
-
-
Hanafy, A.A.1
Salama, G.I.2
Mohasseb, Y.Z.3
-
6
-
-
16244407385
-
Time-spread echo method for digital audio watermarking
-
DOI 10.1109/TMM.2005.843366
-
B.-S. Ko, R. Nishimura, and Y. Suzuki Time-spread echo method for digital audio watermarking IEEE Trans. Multimedia 7 2 2005 212 221 (Pubitemid 40454751)
-
(2005)
IEEE Transactions on Multimedia
, vol.7
, Issue.2
, pp. 212-221
-
-
Ko, B.-S.1
Nishimura, R.2
Suzuki, Y.3
-
7
-
-
49049099444
-
Secure steganography in compressed video bitstreams
-
B. Liu, F. Liu, C. Yang, Y. Sun, Secure steganography in compressed video bitstreams, in: Proceedings of the 3rd International Conference on Availability, Reliability and Security, 2008, pp. 1382-1387.
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability and Security
, pp. 1382-1387
-
-
Liu, B.1
Liu, F.2
Yang, C.3
Sun, Y.4
-
8
-
-
34948833733
-
Image complexity and feature mining for steganalysis of least significant bit matching steganography
-
DOI 10.1016/j.ins.2007.08.007, PII S0020025507003829
-
Q. Liu, A.H. Sung, B. Ribeiro, M. Wei, Z. Chen, and J. Xu Image complexity and feature mining for steganalysis of least significant bit matching steganography Inform. Sci. 178 1 2008 21 36 (Pubitemid 47531791)
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 21-36
-
-
Liu, Q.1
Sung, A.H.2
Ribeiro, B.3
Wei, M.4
Chen, Z.5
Xu, J.6
-
9
-
-
33847748545
-
A new steganographic method for data hiding in microsoft word documents by a change tracking technique
-
DOI 10.1109/TIFS.2006.890310
-
T.-Y. Liu, and W.-H. Tsai A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique IEEE Trans. Inf. Forens. Security 2 1 2007 24 30 (Pubitemid 46375828)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.1
, pp. 24-30
-
-
Liu, T.-Y.1
Tsai, W.-H.2
-
10
-
-
51749119264
-
A steganographic algorithm for hiding data in PDF files based on equivalent transformation
-
X. Liu, Q. Zhang, C. Tang, J. Zhao, J. Liu, A steganographic algorithm for hiding data in PDF files based on equivalent transformation, in: Proceedings of the 2008 International Symposium on Information Processing (ISIP), 2008, pp. 417-421.
-
(2008)
Proceedings of the 2008 International Symposium on Information Processing (ISIP)
, pp. 417-421
-
-
Liu, X.1
Zhang, Q.2
Tang, C.3
Zhao, J.4
Liu, J.5
-
11
-
-
46449107334
-
An efficient linguistic steganography for Chinese text
-
Y. Liu, X. Sun, C. Gan, H. Wang, An efficient linguistic steganography for Chinese text, in: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 2094-2097.
-
(2007)
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo
, pp. 2094-2097
-
-
Liu, Y.1
Sun, X.2
Gan, C.3
Wang, H.4
-
12
-
-
0036329257
-
Steganographic method for secure communications
-
DOI 10.1016/S0167-4048(02)00515-1
-
D.-C. Lou, and J.-L. Liu Steganographic method for secure communications Comput. Security 21 5 2002 449 460 (Pubitemid 34835645)
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 449-460
-
-
Lou, D.-C.1
Liu, J.-L.2
-
13
-
-
2642515522
-
A steganographic scheme for secure communications based on the chaos and Euler theorem
-
D.-C. Lou, and C.-H. Sung A steganographic scheme for secure communications based on the chaos and Euler theorem IEEE Trans. Multimedia 6 3 2004 501 509
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.3
, pp. 501-509
-
-
Lou, D.-C.1
Sung, C.-H.2
-
14
-
-
49249096162
-
Novel steganalysis schemes for BPCS steganography
-
D.-C. Lou, C.-L. Lin, and C.-L. Liu Novel steganalysis schemes for BPCS steganography Imaging Sci. J. 56 4 2008 232 242
-
(2008)
Imaging Sci. J.
