-
1
-
-
42749099027
-
Statistically secure digital image data hiding
-
Amin, P.K., Liu, N. and Subbalakshmi, K.P. (2005) 'Statistically secure digital image data hiding', IEEE 7th Workshop on Multimedia Signal Processing, pp.1-4.
-
(2005)
IEEE 7th Workshop on Multimedia Signal Processing
, pp. 1-4
-
-
Amin, P.K.1
Liu, N.2
Subbalakshmi, K.P.3
-
2
-
-
0038343416
-
Steganalysis using image quality metrics
-
Avcibas, I., Memon, N. and Sankur, B. (2003) 'Steganalysis using image quality metrics', IEEE Transactions on Image Processing, Vol. 12, No. 2, pp.221-229.
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
3
-
-
3042519430
-
An information-theoretic model for steganography
-
Cachin, C. (2004) 'An information-theoretic model for steganography', Information and Computation, Vol. 192, No. 1, pp.41-56.
-
(2004)
Information and Computation
, vol.192
, Issue.1
, pp. 41-56
-
-
Cachin, C.1
-
4
-
-
0035167458
-
Analysis of LSB based image steganography techniques
-
Chandramouli, R. and Memon, N. (2001) 'Analysis of LSB based image steganography techniques', Proc. IEEE International Conference on Image Processing, Vol. 3, No. 3, pp.1019-1022. (Pubitemid 33058162)
-
(2001)
IEEE International Conference on Image Processing
, vol.3
, pp. 1019-1022
-
-
Chandramouli, R.1
Memon, N.2
-
5
-
-
33847692468
-
Image steganography and steganalysis: Concepts and practice
-
Chandramouli, R., Kharrazi, M. and Memon, N. (2003) 'Image steganography and Steganalysis: Concepts and Practice', Proc. SPIE Security and Watermarking of Multimedia Contents, Special session on Steganalysis, pp.35-49. (Pubitemid 38334541)
-
(2003)
Lecture Notes in Computer Science
, Issue.2939
, pp. 35-49
-
-
Chandramouli, R.1
Kharrazi, M.2
Memon, N.3
-
7
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
Chen, B. and Wornell, G.W. (2001) 'Quantization index modulation: a class of provably good methods for digital watermarking and information embedding', IEEE Transactions on Information Theory, pp.1423-1443. (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
8
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
Christopher, B.J.C. (1998) 'A tutorial on support vector machines for pattern recognition', Data Mining and Knowledge Discovery, Vol. 2, pp.121-167.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, pp. 121-167
-
-
Christopher, B.J.C.1
-
9
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
Dumitrescu, S., Wu, X. and Wang, Z. (2003) 'Detection of LSB steganography via sample pair analysis', IEEE Transactions on Signal Processing, Vol. 51, No. 7, pp.1995-2007.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
10
-
-
70350562893
-
The square root law of steganographic capacity for Markov covers
-
Filler, T. Ker, A.D. and Fridrich, J. (2009) 'The square root law of steganographic capacity for markov covers', Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, Vol. 7254, No. 8, pp.1-11.
-
(2009)
Proc. SPIE, Electronic Imaging, Media Forensics and Security XI
, vol.7254
, Issue.8
, pp. 1-11
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
11
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
Fridrich, J., Pevný, T. and Kodovský, J. (2007) 'Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities', Proc. ACM, pp.3-14. (Pubitemid 351203799)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
-
12
-
-
20444476696
-
QIM watermarking games
-
2004 International Conference on Image Processing, ICIP 2004
-
Goteti, A.K. and Moulin, P. (2007) 'QIM watermarking games', Proc. International Conference on Image Processing, Vol. 2, pp.717-720. (Pubitemid 40820134)
-
(2004)
Proceedings - International Conference on Image Processing, ICIP
, vol.5
, pp. 717-720
-
-
Goteti, A.K.1
Moulin, P.2
-
13
-
-
0242414140
-
Steganalysis of additive noise modelable information hiding
-
Harmsen, J.J. and Pearlman, W.A. (2003) 'Steganalysis of additive noise modelable information hiding', Proc. SPIE Electronic Imaging, pp.21-24.
-
(2003)
Proc. SPIE Electronic Imaging
, pp. 21-24
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
14
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
Johnson, N.F. and Jajodia, S. (1998) 'Exploring steganography: seeing the unseen', Signal Processing Laboratory (EPLF), IEEE Computer, Vol. 31, No. 2, pp.26-34. (Pubitemid 128555329)
-
(1998)
Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
15
-
-
0001931684
-
A survey of steganographic techniques
-
Johnson, N.F. and Jajodia, S. (2000) 'A survey of steganographic techniques', Information Hiding, pp.43-78.
-
(2000)
Information Hiding
, pp. 43-78
-
-
Johnson, N.F.1
Jajodia, S.2
-
16
-
-
33746613626
-
A general framework for the structural steganalysis of LSB replacement
-
LNCS 3727
-
Ker, A.D. (2005) 'A general framework for the structural steganalysis of LSB replacement', Proc. 7th Information Hiding Workshop, Vol. LNCS 3727, pp.296-311.
