-
1
-
-
84955563192
-
Stretching the limits of steganography
-
Information Hiding
-
R. Anderson, R. J. Anderson, Ed., "Stretching the limits of steganography," in Proc. 1st Int. Workshop Information Hiding, Cambridge, U.K., May 30-Jun. 1 1996, vol. 1174, Lecture Notes in Computer Science, pp. 39-48, Springer-Verlag, Berlin. (Pubitemid 126155025)
-
(1996)
Lecture Notes in Computer Science
, Issue.1174
, pp. 39-48
-
-
Anderson, R.1
-
3
-
-
84872317467
-
A gametheoretic approach to content-adaptive steganography
-
Berkeley, CA, May 15-18 TBD, Lecture Notes in Computer Science
-
R. Böhme and P. Schöttle,M. Kirchner and D. Ghosal, Eds., "A gametheoretic approach to content-adaptive steganography," in Proc. 14th Int. Conf. Information Hiding, Berkeley, CA, May 15-18, 2012, vol. TBD, Lecture Notes in Computer Science.
-
(2012)
Proc. 14th Int. Conf. Information Hiding
-
-
Böhme, R.1
Schöttle, P.2
Kirchner, M.3
Ghosal, D.4
-
4
-
-
84957868624
-
An information-theoretic model for steganography
-
Apr. 14-17 Lecture Notes in Computer Science Springer- Verlag, New York
-
C. Cachin, D. Aucsmith, Ed., "An information-theoretic model for steganography," in Proc. 2nd Int. Workshop Information Hiding, Portland, OR, Apr. 14-17, 1998, vol. 1525, Lecture Notes in Computer Science, pp. 306-318, Springer-Verlag, New York.
-
(1998)
Proc. 2nd Int. Workshop Information Hiding, Portland, or
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
Aucsmith, D.2
-
6
-
-
70350445582
-
Fisher information determines capacity of-secure steganography
-
S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany Jun. 7-10 Lecture Notes in Computer Science Springer- Verlag, New York
-
T. Filler and J. Fridrich, "Fisher information determines capacity of-secure steganography," in Proc. 11th Int. Conf. Information Hiding, S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7-10, 2009, vol. 5806, Lecture Notes in Computer Science, pp. 31-47, Springer-Verlag, New York.
-
(2009)
Proc. 11th Int. Conf. Information Hiding
, vol.5806
, pp. 31-47
-
-
Filler, T.1
Fridrich, J.2
-
7
-
-
70350562893
-
The square root law of steganographic capacity forMarkov covers
-
San Jose, CA Jan. 18-21
-
T. Filler, A. D. Ker, and J. Fridrich, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., "The square root law of steganographic capacity forMarkov covers," in Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, San Jose, CA, Jan. 18-21, 2009, vol. 7254, pp. 0 81-0 811.
-
(2009)
Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia XI
, vol.7254
, pp. 081-0811
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
Memon, N.D.4
Delp, E.J.5
Wong, P.W.6
Dittmann, J.7
-
9
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun.
-
J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
10
-
-
84858225018
-
Optimizing pixel predictors for steganalysis
-
San Francisco, CA, Jan. 23-26
-
V. Holub and J. Fridrich, A. Alattar, N. D. Memon, and E. J. Delp, Eds., "Optimizing pixel predictors for steganalysis," in Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, San Francisco, CA, Jan. 23-26, 2012, vol. 8303, pp. 09-1-09-13.
-
(2012)
Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV
, vol.8303
, pp. 091-0913
-
-
Holub, V.1
Fridrich, J.2
Alattar, A.3
Memon, N.D.4
Delp, E.J.5
-
11
-
-
85036644695
-
New JPEG steganographic scheme with high security performance
-
Oct. 1-3 Lecture Notes in Computer Science Springer- Verlag, New York
-
F.Huang,Y.Q. Shi, and J. Huang,H.-J. Kim, Y. Q. Shi, andM.Barni, Eds., "New JPEG steganographic scheme with high security performance," in Proc. 9th Int. Workshop on Digital Watermarking, Seoul, Korea, Oct. 1-3, 2010, vol. 6526, Lecture Notes in Computer Science, pp. 189-201, Springer-Verlag, New York.
