-
1
-
-
0001217738
-
The prisoners problem and the subliminal channel
-
G. Simmons, "The prisoners problem and the subliminal channel," in Proc. CRYPTO, 1983, pp. 51-67.
-
(1983)
Proc. CRYPTO
, pp. 51-67
-
-
Simmons, G.1
-
2
-
-
85053452541
-
Steganalysis of LSB replacement using parity-aware features
-
NewYork,NY,USA: Springer, LNCS.
-
J. Fridrich and J. Kodovský, "Steganalysis of LSB replacement using parity-aware features," in Information Hiding. NewYork,NY,USA: Springer, 2012, LNCS.
-
(2012)
Information Hiding
-
-
Fridrich, J.1
Kodovský, J.2
-
4
-
-
53349159971
-
-
2nd ed. San Mateo, CA, USA: Morgan Kaufmann
-
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. San Mateo, CA, USA: Morgan Kaufmann, 2007.
-
(2007)
Digital Watermarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
5
-
-
77951773086
-
-
1st ed. Cambridge, U.K.: Cambridge Univ. Press
-
J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 1st ed. Cambridge, U.K.: Cambridge Univ. Press, 2009.
-
(2009)
Steganography in Digital Media: Principles, Algorithms, and Applications
-
-
Fridrich, J.1
-
6
-
-
58049131290
-
A comparative study of steganalyzers
-
G. Cancelli, G. Doerr, M. Barni, and I. Cox, "A comparative study of steganalyzers," in Proc. IEEE Workshop Multimedia Signal Process., 2008, pp. 791-796.
-
(2008)
Proc. IEEE Workshop Multimedia Signal Process.
, pp. 791-796
-
-
Cancelli, G.1
Doerr, G.2
Barni, M.3
Cox, I.4
-
7
-
-
48149108030
-
Steganalysis for LSB matching in images with high-frequency noise
-
J. Zhang, I. Cox, and G. Doerr, "Steganalysis for LSB matching in images with high-frequency noise," in Proc. IEEE Workshop Multimedia Signal Process., 2007, pp. 385-388.
-
(2007)
Proc. IEEE Workshop Multimedia Signal Process.
, pp. 385-388
-
-
Zhang, J.1
Cox, I.2
Doerr, G.3
-
8
-
-
33645015900
-
Wet paper codes with improved embedding efficiency
-
Mar
-
J. Fridrich, M. Goljan, and D. Soukal, "Wet paper codes with improved embedding efficiency," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 102-110, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
9
-
-
33847156891
-
Steganography and error-correcting codes
-
DOI 10.1016/j.sigpro.2006.12.008, PII S0165168406004257
-
C. Munuera, "Steganography and error-correcting codes," Signal Process., vol. 87, no. 6, pp. 1528-1533, 2007. (Pubitemid 46282998)
-
(2007)
Signal Processing
, vol.87
, Issue.6
, pp. 1528-1533
-
-
Munuera, C.1
-
10
-
-
49549092237
-
Adaptive data hiding in edge areas of images with spatial LSB domain systems
-
Sep
-
C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun, "Adaptive data hiding in edge areas of images with spatial LSB domain systems," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488-497, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 488-497
-
-
Yang, C.-H.1
Weng, C.-Y.2
Wang, S.-J.3
Sun, H.-M.4
-
11
-
-
77952620028
-
Edge adaptive image steganography based on LSB matching revisited
-
Jun
-
W. Luo, F. Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited," IEEE Trans. Inf. Forensics and Security, vol. 5, no. 2, pp. 201-214, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics and Security
, vol.5
, Issue.2
, pp. 201-214
-
-
Luo, W.1
Huang, F.2
Huang, J.3
-
12
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
New York, NY, USA: Springer, LNCS
-
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding. New York, NY, USA: Springer, 2010, vol. 6387, LNCS, pp. 161-177.
-
(2010)
Information Hiding
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
13
-
-
69949122982
-
Detection of LSB steganography based on the amplitude of histogram local extrema
-
G. Cancelli, G. Doerr, I. Cox, and M. Barni, "Detection of LSB steganography based on the amplitude of histogram local extrema," in Proc. IEEE Int. Conf. Image Process., 2008, pp. 1288-1291.
-
(2008)
Proc. IEEE Int. Conf. Image Process.
, pp. 1288-1291
-
-
Cancelli, G.1
Doerr, G.2
Cox, I.3
Barni, M.4
-
14
-
-
33744728031
-
Steganalysis for Markov cover data with applications to images
-
DOI 10.1109/TIFS.2006.873595
-
K. Sullivan, U. Madhow, S. Ch, and B. S. Manjunath, "Steganalysis for markov cover data with applications to images," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 275-287, Jun. 2006. (Pubitemid 43824636)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.S.4
-
15
-
-
33645676686
-
New blind steganalysis and its implications
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Proc. Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006, Proc. SPIE, pp. 1-13.