, vol.56
, Issue.4
, pp. 232-242
-
-
Lou, D.-C.1
Lin, C.-L.2
Liu, C.-L.3
-
15
-
-
78049351319
-
Reversible data hiding based on block median preservation
-
H. Luo, F.-X. Yu, H. Chen, Z.-L. Huang, H. Li, and P.-H. Wang Reversible data hiding based on block median preservation Inform. Sci. 181 2 2011 308 328
-
(2011)
Inform. Sci.
, vol.181
, Issue.2
, pp. 308-328
-
-
Luo, H.1
Yu, F.-X.2
Chen, H.3
Huang, Z.-L.4
Li, H.5
Wang, P.-H.6
-
16
-
-
77952620028
-
Edge adaptive image steganography based on lsb matching revisited
-
W. Luo, F. Huang, and J. Huang Edge adaptive image steganography based on lsb matching revisited IEEE Trans. Inf. Forens. Security 5 2 2010 201 214
-
(2010)
IEEE Trans. Inf. Forens. Security
, vol.5
, Issue.2
, pp. 201-214
-
-
Luo, W.1
Huang, F.2
Huang, J.3
-
17
-
-
33645988833
-
A steganographic method for digital images robust to RS steganalysis
-
A.R.S. Maral, P.R. Pereira, A steganographic method for digital images robust to RS steganalysis, in: International Conference on Image Analysis and Recognition, Toronto, Canada, Lecture Notes in Computer Science, vol. 3656, 2005, pp. 1192-1199.
-
(2005)
International Conference on Image Analysis and Recognition, Toronto, Canada, Lecture Notes in Computer Science
, vol.3656
, pp. 1192-1199
-
-
Maral, A.R.S.1
Pereira, P.R.2
-
19
-
-
0036959092
-
Application of bit-plane decomposition steganography to JPEG2000 encoded images
-
H. Noda, J. Spaulding, M.N. Shirazi, and E. Kawaguchi Application of bit-plane decomposition steganography to JPEG2000 encoded images IEEE Signal Process. Lett. 9 12 2002 410 413
-
(2002)
IEEE Signal Process. Lett.
, vol.9
, Issue.12
, pp. 410-413
-
-
Noda, H.1
Spaulding, J.2
Shirazi, M.N.3
Kawaguchi, E.4
-
20
-
-
0141847715
-
Data hiding within audio signals
-
R. Petrovic, J.M. Winograd, K. Jemili, E. Metois, Data hiding within audio signals, in: Proceedings of the 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, 1999, pp. 88-95.
-
(1999)
Proceedings of the 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services
, pp. 88-95
-
-
Petrovic, R.1
Winograd, J.M.2
Jemili, K.3
Metois, E.4
-
22
-
-
64949188092
-
Adaptive wavelet packet based audio steganography using data history
-
P. Shah, P. Choudhari, S. Sivaraman, Adaptive wavelet packet based audio steganography using data history, in: Proceedings of the 2008 IEEE Region 10 and the 3rd International Conference on Industrial and Information Systems, 2008, pp. 1-5.
