-
1
-
-
58049131290
-
A comparative study of ±1 steganalyzers
-
G. Cancelli, G. Doerr, M. Barni, and I.J. Cox, "A comparative study of ±1 steganalyzers," Proc. IEEE Int. Workshop on Multimedia Signal Processing, 2008, pp. 791-796.
-
(2008)
Proc. IEEE Int. Workshop on Multimedia Signal Processing
, pp. 791-796
-
-
Cancelli, G.1
Doerr, G.2
Barni, M.3
Cox, I.J.4
-
2
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun.
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, Jun. 2010, pp. 215-224.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
3
-
-
56749170425
-
Multiclass detector of current steganographic methods for JPEG format
-
Dec.
-
T. Pevný and J. Fridrich, "Multiclass Detector of Current Steganographic Methods for JPEG Format," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, Dec. 2008, pp. 635-650.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 635-650
-
-
Pevný, T.1
Fridrich, J.2
-
4
-
-
78049366470
-
Forensics aided steganalysis of heterogeneous images
-
Mar.
-
M. Barni, G. Cancelli, and A. Esposito, "Forensics aided steganalysis of heterogeneous images," Proc. IEEE International Conference on Acoustic Speech and Signal Processing, Mar. 2010, pp. 1690-1693.
-
(2010)
Proc. IEEE International Conference on Acoustic Speech and Signal Processing
, pp. 1690-1693
-
-
Barni, M.1
Cancelli, G.2
Esposito, A.3
-
5
-
-
80055088455
-
New framework for using image contents in blind steganalysis systems
-
H. Amirkhani and M. Rahmati, "New framework for using image contents in blind steganalysis systems," Journal of Electronic Imaging, vol.20, no.1, 2011, pp. 013016.1-14.
-
(2011)
Journal of Electronic Imaging
, vol.20
, Issue.1
, pp. 0130161-0130214
-
-
Amirkhani, H.1
Rahmati, M.2
-
7
-
-
84947277755
-
An Implementation of key-based digital signal steganography
-
vol. 2137 of LNCS
-
T. Sharp, "An Implementation of key-based digital signal steganography," Proc. the 4th International Workshop on Information Hiding, vol. 2137 of LNCS, 2001, pp. 13-26.
-
(2001)
Proc. The 4th International Workshop on Information Hiding
, pp. 13-26
-
-
Sharp, T.1
-
8
-
-
79956222394
-
Local linear transform and new features of histogram characteristic functions for steganalysis of least significant bit matching steganography
-
E. Zheng, X. Ping, and T. Zhang, "Local linear transform and new features of histogram characteristic functions for steganalysis of least significant bit matching steganography," KSII Transactions on Internet and Information System, vol.5, no.4, 2011, pp. 840-855.
-
(2011)
KSII Transactions on Internet and Information System
, vol.5
, Issue.4
, pp. 840-855
-
-
Zheng, E.1
Ping, X.2
Zhang, T.3
-
9
-
-
78651097195
-
Reliable histogram features for detecting LSB matching
-
Sep.
-
K. Cai, X. Li, and T. Zeng, "Reliable histogram features for detecting LSB matching," Proc. IEEE Internatioanl Conf. on Image Processing, Sep. 2010, pp. 1761-1764.
-
(2010)
Proc. IEEE Internatioanl Conf. on Image Processing
, pp. 1761-1764
-
-
Cai, K.1
Li, X.2
Zeng, T.3
-
10
-
-
77956227815
-
Detection of LSB matching steganography in decompressed images
-
Feb.
-
J. Zhang and D. Zhang, "Detection of LSB Matching Steganography in Decompressed Images," IEEE Signal Processing Letters, vol.17, no.2, Feb. 2010, pp.141-144.
-
(2010)
IEEE Signal Processing Letters
, vol.17
, Issue.2
, pp. 141-144
-
-
Zhang, J.1
Zhang, D.2
-
11
-
-
84862914207
-
A blind detection method for additive noise steganography in JPEG decompressed images
-
Nov.
-
X. Li, T. Zhang, K. Li, and X. Ping, "A blind detection method for additive noise steganography in JPEG decompressed images," Proc. IEEE International Conference on Multimedia Information Networking and Security, Nov. 2011, pp. 489-493.
-
(2011)
Proc. IEEE International Conference on Multimedia Information Networking and Security
, pp. 489-493
-
-
Li, X.1
Zhang, T.2
Li, K.3
Ping, X.4
-
12
-
-
33645676686
-
New blind steganalysis and its implications
-
Jan.
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, Jan. 2006, pp. 1-13.
-
(2006)
Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents
, vol.8
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
13
-
-
42949179512
-
Textural features based universal steganalysis
-
B. Li, J. Huang, and Y. Q. Shi, "Textural features based universal steganalysis," Proc. SPIE Security, Forensics, Steganography and Watermarking of Multimedia, 2008, pp. 1201-1212.
-
(2008)
Proc. SPIE Security, Forensics, Steganography and Watermarking of Multimedia
, pp. 1201-1212
-
-
Li, B.1
Huang, J.2
Shi, Y.Q.3
-
14
-
-
77955676537
-
JPEG error analysis and its applications to digital image forensics
-
Sep.
-
W. Luo, F. Huang, and J. Huang, "JPEG error analysis and its applications to digital image forensics," IEEE Trans. Inf. Forensics Secur., vol. 5, no. 3, Sep. 2010, pp. 480-491.
-
(2010)
IEEE Trans. Inf. Forensics Secur.
, vol.5
, Issue.3
, pp. 480-491
-
-
Luo, W.1
Huang, F.2
Huang, J.3
-
15
-
-
78650003881
-
Security analysis on spatial ±1 steganography for JPEG decompressed images
-
Jan.
-
W. Luo, Y. Wang, and J. Huang, "Security Analysis on Spatial ±1 Steganography for JPEG Decompressed Images," IEEE Signal Processing Letters, vol. 18, no. 1, Jan. 2011, pp. 39-42.
-
(2011)
IEEE Signal Processing Letters
, vol.18
, Issue.1
, pp. 39-42
-
-
Luo, W.1
Wang, Y.2
Huang, J.3
|