-
(2005)
Proc. 7th Information Hiding Workshop
, pp. 296-311
-
-
Ker, A.D.1
-
17
-
-
33947707398
-
Security and robustness enhancement for image data hiding
-
DOI 10.1109/TMM.2006.888005
-
Liu, N., Amin, P. and Subbalakshmi, K.P. (2007) 'Joint security and robustness enhancement for quantization based data embedding', IEEE Transactions on Circuits and Systems for Video Technology, Vol. 9, No. 3, pp.466-474. (Pubitemid 46486584)
-
(2007)
IEEE Transactions on Multimedia
, vol.9
, Issue.3
, pp. 466-474
-
-
Liu, N.1
Amin, P.2
Subbalakshmi, K.P.3
-
18
-
-
33644999904
-
Steganalysis using higherorder image statistics
-
Lyu, S. and Farid, H. (2006) 'Steganalysis using higherorder image statistics', IEEE Transactions on Information Forensics and Security, Vol. 1, No. 1, pp.111-119.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
19
-
-
42949085230
-
Nonparametric steganalysis of qim data hiding using approximate entropy
-
Malik, H., Subbalakshmi, K.P. and Chandramouli, R. (2008) 'Nonparametric steganalysis of qim data hiding using approximate entropy', Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X, Vol. 6819, pp.1-12.
-
(2008)
Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X
, vol.6819
, pp. 1-12
-
-
Malik, H.1
Subbalakshmi, K.P.2
Chandramouli, R.3
-
20
-
-
33144467852
-
On joint coding for watermarking and encryption
-
DOI 10.1109/TIT.2005.860427
-
Merhav, N. (2006) 'On joint coding for watermarking and encryption', IEEE Transactions on Information Theory, Vol. 52, No. 1, pp.190-205. (Pubitemid 43263127)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.1
, pp. 190-205
-
-
Merhav, N.1
-
22
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
Provos, N. and Honeyman, P. (1998) 'Hide and seek: an introduction to steganography', IEEE Security and Privacy Mag., Vol. 1, No. 3, pp.32-44.
-
(1998)
IEEE Security and Privacy Mag.
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
23
-
-
34249303456
-
Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking
-
Qiao, L. and Cox, I.J. (2007) 'Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking', IEEE Transactions on Information Forensics and Security, Vol. 2, No. 2, pp.127-139.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.2
, pp. 127-139
-
-
Qiao, L.1
Cox, I.J.2
-
24
-
-
0004218547
-
-
2nd ed., Morgan Kaufmann, San Francisco, CA, USA
-
Sayood, K. (2000) Introduction to Data Compression, 2nd ed., Morgan Kaufmann, San Francisco, CA, USA.
-
(2000)
Introduction to Data Compression
-
-
Sayood, K.1
-
25
-
-
20444455326
-
-
Technical Report, School of Computing and Mathematics, Nottingham Trent University, UK
-
Schaefer, G. and Stich, M. (2003), UCID - An Uncompressed Colour Image Database, http://vision.cs.aston.ac.uk/datasets/UCID/ucid.html, Technical Report, School of Computing and Mathematics, Nottingham Trent University, UK.
-
(2003)
UCID - An Uncompressed Colour Image Database
-
-
Schaefer, G.1
Stich, M.2
-
26
-
-
33749589438
-
Statistical restoration for robust and secure steganography
-
Sep., Genova, Italy
-
Solanki, K., Sullivan, K., Madhow, U., Manjunath, B.S. and Chandrasekaran, S. (2005) 'Statistical restoration for robust and secure steganography', Proc. IEEE International Conference on Image Processing, Sep., Genova, Italy.
-
(2005)
Proc. IEEE International Conference on Image Processing
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
27
-
-
33744728031
-
Steganalysis for Markov cover data with applications to images
-
DOI 10.1109/TIFS.2006.873595
-
Sullivan, K., Madhow, U., Chandrasekaran, S. and Manjunath, B.S. (2006) 'Steganalysis for Markov cover data with applications to images', IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, pp.275-287. (Pubitemid 43824636)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.S.4
-
28
-
-
13244289969
-
Secret key estimation in sequential steganography
-
DOI 10.1109/TSP.2004.839925
-
Trivedi, S. and Chandramouli, R. (2005) 'Secret key estimation in sequential steganography', IEEE Transaction on signal processing, Vol. 53, No. 2, pp.746-757. (Pubitemid 40181768)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 746-757
-
-
Trivedi, S.1
Chandramouli, R.2
-
29
-
-
45249103920
-
Perfectly secure steganography: Capacity, error exponents, and code constructions
-
Wang, Y. and Moulin, P. (2008) 'Perfectly secure steganography: capacity, error exponents, and code constructions', IEEE Transactions on Information Theory, Vol. 54, No. 6, pp.2706-2722.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2706-2722
-
-
Wang, Y.1
Moulin, P.2
-
31
-
-
0141638479
-
Joint security and robustness enhancement for quantization based data embedding
-
Wu, M. (2003) 'Joint security and robustness enhancement for quantization based data embedding', IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp.831-841.
-
(2003)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.13
, Issue.8
, pp. 831-841
-
-
Wu, M.1
-
32
-
-
0031143282
-
Rate-distortion theory for the Shannon cipher system
-
PII S0018944897023158
-
Yamamoto, H. (1997) 'Rate-distortion theory for the Shannon cipher system', IEEE Transactions on Information Theory, Vol. 43, No. 3, pp.827-835. (Pubitemid 127828006)
-
(1997)
IEEE Transactions on Information Theory
, vol.43
, Issue.3
, pp. 827-835
-
-
Yamamoto, H.1
|