-
1
-
-
1442360452
-
Quantitative steganalysis of digital images: Estimating the secret message length
-
J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, "Quantitative steganalysis of digital images: Estimating the secret message length," ACM Multimedia Syst. J., vol. 9, no. 3, pp. 288-302, 2003.
-
(2003)
ACM Multimedia Syst.J.
, vol.9
, Issue.3
, pp. 288-302
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
Soukal, D.4
-
2
-
-
35248901820
-
Detection of LSB steganography via sample pair analysis
-
F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 7-9, Lecture Notes in Computer Science, Springer- Verlag, New York
-
S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis," in Proc. 5th Int. Workshop Information Hiding, F. A. P. Petitcolas, Ed., Noordwijkerhout, The Netherlands, Oct. 7-9, 2002, vol. 2578, Lecture Notes in Computer Science, pp. 355-372, Springer-Verlag, New York.
-
(2002)
Proc. 5th Int. Workshop Information Hiding
, vol.2578
, pp. 355-372
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
3
-
-
0038675417
-
A fast and effective steganalytic technique against JSteg-like algorithms
-
Melbourne, FL, Mar. 9-12
-
T. Zhang and X. Ping, "A fast and effective steganalytic technique against JSteg-like algorithms," in Proc. ACM Symp. Applied Computing, Melbourne, FL, Mar. 9-12, 2003, pp. 307-311.
-
(2003)
Proc. ACM Symp. Applied Computing
, pp. 307-311
-
-
Zhang, T.1
Ping, X.2
-
4
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 19-22
-
J. Fridrich and M. Goljan, "On estimation of secret message length in LSB steganography in spatial domain," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 19-22, 2004, vol. 5306, pp. 23-34.
-
(2004)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
5
-
-
33645663780
-
A general framework for structural analysis of LSB replacement
-
M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez- González, Eds., Barcelona, Spain, Jun. 6-8, Lecture Notes in Computer Science, Springer- Verlag, Berlin
-
A. D. Ker, "A general framework for structural analysis of LSB replacement," in Proc. 7th Int. Workshop Information Hiding, M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez-González, Eds., Barcelona, Spain, Jun. 6-8, 2005, vol. 3727, Lecture Notes in Computer Science, pp. 296-311, Springer-Verlag, Berlin.
-
(2005)
Proc. 7th Int. Workshop Information Hiding
, vol.3727
, pp. 296-311
-
-
Ker, A.D.1
-
6
-
-
49949111194
-
Generalized category attack-Improving histogram- based attack on JPEG LSB embedding
-
T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds. Saint Malo, France, Jun. 11-13, Lecture Notes in Computer Science, Springer- Verlag
-
K. Lee and A.Westfeld, "Generalized category attack-Improving histogram- based attack on JPEG LSB embedding," in Proc. 9th Int.Workshop Information Hiding, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., Saint Malo, France, Jun. 11-13, 2007, Lecture Notes in Computer Science, pp. 378-392, Springer-Verlag.
-
(2007)
Proc. 9th Int.Workshop Information Hiding
, pp. 378-392
-
-
Lee, K.1
Westfeld, A.2
-
7
-
-
56749107134
-
Weighted stego-image steganalysis for JPEG covers
-
K. Solanki, Ed., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science, Springer- Verlag, New York
-
R. Böhme, "Weighted stego-image steganalysis for JPEG covers," in Proc. 10th Int. Workshop Information Hiding, K. Solanki, Ed., Santa Barbara, CA, Jun. 19-21, 2008, Lecture Notes in Computer Science, pp. 178-194, Springer-Verlag, New York.
-
(2008)
Proc. 10th Int. Workshop Information Hiding
, pp. 178-194
-
-
Böhme, R.1
-
8
-
-
56749177021
-
Generic adoption of spatial steganalysis to transformed domain
-
K. Solanki, Ed., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science, Springer- Verlag, New York
-
A. Westfeld, "Generic adoption of spatial steganalysis to transformed domain," in Proc. 10th Int. Workshop Information Hiding, K. Solanki, Ed., Santa Barbara, CA, Jun. 19-21, 2008, Lecture Notes in Computer Science, pp. 161-177, Springer-Verlag, New York.
