-
1
-
-
0034775171
-
Steganalysis using image quality metrics
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 22-25
-
I. Avcibas, N. D. Memon, and B. Sankur. Steganalysis using image quality metrics. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, pages 523-531, San Jose, CA, January 22-25, 2001.
-
(2001)
Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.D.2
Sankur, B.3
-
2
-
-
56749107134
-
Weighted stego-image steganalysis for JPEG covers
-
K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, Santa Barbara, CA, June 19-21, Springer-Verlag, New York
-
R. Böhme. Weighted stego-image steganalysis for JPEG covers. In K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 178-194, Santa Barbara, CA, June 19-21, 2007. Springer-Verlag, New York.
-
(2007)
Lecture Notes in Computer Science
, vol.5284
, pp. 178-194
-
-
Böhme, R.1
-
4
-
-
84858226621
-
-
Software available at
-
J. Borggaard, 2009, Software available at http://people.sc.fsu.edu/ ~jburkardt/m-src/nelder-mead/nelder-mead.html.
-
(2009)
-
-
Borggaard, J.1
-
5
-
-
79954489095
-
Feature restoration and distortion metrics
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Francisco, CA, January 23-26
-
V. Chonev and A. D. Ker. Feature restoration and distortion metrics. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages 0G01-0G14, San Francisco, CA, January 23-26, 2011.
-
(2011)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII
, vol.7880
-
-
Chonev, V.1
Ker, A.D.2
-
6
-
-
80052987721
-
A cover image model for reliable steganalysis
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors
-
R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, and P. Cornu. A cover image model for reliable steganalysis. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, pages 178-192, 2011.
-
(2011)
Information Hiding, 13th International Workshop
, pp. 178-192
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
7
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, Noordwijkerhout, The Netherlands, October 7-9, Springer-Verlag, New York
-
H. Farid and L. Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F. A. P. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 340-354, Noordwijkerhout, The Netherlands, October 7-9, 2002. Springer-Verlag, New York.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 340-354
-
-
Farid, H.1
Siwei, L.2
-
9
-
-
79954457569
-
Design of adaptive steganographic schemes for digital images
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Francisco, CA, January 23-26
-
T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages OF 1-14, San Francisco, CA, January 23-26, 2011.
-
(2011)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII
, vol.7880
-
-
Filler, T.1
Fridrich, J.2
-
12
-
-
0242497150
-
New methodology for breaking steganographic techniques for JPEGs
-
E. J. Delp and P. W. Wong, editors, Santa Clara, CA, January 21-24
-
J. Fridrich, M. Goljan, and D. Hogea. New methodology for breaking steganographic techniques for JPEGs. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 143-155, Santa Clara, CA, January 21-24, 2003.
-
(2003)
Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V
, vol.5020
, pp. 143-155
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
14
-
-
80053003434
-
Breaking HUGO - The process discovery
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
-
J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Breaking HUGO - the process discovery. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, pages 85-101, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Lecture Notes in Computer Science
, pp. 85-101
-
-
Fridrich, J.1
Kodovský, J.2
Goljan, M.3
Holub, V.4
-
15
-
-
80053047483
-
Steganalysis of content-adaptive steganography in spatial domain
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
-
J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Steganalysis of content-adaptive steganography in spatial domain. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, pages 102-117, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Lecture Notes in Computer Science
, pp. 102-117
-
-
Fridrich, J.1
Kodovský, J.2
Goljan, M.3
Holub, V.4
-
16
-
-
33645676686
-
New blind steganalysis and its implications
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 16-19
-
M. Goljan, J. Fridrich, and T. Holotyak. New blind steganalysis and its implications. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 1-13, San Jose, CA, January 16-19, 2006.
-
(2006)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
17
-
-
80052990656
-
A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
-
G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, pages 71-84, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Lecture Notes in Computer Science
, pp. 71-84
-
-
Gül, G.1
Kurugollu, F.2
-
18
-
-
21844435251
-
Stochastic approach to secret message length estimation in ±k embedding steganography
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 16-20
-
T. S. Holotyak, J. Fridrich, and D. Soukal. Stochastic approach to secret message length estimation in ±k embedding steganography. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 673-684, San Jose, CA, January 16-20, 2005.
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 673-684
-
-
Holotyak, T.S.1
Fridrich, J.2
Soukal, D.3
-
19
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 27-31
-
A. D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1-5 17, San Jose, CA, January 27-31, 2008.
-
(2008)
Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 51-517
-
-
Ker, A.D.1
Böhme, R.2
-
20
-
-
56749154804
-
On completeness of feature spaces in blind steganalysis
-
A. D. Ker, J. Dittmann, and J. Fridrich, editors, Oxford, UK, September 22-23
-
J. Kodovský and J. Fridrich. On completeness of feature spaces in blind steganalysis. In A. D. Ker, J. Dittmann, and J. Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123-132, Oxford, UK, September 22-23, 2008.
-
(2008)
Proceedings of the 10th ACM Multimedia & Security Workshop
, pp. 123-132
-
-
Kodovský, J.1
Fridrich, J.2
-
21
-
-
79954474492
-
Steganalysis in high dimensions: Fusing classifiers built on random subspaces
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Francisco, CA, January 23-26
-
J. Kodovský and J. Fridrich. Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages OL 1-13, San Francisco, CA, January 23-26, 2011.
-
(2011)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII
, vol.7880
-
-
Kodovský, J.1
Fridrich, J.2
-
23
-
-
80054777166
-
On dangers of overtraining steganography to incomplete cover model
-
J. Dittmann, S. Craver, and C. Heitzenrater, editors, Niagara Falls, NY, September 29-30
-
J. Kodovský, J. Fridrich, and V. Holub. On dangers of overtraining steganography to incomplete cover model. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 69-76, Niagara Falls, NY, September 29-30, 2011.
-
(2011)
Proceedings of the 13th ACM Multimedia & Security Workshop
, pp. 69-76
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
24
-
-
77952620028
-
Edge adaptive image steganography based on LSB matching revisited
-
June
-
W. Luo, F. Huang, and J. Huang. Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2):201-214, June 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 201-214
-
-
Luo, W.1
Huang, F.2
Huang, J.3
-
26
-
-
70449644855
-
Steganalysis by subtractive pixel adjacency matrix
-
J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 75-84, Princeton, NJ, September 7-8, 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 75-84
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
27
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
June
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2):215-224, June 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
28
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, Calgary, Canada, June 28-30, Springer-Verlag, New York
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
-
(2010)
Lecture Notes in Computer Science
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
30
-
-
34247562352
-
Steganalysis based on Markov model of thresholded prediction-error image
-
Toronto, Canada, July 9-12
-
D. Zo, Y. Q. Shi, W. Su, and G. Xuan. Steganalysis based on Markov model of thresholded prediction-error image. In Proceedings IEEE, International Conference on Multimedia and Expo, pages 1365-1368, Toronto, Canada, July 9-12, 2006.
-
(2006)
Proceedings IEEE, International Conference on Multimedia and Expo
, pp. 1365-1368
-
-
Zo, D.1
Shi, Y.Q.2
Su, W.3
Xuan, G.4
|