-
(2010)
Proc. 9th Int. Workshop on Digital Watermarking, Seoul, Korea
, vol.6526
, pp. 189-201
-
-
Huang, F.1
Shi, Y.Q.2
Huang, J.3
Kim, H.-J.4
Shi, Y.Q.5
Barni, M.6
-
12
-
-
34547881527
-
A capacity result for batch steganography
-
DOI 10.1109/LSP.2006.891319
-
A. D. Ker, "A capacity result for batch steganography," IEEE Signal Process. Lett., vol. 14, no. 8, pp. 525-528, 2007. (Pubitemid 47250022)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
13
-
-
49949117942
-
A fusion of maximal likelihood and structural steganalysis
-
Jun. 11-13 Lecture Notes in Computer Science Springer- Verlag, Berlin
-
A. D. Ker, T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds., "A fusion of maximal likelihood and structural steganalysis," in Proc. 9th Int. Workshop Information Hiding, Saint Malo, France, Jun. 11-13, 2007, vol. 4567, Lecture Notes in Computer Science, pp. 204-219, Springer-Verlag, Berlin.
-
(2007)
Proc. 9th Int. Workshop Information Hiding, Saint Malo, France
, vol.4567
, pp. 204-219
-
-
Ker, A.D.1
Furon, T.2
Cayre, F.3
Doërr, G.4
Bas, P.5
-
14
-
-
38849116275
-
The ultimate steganalysis benchmark?
-
DOI 10.1145/1288869.1288889, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
A. D. Ker, J. Dittmann and J. Fridrich, Eds., "The ultimate steganalysis benchmark?," in Proc. 9th ACMMultimedia& SecurityWorkshop, Dallas, TX, Sep. 20-21, 2007, pp. 141-148. (Pubitemid 351203812)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 141-148
-
-
Ker, A.D.1
-
15
-
-
70350440358
-
Estimating steganographic Fisher information in real images
-
Darmstadt, Germany Jun. 7-10 Lecture Notes in Computer Science Springer- Verlag, New York
-
A. D. Ker, S. Katzenbeisser and A.-R. Sadeghi, Eds., "Estimating steganographic Fisher information in real images," in Proc. 11th Int. Conf. Information Hiding, Darmstadt, Germany, Jun. 7-10, 2009, vol. 5806, Lecture Notes in Computer Science, pp. 73-88, Springer-Verlag, New York.
-
(2009)
Proc. 11th Int. Conf. Information Hiding
, vol.5806
, pp. 73-88
-
-
Ker, A.D.1
Katzenbeisser, S.2
Sadeghi, A.-R.3
-
16
-
-
78549231321
-
The square root law in stegosystems with imperfect information
-
Calgary, Canada, Jun. 28-30 Lecture Notes in Computer Science Springer- Verlag, New York
-
A. D. Ker, R. Böhme and R. Safavi-Naini, Eds., "The square root law in stegosystems with imperfect information," in Proc. 12th Int. Conf. Information Hiding, Calgary, Canada, Jun. 28-30, 2010, vol. 6387, Lecture Notes in Computer Science, pp. 145-160, Springer-Verlag, New York.
-
(2010)
Proc. 12th Int. Conf. Information Hiding
, vol.6387
, pp. 145-160
-
-
Ker, A.D.1
Böhme, R.2
Safavi-Naini, R.3
-
17
-
-
56749160546
-
The square root law of steganographic capacity
-
Oxford, U.K., Sep. 22-23
-
A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich, A. D. Ker, J. Dittmann, and J. Fridrich, Eds., "The square root law of steganographic capacity," in Proc. 10th ACM Multimedia & Security Workshop, Oxford, U.K., Sep. 22-23, 2008, pp. 107-116.
-
(2008)
Proc. 10th ACM Multimedia & Security Workshop
, pp. 107-116
-
-
Ker, A.D.1
Pevný, T.2
Kodovský, J.3
Fridrich, J.4
Ker, A.D.5
Dittmann, J.6
Fridrich, J.7
-
18
-
-
78649425529
-
Quantitative structural steganalysis of Jsteg
-
Dec.