-
(2008)
Proc. 10th Int. Workshop Information Hiding
, pp. 161-177
-
-
Westfeld, A.1
-
9
-
-
21844461602
-
Maximum likelihood estimation of secret message length embedded using steganography in spatial domain
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-20
-
D. Soukal, J. Fridrich, and M. Goljan, "Maximum likelihood estimation of secret message length embedded using steganography in spatial domain," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-20, 2005, vol. 5681, pp. 595-606.
-
(2005)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 595-606
-
-
Soukal, D.1
Fridrich, J.2
Goljan, M.3
-
10
-
-
85036614203
-
Blind quantitative steganalysis based on feature fusion and gradient boosting
-
Berlin, Heidelberg, Springer- Verlag
-
Q. Guan, J. Dong, and T. Tan, "Blind quantitative steganalysis based on feature fusion and gradient boosting," in Proc. 9th Int. Conf. DigitalWatermarking (IWDW'10), Berlin, Heidelberg, 2011, pp. 266-279, Springer-Verlag.
-
(2011)
Proc. 9th Int. Conf. DigitalWatermarking (IWDW'10)
, pp. 266-279
-
-
Guan, Q.1
Dong, J.2
Tan, T.3
-
11
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
Mar.
-
S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
12
-
-
33746647772
-
Steganalysis based onmultiple features formed by statistical moments of wavelet characteristic functions
-
M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez- González, Eds., Barcelona, Spain, Jun. 6-8, Lecture Notes in Computer Science, Springer- Verlag, Berlin
-
G.Xuan,Y. Q. Shi, J.Gao, D. Zou, C.Yang,Z.Z.P.Chai, C.Chen, and W. Chen, "Steganalysis based onmultiple features formed by statistical moments of wavelet characteristic functions," in Proc. 7th Int. Workshop Information Hiding, M. Barni, J. Herrera, S. Katzenbeisser, and F. Pérez- González, Eds., Barcelona, Spain, Jun. 6-8, 2005, vol. 3727, Lecture Notes in Computer Science, pp. 262-277, Springer-Verlag, Berlin.
-
(2005)
Proc. 7th Int. Workshop Information Hiding
, vol.3727
, pp. 262-277
-
-
Xuan, G.1
Shi, Y.Q.2
Gao, J.3
Zou, D.4
Yang, C.5
Chai, Z.Z.P.6
Chen, C.7
Chen, W.8
-
13
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer- Verlag, New York
-
Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int.Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 249-264, Springer-Verlag, New York.
-
(2006)
Proc. 8th Int.Workshop Information Hiding
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
14
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
E. J. Delp and P.W.Wong, Eds., San Jose, CA, Jan./Feb. 29 - 1
-
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, E. J. Delp and P.W.Wong, Eds., San Jose, CA, Jan./Feb. 29 - 1, 2007, vol. 6505, pp. 3 1-3 14.
-
(2007)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
, pp. 31-314
-
-
Pevný, T.1
Fridrich, J.2
-
15
-
-
70449644855
-
Steganalysis by subtractive pixel adjacency matrix
-
J. Dittmann, J. Fridrich, and S. Craver, Eds. New York, Sep. 7-8, ACM
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," in Proc. 11th Workshop on Multimedia & Security, J. Dittmann, J. Fridrich, and S. Craver, Eds., New York, Sep. 7-8, 2009, pp. 75-84, ACM.
-
(2009)
Proc. 11th Workshop on Multimedia & Security
, pp. 75-84
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
16
-
-
42949124470
-
Influence of embedding strategies on security of steganographic methods in the JPEG domain
-
E. J. Delp and P.W.Wong, Eds., San Jose, CA, Jan. 27-31
-
J. Kodovský and J. Fridrich, "Influence of embedding strategies on security of steganographic methods in the JPEG domain," in Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, E. J. Delp and P.W.Wong, Eds., San Jose, CA, Jan. 27-31, 2008.
