-
2
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
May/Jun.
-
N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography," IEEE Security Privacy, vol. 3, no. 3, pp. 32-44, May/Jun. 2003.
-
(2003)
IEEE Security Privacy
, vol.3
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
3
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
A. Cheddad, J. Condell, K. Curran, and P. McKevitt, "Digital image steganography: Survey and analysis of current methods," Signal Process., vol. 90, pp. 727-752, 2010.
-
(2010)
Signal Process.
, vol.90
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
McKevitt, P.4
-
4
-
-
77951871502
-
Minimizing embedding impact in steganography using trellis-coded quantization
-
DOI: 10.1117/12.838002
-
T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization," in Proc. SPIE, Media Forensics and Security, 2010, vol. 7541, DOI: 10.1117/12.838002.
-
(2010)
Proc. SPIE, Media Forensics and Security
, vol.7541
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
5
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
Mar.
-
S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
6
-
-
0034787093
-
Reliable detection of LSB steganography in color and grayscale images
-
J. Fridrich, M.Goljan, and R.Du, "Reliable detection of LSB steganography in color and grayscale images," in Proc. Int. Workshop on Multimedia and Security, 2001, pp. 27-30. (Pubitemid 32962403)
-
(2001)
Proceedings of the ACM International Multimedia Conference and Exhibition
, Issue.2
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
7
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
DOI 10.1109/LSP.2005.847889
-
A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, Jun. 2005. (Pubitemid 40794877)
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
8
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
DOI 10.1016/j.patcog.2003.08.007
-
C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognit., vol. 37, no. 3, pp. 469-474, 2004. (Pubitemid 38003086)
-
(2004)
Pattern Recognition
, vol.37
, Issue.3
, pp. 469-474
-
-
Chan, C.-K.1
Cheng, L.M.2
-
9
-
-
33645814428
-
LSB matching revisited
-
May
-
J. Mielikainen, "LSB matching revisited," IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285-287, May 2006.
-
(2006)
IEEE Signal Process. Lett.
, vol.13
, Issue.5
, pp. 285-287
-
-
Mielikainen, J.1
-
10
-
-
47349094397
-
Efficient steganographic embedding by exploiting modification direction
-
Nov.
-
X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Lett., vol. 10, no. 11, pp. 781-783, Nov. 2006.
-
(2006)
IEEE Commun. Lett.
, vol.10
, Issue.11
, pp. 781-783
-
-
Zhang, X.1
Wang, S.2
-
11
-
-
62449319548
-
A minimal Euclidean distance searching technique for Sudoku steganography
-
W. Hong, T. S. Chen, and C. W. Shiu, "A minimal Euclidean distance searching technique for Sudoku steganography," in Proc. Int. Symp. Information Science and Engineering, 2008, vol. 1, pp. 515-518.
-
(2008)
Proc. Int. Symp. Information Science and Engineering
, vol.1
, pp. 515-518
-
-
Hong, W.1
Chen, T.S.2
Shiu, C.W.3
-
12
-
-
67650187752
-
A novel image data hiding scheme with diamond encoding
-
DOI: 10.1155/2009/658047, Article ID 658047
-
R.M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, "A novel image data hiding scheme with diamond encoding," EURASIP J. Inf. Security, vol. 2009, 2009, DOI: 10.1155/2009/658047, Article ID 658047.
-
(2009)
EURASIP J. Inf. Security
, vol.2009
-
-
Chao, R.M.1
Wu, H.C.2
Lee, C.C.3
Chu, Y.P.4
-
13
-
-
77955307852
-
An improved section-wise exploiting modification direction method
-
J. Wang, Y. Sun, H. Xu, K. Chen, H. J. Kim, and S. H. Joo, "An improved section-wise exploiting modification direction method," Signal Process., vol. 90, no. 11, pp. 2954-2964, 2010.
-
(2010)
Signal Process.
, vol.90
, Issue.11
, pp. 2954-2964
-
-
Wang, J.1
Sun, Y.2
Xu, H.3
Chen, K.4
Kim, H.J.5
Joo, S.H.6
-
14
-
-
36248978560
-
A double layered "Plus-minus one" data embedding scheme
-
DOI 10.1109/LSP.2007.903255
-
W. Zhang, X. Zhang, and S. Wang, "A double layered plus-minus one data embedding scheme," IEEE Signal Process. Lett., vol. 14, no. 11, pp. 848-851, Nov. 2007. (Pubitemid 350130777)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.11
, pp. 848-851
-
-
Zhang, W.1
Zhang, X.2
Wang, S.3
-
15
-
-
21844470700
-
Writing on wet paper
-
DOI 10.1109/TSP.2005.855393
-
J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on wet paper," IEEE Trans. Signal Process., vol. 53, no. 10, pt. 2, pp. 3923-3935, Oct. 2005. (Pubitemid 41638244)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
16
-
-
34548216307
-
Practical methods for minimizing embedding impact in steganography
-
J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography," in Proc. SPIE, Security, Steganography., Watermarking of Multimedia, 2007, vol. 6050, pp. 2-3.
-
(2007)
Proc. SPIE, Security, Steganography., Watermarking of Multimedia
, vol.6050
, pp. 2-3
-
-
Fridrich, J.1
Filler, T.2
-
17
-
-
33748096430
-
Matrix embedding for large payloads
-
Sep.
-
J. Fridrich and D. Soukal, "Matrix embedding for large payloads," IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 390-394, Sep. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.3
, pp. 390-394
-
-
Fridrich, J.1
Soukal, D.2
-
18
-
-
42749096863
-
Inverted pattern approach to improve image quality of information hiding by LSB substitution
-
C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognit., vol. 41, no. 8, pp. 2674-2683, 2008.
-
(2008)
Pattern Recognit.
, vol.41
, Issue.8
, pp. 2674-2683
-
-
Yang, C.H.1
-
19
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
20
-
-
79953028811
-
Statistical analysis of several reversible data hiding algorithms
-
DOI: 10.1007/s11042-009-0380-y
-
H. Zhao, H. Wang, and M. K. Khan, "Statistical analysis of several reversible data hiding algorithms," in Proc. Multimedia Tools and Applications, 2009, DOI: 10.1007/s11042-009-0380-y.
-
(2009)
Proc. Multimedia Tools and Applications
-
-
Zhao, H.1
Wang, H.2
Khan, M.K.3
-
21
-
-
84862926837
-
-
UCID Image Database, [Online] Available:
-
UCID image database [Online]. Available: http://vision.cs.aston.ac.uk/ datasets/UCID/ucid.html
-
-
-
-
22
-
-
84862910887
-
-
RSP Image Database, [Online] Available:
-
RSP image database [Online]. Available: http://dud.inf.tu-dresden.de/ westfeld/rsp/rsp.html
-
-
-
-
23
-
-
79551690338
-
Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism
-
W. Hong and T. S. Chen, "Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism," J. Vis. Commun. Image Represent., vol. 22, no. 2, pp. 131-140, 2011.
-
(2011)
J. Vis. Commun. Image Represent.
, vol.22
, Issue.2
, pp. 131-140
-
-
Hong, W.1
Chen, T.S.2
-
24
-
-
84862910888
-
-
Implementation of the SPAM Features, [Online] Available:
-
Implementation of the SPAM features [Online]. Available: http://dde. binghamton.edu/download/spam/
-
-
-
|