-
Proc. Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006, Proc. SPIE
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
16
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
Mar
-
S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
17
-
-
34547917144
-
Performance measures for Neyman-Pearson classification
-
DOI 10.1109/TIT.2007.901152
-
C. Scott, "Performance measures for Neyman-Pearson classification," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2852-2863, Aug. 2007. (Pubitemid 47249851)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2852-2863
-
-
Scott, C.1
-
18
-
-
84873687098
-
Higher-order statistical steganalysis of palette images
-
J. Harmsen and W. Pearlman, "Higher-order statistical steganalysis of palette images," in Proc. Security, Steganography, and Watermarking of Multimedia Contents V, 2005, vol. 5020, Proc. SPIE.
-
Proc. Security, Steganography, and Watermarking of Multimedia Contents V, 2005, 5020, Proc. SPIE
-
-
Harmsen, J.1
Pearlman, W.2
-
19
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
DOI 10.1109/LSP.2005.847889
-
A. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, Jun. 2005. (Pubitemid 40794877)
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
20
-
-
80053005547
-
Break our steganographic system-The ins and outs of organizing BOSS
-
New York, NY, USA: Springer, LNCS
-
P. Bas, T. Filler, and T. Pevný, "Break our steganographic system - The ins and outs of organizing BOSS," in Information Hiding. New York, NY, USA: Springer, 2011, vol. 6958, LNCS, pp. 59-70.
-
(2011)
Information Hiding
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
21
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun
-
J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovsky, J.2
-
22
-
-
4744365298
-
Detection of hiding in the least significant bit
-
Oct
-
O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, and B. Manjunath, "Detection of hiding in the least significant bit," IEEE Trans. Signal Process., vol. 52, no. 10, pt. 2, pp. 3046-3058, Oct. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.10 PART 2
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
23
-
-
80054797149
-
Statistical decision by using quantized observations
-
R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, and P. Cornu, "Statistical decision by using quantized observations," in Proc. IEEE Int. Symp. Inf. Theory, 2011, pp. 1135-1139.
-
(2011)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 1135-1139
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
24
-
-
84855933278
-
Adaptive steganalysis of least significant bit replacement in grayscale natural images
-
Feb
-
L. Fillatre, "Adaptive steganalysis of least significant bit replacement in grayscale natural images," IEEE Trans. Image Process., vol. 60, no. 2, pp. 556-569, Feb. 2012.
-
(2012)
IEEE Trans. Image Process.
, vol.60
, Issue.2
, pp. 556-569
-
-
Fillatre, L.1
-
25
-
-
80052987721
-
A cover image model for reliable steganalysis
-
New York, NY, USA: Springer, LNCS
-
R. Cogranne, C. Zitzmann, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu, "A cover image model for reliable steganalysis," in Information Hiding. New York, NY, USA: Springer, 2011, vol. 6958, LNCS, pp. 178-192.
-
(2011)
Information Hiding
, vol.6958
, pp. 178-192
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
26
-
-
52649143252
-
Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data
-
Oct
-
A. Foi, M. Trimeche, V. Katkovnik, and K. Egiazarian, "Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data," IEEE Trans. Image Process., vol. 17, no. 10, pp. 1737-1754, Oct. 2008.
-
(2008)
IEEE Trans. Image Process.
, vol.17
, Issue.10
, pp. 1737-1754
-
-
Foi, A.1
Trimeche, M.2
Katkovnik, V.3
Egiazarian, K.4
-
27
-
-
0028391852
-
Radiometric CCD camera calibration and noise estimation
-
Mar
-
G. Healey and R. Kondepudy, "Radiometric CCD camera calibration and noise estimation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 3, pp. 267-276, Mar. 1994.
-
(1994)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.16
, Issue.3
, pp. 267-276
-
-
Healey, G.1
Kondepudy, R.2
-
29
-
-
80053026542
-
Statistical decision methods in hidden information detection
-
New York, NY, USA: Springer, LNCS
-
C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, "Statistical decision methods in hidden information detection," in Information Hiding. New York, NY, USA: Springer, 2011, vol. 6958, LNCS, pp. 163-177.
-
(2011)
Information Hiding
, vol.6958
, pp. 163-177
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
-
30
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
J. Fridrich and M. Goljan, "On estimation of secret message length in LSB steganography in spatial domain," in Proc. Security, Steganography, and Watermarking of Multimedia Contents VI, 2004, vol. 5306, Proc. SPIE, pp. 23-34.