-
(2008)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
-
-
Kodovský, J.1
Fridrich, J.2
-
17
-
-
34247562352
-
Steganalysis based on Markov model of thresholded prediction-error image
-
Toronto, Canada, Jul. 9-12
-
D. Zo, Y. Q. Shi,W. Su, and G. Xuan, "Steganalysis based on Markov model of thresholded prediction-error image," in Proc. IEEE Int. Conf. Multimedia and Expo., Toronto, Canada, Jul. 9-12, 2006, pp. 1365-1368.
-
(2006)
Proc. IEEE Int. Conf. Multimedia and Expo.
, pp. 1365-1368
-
-
Zo, D.1
Shi, Y.Q.2
Su, W.3
Xuan, G.4
-
18
-
-
71449120465
-
From blind to quantitative steganalysis
-
E. Delp and P. Wong, Eds., Jan. 19-22
-
T. Pevný, J. Fridrich, and A. D. Ker, "From blind to quantitative steganalysis," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents XI, E. Delp and P. Wong, Eds., Jan. 19-22, 2009.
-
(2009)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents XI
-
-
Pevný, T.1
Fridrich, J.2
Ker, A.D.3
-
19
-
-
33645666341
-
Matrix embedding for large payloads
-
E. J.Delp and P.W.Wong,Eds., San Jose, CA, Jan. 16-19
-
J. Fridrich and D. Soukal, "Matrix embedding for large payloads," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking ofMultimedia Contents VIII, E. J.Delp and P.W.Wong,Eds., San Jose, CA, Jan. 16-19, 2006, vol. 6072, pp. W1-W10.
-
(2006)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking ofMultimedia Contents VIII
, vol.6072
-
-
Fridrich, J.1
Soukal, D.2
-
20
-
-
84937814312
-
High capacity despite better steganalysis (F5 - A steganographic algorithm)
-
I. S. Moskowitz, Ed., Pittsburgh, PA, Apr. 25-27, Lecture Notes in Computer Science, Springer- Verlag, New York
-
A. Westfeld, "High capacity despite better steganalysis (F5 - A steganographic algorithm)," in Proc. 4th Int. Workshop Information Hiding, I. S. Moskowitz, Ed., Pittsburgh, PA, Apr. 25-27, 2001, vol. 2137, Lecture Notes in Computer Science, pp. 289-302, Springer-Verlag, New York.
-
(2001)
Proc. 4th Int. Workshop Information Hiding
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
22
-
-
46249099027
-
-
Cambridge,MA: MIT Press
-
B. Schölkopf and A. Smola, Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond (Adaptive Computation andMachine Learning). Cambridge,MA: MIT Press, 2001.
-
(2001)
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond (Adaptive Computation and Machine Learning)
-
-
Schölkopf, B.1
Smola, A.2
-
23
-
-
64249108718
-
-
[Online]. Available
-
A. Latham, Steganography [Online]. Available: http://linux01. gwdg.de/~alatham/stego.html
-
Steganography
-
-
Latham, A.1
-
24
-
-
84858403496
-
-
[Online]. Available
-
D. Upham, JSteg source [Online]. Available: http://zooid.org/~paul/ crypto/jsteg/
-
JSteg Source
-
-
Upham, D.1
-
25
-
-
35048819204
-
Model-based steganography
-
T. Kalker, I. J. Cox, and Y. M. Ro, Eds., Seoul, Korea, Oct. 20-22, Lecture Notes in Computer Science, Springer- Verlag, New York
-
P. Sallee, "Model-based steganography," in Proc. 2nd Int. Workshop Digital Watermarking, T. Kalker, I. J. Cox, and Y. M. Ro, Eds., Seoul, Korea, Oct. 20-22, 2003, vol. 2939, Lecture Notes in Computer Science, pp. 154-167, Springer-Verlag, New York.
-
(2003)
Proc. 2nd Int. Workshop Digital Watermarking
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
26
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science, Springer- Verlag, New York
-
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Int. Workshop Information Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 314-327, Springer-Verlag, New York.
-
(2006)
Proc. 8th Int. Workshop Information Hiding
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
27
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. 9th ACM Multimedia & Security Workshop, J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21, 2007, pp. 3-14.
-
(2007)
Proc. 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
29
-
-
30744445178
-
Perturbed quantization steganography
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography," ACM Multimedia Syst. J., vol. 11, no. 2, pp. 98-107, 2005.