-
(2008)
Proceedings of the 2008 IEEE Region 10 and the 3rd International Conference on Industrial and Information Systems
, pp. 1-5
-
-
Shah, P.1
Choudhari, P.2
Sivaraman, S.3
-
23
-
-
0036833013
-
BPCS steganography using EZW lossy compressed images
-
DOI 10.1016/S0167-8655(02)00122-8, PII S0167865502001228
-
J. Spaulding, H. Noda, M. Shirazi, and E. Kawaguchi BPCS steganography using EZW lossy compressed image Pattern Recognit. Lett. 23 13 2002 1579 1587 (Pubitemid 34731681)
-
(2002)
Pattern Recognition Letters
, vol.23
, Issue.13
, pp. 1579-1587
-
-
Spaulding, J.1
Noda, H.2
Shirazi, M.N.3
Kawaguchi, E.4
-
24
-
-
35848929919
-
A high quality steganographic method with pixel-value differencing and modulus function
-
DOI 10.1016/j.jss.2007.01.049, PII S0164121207000593
-
C.-M. Wang, N. -I Wu, C.-S. Tsai, and M.-S. Hwang A high quality steganographic method with pixel-value differencing and modulus function J. Syst. Softw. 81 2008 150 158 (Pubitemid 350060985)
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.1
, pp. 150-158
-
-
Wang, C.-M.1
Wu, N.-I.2
Tsai, C.-S.3
Hwang, M.-S.4
-
25
-
-
14844354093
-
Steganography of capacity required using modulo operator for embedding secret image
-
DOI 10.1016/j.amc.2004.04.059, PII S009630030400298X
-
S.-J. Wang Steganography of capacity required using modulo operator for embedding secret image Appl. Math. Comput. 164 2005 99 116 (Pubitemid 40356139)
-
(2005)
Applied Mathematics and Computation
, vol.164
, Issue.1
, pp. 99-116
-
-
Wang, S.-J.1
-
26
-
-
58149168474
-
A chaos-based steganography algorithm for H.264 standard video sequences
-
B. Wang, J. Feng, A chaos-based steganography algorithm for H.264 standard video sequences, in: Proceedings of the 2008 International Conference Communications, Circuits and Systems, 2008, pp. 750-753.
-
(2008)
Proceedings of the 2008 International Conference Communications, Circuits and Systems
, pp. 750-753
-
-
Wang, B.1
Feng, J.2
-
27
-
-
0001849187
-
Attacks on steganographic systems
-
Dresden, Germany
-
A. Westfeld, A. Pfitzmann, Attacks on steganographic systems, in: Proceedings of the 3rd International Workshop on Information Hiding, Dresden, Germany, 1999, pp. 61-76.
-
(1999)
Proceedings of the 3rd International Workshop on Information Hiding
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
28
-
-
79953280614
-
Reversible steganography based on side match and hit pattern for VQ-compressed images
-
C.-H. Yang, W.-J. Wang, C.-T. Huang, and S.-J. Wang Reversible steganography based on side match and hit pattern for VQ-compressed images Inform.sci. 181 11 2011 2218 2230
-
(2011)
Inform.sci.
, vol.181
, Issue.11
, pp. 2218-2230
-
-
Yang, C.-H.1
Wang, W.-J.2
Huang, C.-T.3
Wang, S.-J.4
-
29
-
-
77956618202
-
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions
-
T. Zhang, W. Li, Y. Zhang, E. Zheng, and X. Ping Steganalysis of LSB matching based on statistical modeling of pixel difference distributions Inform. Sci. 180 23 2010 4685 4694
-
(2010)
Inform. Sci.
, vol.180
, Issue.23
, pp. 4685-4694
-
-
Zhang, T.1
Li, W.2
Zhang, Y.3
Zheng, E.4
Ping, X.5
-
30
-
-
35848940085
-
Data hiding in a kind of pdf texts for secret communication
-
S. Zhong, X. Cheng, and T. Chen Data hiding in a kind of pdf texts for secret communication Int. J. Netw. Security 4 1 2007 17 26
-
(2007)
Int. J. Netw. Security
, vol.4
, Issue.1
, pp. 17-26
-
-
Zhong, S.1
Cheng, X.2
Chen, T.3
-
31
-
-
84855455185
-
-
CBIR Image Database, University of Washington, October 2010
-
CBIR Image Database, University of Washington, October 2010. .
-
-
-
-
32
-
-
84855459279
-
-
Uncompressed Colour Image Database (UCID), October 2010
-
Uncompressed Colour Image Database (UCID), October 2010. .
-
-
-
|