-
Proc. Security, Steganography, and Watermarking of Multimedia Contents VI, 2004, 5306, Proc. SPIE
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
32
-
-
84868243734
-
Statistical detection of LSB matching in the presence of nuisance parameters
-
Ann Arbor, MI, USA
-
R. Cogranne, C. Zitzmann, I. Nikiforov, F. Retraint, L. Fillatre, and P. Cornu, "Statistical detection of LSB matching in the presence of nuisance parameters," in Proc. IEEEWorkshop Statist. Signal Process., Ann Arbor, MI, USA, 2012, pp. 912-915.
-
(2012)
Proc. IEEEWorkshop Statist. Signal Process.
, pp. 912-915
-
-
Cogranne, R.1
Zitzmann, C.2
Nikiforov, I.3
Retraint, F.4
Fillatre, L.5
Cornu, P.6
-
33
-
-
84925134546
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
B. Widrow and I. Kollár, Quantization Noise: Roundoff Error in Digital Computation, Signal Processing, Control, and Communications. Cambridge, U.K.: Cambridge Univ. Press, 2008.
-
(2008)
Roundoff Error in Digital Computation, Signal Processing, Control, and Communications
-
-
Widrow, B.1
Kollár, I.2
Noise, Q.3
-
34
-
-
34547881527
-
A capacity result for batch steganography
-
DOI 10.1109/LSP.2006.891319
-
A. D. Ker, "A capacity result for batch steganography," Signal Process. Lett., vol. 14, no. 8, pp. 525-528, 2007. (Pubitemid 47250022)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
35
-
-
84961389381
-
-
Bellingham,WA, USA: SPIE Press
-
V. Katkovnik, K. Egiazarian, and J. Astola, Local Approximation Techniques in Signal and Image Processing. Bellingham,WA, USA: SPIE Press, 2006.
-
(2006)
Local Approximation Techniques in Signal and Image Processing
-
-
Katkovnik, V.1
Egiazarian, K.2
Astola, J.3
-
36
-
-
20444440880
-
Random field models in image analysis
-
R. Dubes and A. Jain, "Random field models in image analysis," J. Appl. Statist., vol. 16, no. 2, pp. 131-164, 1989.
-
(1989)
J. Appl. Statist.
, vol.16
, Issue.2
, pp. 131-164
-
-
Dubes, R.1
Jain, A.2
-
37
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
A. D. Ker and R. Böhme, "Revisiting weighted stego-image steganalysis," in Proc. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008, vol. 6819, Proc. SPIE, pp. 501-517.
-
Proc. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008, 6819, Proc. SPIE
, pp. 501-517
-
-
Ker, A.D.1
Böhme, R.2
-
38
-
-
84868216373
-
Statistical detection of LSB matching using hypothesis testing theory
-
New York,NY, USA: Springer, LNCS.
-
R. Cogranne, C. Zitzmann, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, "Statistical detection of LSB matching using hypothesis testing theory," in Information Hiding. New York,NY, USA: Springer, 2012, LNCS.
-
(2012)
Information Hiding
-
-
Cogranne, R.1
Zitzmann, C.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
-
39
-
-
33144483155
-
Stable recovery of sparse overcomplete representations in the presence of noise
-
DOI 10.1109/TIT.2005.860430
-
D. Donoho, M. Elad, and V. Temlyakov, "Stable recovery of sparse overcomplete representations in the presence of noise," IEEE Trans. Inf. Theory, vol. 52, no. 1, pp. 6-18, Jan. 2006. (Pubitemid 43263116)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.1
, pp. 6-18
-
-
Donoho, D.L.1
Elad, M.2
Temlyakov, V.N.3
-
40
-
-
33751379736
-
Image denoising via sparse and redundant representations over learned dictionaries
-
DOI 10.1109/TIP.2006.881969
-
M. Elad and M. Aharon, "Image denoising via sparse and redundant representations over learned dictionaries," IEEE Trans. Image Process., vol. 15, no. 12, pp. 3736-3745, Dec. 2006. (Pubitemid 44811686)
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.12
, pp. 3736-3745
-
-
Elad, M.1
Aharon, M.2
-
41
-
-
84902748454
-
Discrete cosine transform
-
Jan
-
N. Ahmed, T. Natarajan, and K. Rao, "Discrete cosine transform," IEEE Trans. Comput., vol. C-23, no. 1, pp. 90-93, Jan. 1974.
-
(1974)
IEEE Trans. Comput.
, vol.23
, Issue.1
, pp. 90-93
-
-
Ahmed, N.1
Natarajan, T.2
Rao, K.3
-
42
-
-
84880064175
-
Statistical model of natural images
-
Orlando, FL, USA
-
T. H. Thai, R. Cogranne, and F. Retraint, "Statistical model of natural images," in Proc. IEEE Int. Conf. Image Process., Orlando, FL, USA, 2012.
-
(2012)
Proc. IEEE Int. Conf. Image Process
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
|