-
(2005)
ACM Multimedia Syst.J.
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
30
-
-
33645695370
-
Agraph-theoretic approach to steganography
-
J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., Salzburg, Austria, Sep. 19-21, Lecture Notes in Computer Science
-
S. Hetzl and P. Mutzel, "Agraph-theoretic approach to steganography," in Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security (CMS 2005), J. Dittmann, S. Katzenbeisser, and A. Uhl, Eds., Salzburg, Austria, Sep. 19-21, 2005, vol. 3677, Lecture Notes in Computer Science, pp. 119-128.
-
(2005)
Proc. 9th IFIP TC-6 TC-11 Int. Conf. Communications and Multimedia Security (CMS 2005)
, vol.3677
, pp. 119-128
-
-
Hetzl, S.1
Mutzel, P.2
-
31
-
-
33645678198
-
A two-factor error model for quantitative steganalysis
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19
-
R. Böhme and A. D. Ker, "A two-factor error model for quantitative steganalysis," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 16-19, 2006, vol. 6072, pp. 59-74.
-
(2006)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 59-74
-
-
Böhme, R.1
Ker, A.D.2
-
32
-
-
69949122982
-
Detection of steganography based on the amplitude of histogram local extrema
-
San Diego, CA, Oct. 12-15
-
G. Cancelli, G. Doërr, I. Cox, and M. Barni, "Detection of steganography based on the amplitude of histogram local extrema," in Proc. IEEE Int. Conf. Image Processing (ICIP), San Diego, CA, Oct. 12-15, 2008.
-
(2008)
Proc. IEEE Int. Conf. Image Processing (ICIP)
-
-
Cancelli, G.1
Doërr, G.2
Cox, I.3
Barni, M.4
-
33
-
-
33645676686
-
New blind steganalysis and its implications
-
E. J. Delp and P. W.Wong, Eds., San Jose, CA, Jan. 16-19
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, E. J. Delp and P. W.Wong, Eds., San Jose, CA, Jan. 16-19, 2006, vol. 6072, pp. 1-13.
-
(2006)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
34
-
-
84858429942
-
-
[Online]. Available
-
[Online]. Available: http://www.imagemagick.org
-
-
-
-
35
-
-
33748047804
-
LSB steganalysis based on higher-order statistics
-
A.M. Eskicioglu, J. Fridrich, and J. Dittmann, Eds., New York, NY, Aug. 1-2
-
S. Dumitrescu and X. Wu, "LSB steganalysis based on higher-order statistics," in Proc. 7th ACM Multimedia & Security Workshop, A.M. Eskicioglu, J. Fridrich, and J. Dittmann, Eds., New York, NY, Aug. 1-2, 2005, pp. 25-32.
-
(2005)
Proc. 7th ACM Multimedia & Security Workshop
, pp. 25-32
-
-
Dumitrescu, S.1
Wu, X.2
-
36
-
-
70350553133
-
-
Ph.D. degree, Technische Universität Dresden, Dresden, Germany, Sep.
-
R. Böhme, "Improved Statistical Steganalysis using Models of Heterogeneous Cover Signals," Ph.D. degree, Technische Universität Dresden, Dresden, Germany, Sep. 2008.
-
(2008)
Improved Statistical Steganalysis using Models of Heterogeneous Cover Signals
-
-
Böhme, R.1
-
37
-
-
0000541109
-
An extension of Shapiro and Wilk's test for normality to large samples
-
P. Royston, "An extension of Shapiro and Wilk's test for normality to large samples," Appl. Statist., vol. 31, pp. 115-124, 1982.
-
(1982)
Appl. Statist.
, vol.31
, pp. 115-124
-
-
Royston, P.1
-
38
-
-
84858403495
-
-
[Online]. Available
-
A. Greenspun [Online]. Available: http://www.greenspun.com
-
-
-
Greenspun, A.1
-
39
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 27-31
-
A. D. Ker and R. Böhme, "Revisiting weighted stego-image steganalysis," in Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 27-31, 2008, vol. 6819, pp. 5-1-5-17.
-
(2008)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 51-517
-
-
Ker, A.D.1
Böhme, R.2
|