-
J. Kodovský and J. Fridrich, "Quantitative structural steganalysis of Jsteg," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 681-693, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 681-693
-
-
Kodovský, J.1
Fridrich, J.2
-
19
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
San Francisco, CA, Jan. 23-26
-
J. Kodovský and J. Fridrich, A. Alattar, N. D. Memon, and E. J. Delp, Eds., "Steganalysis of JPEG images using rich models," in Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, San Francisco, CA, Jan. 23-26, 2012, vol. 8303, pp. 0A-1-0A-13.
-
(2012)
Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV
, vol.8303
-
-
Kodovský, J.1
Fridrich, J.2
Alattar, A.3
Memon, N.D.4
Delp, E.J.5
-
20
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
Apr.
-
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
22
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun.
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
24
-
-
84867591559
-
An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents
-
Kyoto, Japan, Mar 25-30
-
C.Wang and J.Ni, "An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents," in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 25-30, 2012.
-
(2012)
Proc. IEEE ICASSP
-
-
Wang, C.1
Ni, J.2
-
25
-
-
8844234943
-
Steganalysis of block-structured stegotext
-
San Jose, CA Jan. 19-22
-
Y.Wang and P.Moulin,E. J. Delp and P.W.Wong,Eds., "Steganalysis of block-structured stegotext," in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Jan. 19-22, 2004, vol. 5306, pp. 477-488.
-
(2004)
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 477-488
-
-
Wang, Y.1
Moulin, P.2
Delp, E.J.3
Wong, P.W.4
-
26
-
-
45249103920
-
Perfectly secure steganography: Capacity, error exponents, and code constructions
-
Jun
-
Y. Wang and P. Moulin, "Perfectly secure steganography: Capacity, error exponents, and code constructions," IEEE Trans. Inf. Theory, Special Issue on Security, vol. 55, no. 6, pp. 2706-2722, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory, Special Issue on Security
, vol.55
, Issue.6
, pp. 2706-2722
-
-
Wang, Y.1
Moulin, P.2
-
27
-
-
84937814312
-
F5-A steganographic algorithm: High capacity despite better steganalysis
-
Information Hiding
-
A. Westfeld, I. S. Moskowitz, Ed., "High capacity despite better steganalysis (F5-A steganographic algorithm)," in Proc. 4th Int. Workshop Information Hiding, Pittsburgh, PA, Apr. 25-27, 2001, vol. 2137, Lecture Notes in Computer Science, pp. 289-302, Springer-Verlag, New York. (Pubitemid 33367674)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 289-302
-
-
Westfeld, A.1
-
28
-
-
80053026542
-
Statistical decision methods in hidden information detection
-
May 18-20 Lecture Notes in Computer Science
-
C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, T. Filler, T. Pevný, A. Ker, and S. Craver, Eds., "Statistical decision methods in hidden information detection," in Proc. 13th Int. Conf. Information Hiding, Prague, Czech Republic, May 18-20, 2011, Lecture Notes in Computer Science, pp. 163-177.
-
(2011)
Proc. 13th Int. Conf. Information Hiding, Prague, Czech Republic
, pp. 163-177
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
Filler, T.7
Pevný, T.8
Ker, A.9
Craver, S.10
-
29
-
-
34247562352
-
Steganalysis based on Markov model of thresholded prediction-error image
-
DOI 10.1109/ICME.2006.262792, 4036862, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
-
D. Zou, Y. Q. Shi, W. Su, and G. Xuan, "Steganalysis based on Markov model of thresholded prediction-error image," in Proc. IEEE Int. Conf. Multimedia and Expo, Toronto, Canada, Jul. 9-12, 2006, pp. 1365-1368. (Pubitemid 46679978)
-
(2006)
2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
, vol.2006
, pp. 1365-1368
-
-
Zou, D.1
Shi, Y.Q.2
Su, W.3
Xuan, G.4
|