-
1
-
-
0039253819
-
Lof: Identifying density-based local outliers
-
ACM
-
M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander. Lof: Identifying density-based local outliers. In Proc. 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD, pages 93-104. ACM, 2000.
-
(2000)
Proc. 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD
, pp. 93-104
-
-
Breunig, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
3
-
-
79952507965
-
Minimizing additive distortion functions with non-binary embedding operation in steganography
-
2010 IEEE International Workshop on
-
T. Filler and J. Fridrich. Minimizing additive distortion functions with non-binary embedding operation in steganography. In Information Forensics and Security (WIFS), 2010 IEEE International Workshop on, pages 1-6, 2010.
-
(2010)
Information Forensics and Security (WIFS)
, pp. 1-6
-
-
Filler, T.1
Fridrich, J.2
-
4
-
-
79954457569
-
Design of adaptive steganographic schemes for digital images
-
N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp III, editors SPIE
-
T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In N. D. Memon, J. Dittmann, A. M. Alattar, and E. J. Delp III, editors, Media Watermarking, Security, and Forensics XIV, volume 7880 of Proc. SPIE, page 78800F. SPIE, 2011.
-
(2011)
Media Watermarking, Security, and Forensics XIV, Volume 7880 of Proc. SPIE
-
-
Filler, T.1
Fridrich, J.2
-
5
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(3):920-935, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 920-935
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
6
-
-
33645015900
-
Wet paper codes with improved embedding efficiency
-
J. Fridrich, M. Goljan, and D. Soukal. Wet paper codes with improved embedding efficiency. IEEE Transactions on Information Forensics and Security, 1(1):102-110, 2006.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
7
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
MM&Sec ACM
-
J. Fridrich, T. Pevńy, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities. In Proc. 9th ACM Workshop on Multimedia and Security, MM&Sec, pages 3-14. ACM, 2007.
-
(2007)
Proc. 9th ACM Workshop on Multimedia and Security
, pp. 3-14
-
-
Fridrich, J.1
Pevńy, T.2
Kodovský, J.3
-
8
-
-
84864063983
-
-
A. Gretton, K. M. Borgwardt, M. J. Rasch, B. Schölkopf, and A. J. Smola. A kernel method for the two-sample problem. pages 513-520, 2007.
-
(2007)
A Kernel Method for the Two-sample Problem
, pp. 513-520
-
-
Gretton, A.1
Borgwardt, K.M.2
Rasch, M.J.3
Schölkopf, B.4
Smola, A.J.5
-
9
-
-
84867457778
-
-
ver. 0.5.1 released October last accessed April 2012
-
S. Hetzl. Implementation of the Steghide algorithm ver. 0.5.1 (released October 2003). http://steghide.sourceforge.net/, last accessed April 2012.
-
(2003)
Implementation of the Steghide Algorithm
-
-
Hetzl, S.1
-
11
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
J. Camenisch, C. Collberg, N. Johnson, and P. Sallee, editors Springer
-
A. D. Ker. Batch steganography and pooled steganalysis. In J. Camenisch, C. Collberg, N. Johnson, and P. Sallee, editors, Proc. 8th Information Hiding Workshop, volume 4437 of LNCS, pages 265-281. Springer, 2006.
-
(2006)
Proc. 8th Information Hiding Workshop, Volume 4437 of LNCS
, pp. 265-281
-
-
Ker, A.D.1
-
12
-
-
34548293733
-
Batch steganography and the threshold game
-
E. Delp III and P. Wong, editors SPIE
-
A. D. Ker. Batch steganography and the threshold game. In E. Delp III and P. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505 of Proc. SPIE, pages 0401-0413. SPIE, 2007.
