-
1
-
-
84858225327
-
-
http://www. data-compression.com/vq.html.
-
-
-
-
2
-
-
0018918171
-
An algorithm for vector quantizer design. Communications
-
jan
-
Y. Linde A., Buzo, and R. Gray. An algorithm for vector quantizer design. Communications, IEEE Transactions on, 28(1):84-95, jan 1980.
-
(1980)
IEEE Transactions on
, vol.28
, Issue.1
, pp. 84-95
-
-
Linde, Y.1
Buzo, A.2
Gray, R.3
-
3
-
-
80053005547
-
"Break Our Steganographic System" - The ins and outs of organizing BOSS
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
-
P. Bas, I. Filler, and T. Pevny. "Break Our Steganographic System" - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Lecture Notes in Computer Science
-
-
Bas, P.1
Filler, I.2
Pevny, T.3
-
4
-
-
34948856944
-
High-dimensional statistical distance for region-of-interest tracking: Application to combining a soft geometric constraint with radiometry
-
Minneapolis, MN, Juiie 18-23
-
S. Boltz, E. Debreuve, and M. Barlaud. High-dimensional statistical distance for region-of-interest tracking: Application to combining a soft geometric constraint with radiometry. In Proceedings IEEE, Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2007, pages 1-8, Minneapolis, MN, Juiie 18-23, 2007.
-
(2007)
Proceedings IEEE, Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2007
, pp. 1-8
-
-
Boltz, S.1
Debreuve, E.2
Barlaud, M.3
-
6
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
J. Fridrich, editor, Information Hiding, 6th International Workshop, Toronto, Canada, May 23-25, Springer-Verlag, New York
-
J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J. Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67-81, Toronto, Canada, May 23-25, 2004. Springer-Verlag, New York.
-
(2004)
Lecture Notes in Computer Science
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
7
-
-
84858213266
-
Steganalysis of spatially-adaptive steganography
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th, International Workshop, Prague, Czech Republic, May 18-20
-
J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Steganalysis of spatially-adaptive steganography. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th, International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Lecture Notes in Computer Science
-
-
Fridrich, J.1
Kodovský, J.2
Goljan, M.3
Holub, V.4
-
8
-
-
80052990656
-
A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)
-
T. Filler, T. Pevý, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
-
G. Gül and F. Kurugollu. A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevý, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, pages 71-84, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Lecture Notes in Computer Science
, pp. 71-84
-
-
Gül, G.1
Kurugollu, F.2
-
9
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 27-31
-
A. D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1-5 17, San Jose, CA, January 27-31, 2008.
-
(2008)
Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 51-517
-
-
Ker, A.D.1
Böhme, R.2
-
10
-
-
70449646940
-
Calibration revisited
-
J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
-
J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63-74, Princeton, NJ, September 7-8, 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 63-74
-
-
Kodovský, J.1
Fridrich, J.2
-
11
-
-
79954474492
-
Steganalysis in hgh dimensions: Fusing classifiers built on random subspaces
-
N. D. Memon, E.J. Delp, P. W. Wong, and J. Dittmann, editors, San Francisco, CA, January 23-26
-
J. Kodovský and J. Fridrich. Steganalysis in hgh dimensions: Fusing classifiers built on random subspaces. In N. D. Memon, E.J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia, XIII, volume 7880, San Francisco, CA, January 23-26, 2011.
-
(2011)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia, XIII
, vol.7880
-
-
Kodovský, J.1
Fridrich, J.2
-
12
-
-
80054777166
-
On dangers of overtraininig steganography to incomplete cover model
-
New York, NY, USA, ACM
-
J. Kodovsky, J. Fridrich, and V. Holub. On dangers of overtraininig steganography to incomplete cover model. In Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, MM&Sec'11, pages 69-76, New York, NY, USA, 2011 ACM.
-
(2011)
Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security, MM&Sec'11
, pp. 69-76
-
-
Kodovsky, J.1
Fridrich, J.2
Holub, V.3
-
14
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
June
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 3(2)215-224, June 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
15
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
P. W. L. Fong, R. Böhme, and Rei Safavi-Naini, editors, Information Hiding, 12th International Workshop. Calgary, Canada, June 28-30
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In P. W. L. Fong, R. Böhme, and Rei Safavi-Naini, editors, Information Hiding, 12th International Workshop. Lecture Notes in Computer Science, Calgary, Canada, June 28-30, 2010.
-
(2010)
Lecture Notes in Computer Science
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
16
-
-
56749152307
-
Benchmarking for steganography
-
K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, Santa Barbara, CA, June 19-21, Springer-Verlag, New York
-
T. Pevný and J. Fridrich. Benchmarking for steganography. In K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 251-267, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York.
-
(2008)
Lecture Notes in Computer Science
, vol.5284
, pp. 251-267
-
-
Pevný, T.1
Fridrich, J.2
-
17
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
J. L. Camenisch, C. S. Collberg, N. F . Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, Alexandria, VA, July 10-12, Springer-Verlag, New York
-
Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L. Camenisch, C. S. Collberg, N. F . Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249-264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
-
(2006)
Lecture Notes in Computer Science
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
18
-
-
2342511079
-
Nearest neighbor estimates of entropy
-
H. Singh, N. Misra, V. Hnizdo, A. Fedorowicz, and E. Dermchuk. Nearest neighbor estimates of entropy. American journal of Math, and Management Sciences, 23:301-321, 2003.
-
(2003)
American Journal of Math, and Management Sciences
, vol.23
, pp. 301-321
-
-
Singh, H.1
Misra, N.2
Hnizdo, V.3
Fedorowicz, A.4
Dermchuk, E.5
-
19
-
-
49949091527
-
YASS: Yet another steganographic scheme that resists blind steganalysis
-
T. Furon, F. Cayre, G. Doërr, and P. Bas, editors, Information Hiding, 9th International Workshop, Saint Malo, France, June 11-13, Springer-Verlag, New York
-
K. Solanki, A. Sarkar, and B. S. Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. In T. Furon, F. Cayre, G. Doërr, and P. Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 16-31, Saint Malo, France, June 11-13, 2007. Springer-Verlag, New York.
-
(2007)
Lecture Notes in Computer Science
, vol.4567
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
20
-
-
78649828992
-
Provably secure steganography: Achieving zero K-L divergence using statistical restoration
-
Atlanta, GA, October 8-11
-
K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Provably secure steganography: Achieving zero K-L divergence using statistical restoration. In Proceedings IEEE, International Conference on Image Processing, ICIP 2006, pages 125-128, Atlanta, GA, October 8-11, 2006.
-
(2006)
Proceedings IEEE, International Conference on Image Processing, ICIP 2006
, pp. 125-128
-
-
Solanki, K.1
Sullivan, K.2
Madhow, U.3
Manjunath, B.S.4
Chandrasekaran, S.5
-
21
-
-
33744728031
-
Steganalysis for Markov cover data with applications to images
-
DOI 10.1109/TIFS.2006.873595
-
K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran. Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensics and Security, 1(2):275-287, June 2006. (Pubitemid 43824636)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.S.4
|