-
(2007)
Security, Steganography, and Watermarking of Multimedia Contents IX, Volume 6505 of Proc. SPIE
, pp. 0401-0413
-
-
Ker, A.D.1
-
13
-
-
57149128996
-
Perturbation hiding and the batch steganography problem
-
K. Solanki, K. Sullivan, and U. Madhow, editors Springer
-
A. D. Ker. Perturbation hiding and the batch steganography problem. In K. Solanki, K. Sullivan, and U. Madhow, editors, Proc. 10th Information Hiding Workshop, volume 5284 of LNCS, pages 45-59. Springer, 2008.
-
(2008)
Proc. 10th Information Hiding Workshop, Volume 5284 of LNCS
, pp. 45-59
-
-
Ker, A.D.1
-
14
-
-
79954549942
-
A new paradigm for steganalysis via clustering
-
N. Memon, J. Dittmann, A. Alattar, and E. Delp III, editors SPIE
-
A. D. Ker and T. Pevný. A new paradigm for steganalysis via clustering. In N. Memon, J. Dittmann, A. Alattar, and E. Delp III, editors, Media Watermarking, Security, and Forensics XIII, volume 7880 of Proc. SPIE, pages 0U01-0U13. SPIE, 2011.
-
(2011)
Media Watermarking, Security, and Forensics XIII, Volume 7880 of Proc. SPIE
-
-
Ker, A.D.1
Pevný, T.2
-
15
-
-
84858188731
-
Identifying a steganographer in realistic and heterogeneous data sets
-
N. Memon, A. Alattar, and E. Delp III, editors SPIE
-
A. D. Ker and T. Pevný. Identifying a steganographer in realistic and heterogeneous data sets. In N. Memon, A. Alattar, and E. Delp III, editors, Media Watermarking, Security, and Forensics XIV, volume 8303 of Proc. SPIE, pages 0N01-0N13. SPIE, 2012.
-
(2012)
Media Watermarking, Security, and Forensics XIV, Volume 8303 of Proc. SPIE
-
-
Ker, A.D.1
Pevný, T.2
-
18
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
P. W. L. Fong, R. Böhme, and R. Safavi-Naini, editors Springer
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In P. W. L. Fong, R. Böhme, and R. Safavi-Naini, editors, Proc. 12th Information Hiding Workshop, volume 6387 of LNCS, pages 161-177. Springer, 2010.
-
(2010)
Proc. 12th Information Hiding Workshop, Volume 6387 of LNCS
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
19
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
E. J. Delp III and P. W. Wong, editors SPIE
-
T. Pevný and J. Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J. Delp III and P. W. Wong, editors, Media Watermarking, Security, and Forensics IX, volume 6505, pages 03-14. SPIE, 2007.
-
(2007)
Media Watermarking, Security, and Forensics IX
, vol.6505
, pp. 03-14
-
-
Pevný, T.1
Fridrich, J.2
-
20
-
-
84858191862
-
From blind to quantitative steganalysis
-
IEEE Transactions on
-
T. Pevný, J. Fridrich, and A. D. Ker. From blind to quantitative steganalysis. Information Forensics and Security, IEEE Transactions on, 7(2):445-454, 2012.
-
(2012)
Information Forensics and Security
, vol.7
, Issue.2
, pp. 445-454
-
-
Pevný, T.1
Fridrich, J.2
Ker, A.D.3
-
21
-
-
85084160704
-
Defending against statistical steganalysis
-
SSYM USENIX Association
-
N. Provos. Defending against statistical steganalysis. In Proc. 10th Conference on USENIX Security Symposium - Volume 10, SSYM, pages 323-335. USENIX Association, 2001.
-
(2001)
Proc. 10th Conference on USENIX Security Symposium
, vol.10
, pp. 323-335
-
-
Provos, N.1
-
22
-
-
84867446509
-
-
ver. 2.0 released October last accessed April 2012
-
N. Provos. Implementation of the OutGuess algorithm ver. 2.0 (released October 2001). http://www.outguess.org/, last accessed April 2012.
-
(2001)
Implementation of the OutGuess Algorithm
-
-
Provos, N.1
|