-
1
-
-
80053005547
-
Break our steganographic system - The ins and outs of organizing boss
-
Springer
-
P. Bas, T. Filler, T. Pevný, Break our steganographic system - the ins and outs of organizing boss, in: Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, vol. 6958, Springer, 2011, pp. 59-70.
-
(2011)
Information Hiding, 13th International Workshop, Lecture Notes in Computer Science
, vol.6958
, pp. 59-70
-
-
Bas, P.1
-
3
-
-
58049131290
-
A comparative study of ±1 steganalyzers
-
G. Cancelli, G. Doerr, M. Barni, I. Cox, A comparative study of ±1 steganalyzers, in: IEEE Workshop on Multimedia Signal Processing, 2008, pp. 791-796.
-
(2008)
IEEE Workshop on Multimedia Signal Processing
, pp. 791-796
-
-
Cancelli, G.1
Doerr, G.2
Barni, M.3
Cox, I.4
-
4
-
-
69949122982
-
Detection of ±1 LSB steganography based on the amplitude of histogram local extrema
-
G. Cancelli, G. Doerr, I. Cox, M. Barni, Detection of ±1 LSB steganography based on the amplitude of histogram local extrema, in: IEEE International Conference on Image Processing, 2008, pp. 1288-1291.
-
(2008)
IEEE International Conference on Image Processing
, pp. 1288-1291
-
-
Cancelli, G.1
Doerr, G.2
Cox, I.3
Barni, M.4
-
5
-
-
0346216907
-
Hiding data in images by simple LSB substitution
-
C.K. Chan, and L. Cheng Hiding data in images by simple LSB substitution Pattern Recognition 37 2004 469 474
-
(2004)
Pattern Recognition
, vol.37
, pp. 469-474
-
-
Chan, C.K.1
Cheng, L.2
-
6
-
-
70350710022
-
Digital image steganography survey and analysis of current methods
-
A. Cheddad, J. Condell, K. Curran, and P.M. Kevitt Digital image steganography survey and analysis of current methods Signal Processing 90 2010 727 752
-
(2010)
Signal Processing
, vol.90
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, P.M.4
-
7
-
-
80052987721
-
A cover image model for reliable steganalysis
-
Springer
-
R. Cogranne, C. Zitzmann, L. Fillatre, I. Nikiforov, F. Retraint, P. Cornu, A cover image model for reliable steganalysis, in: Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, vol. 6958, Springer, 2011, pp. 178-192.
-
(2011)
Information Hiding, 13th International Workshop, Lecture Notes in Computer Science
, vol.6958
, pp. 178-192
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
8
-
-
80054797149
-
Statistical decision by using quantized observations
-
R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, P. Cornu, Statistical decision by using quantized observations, in: IEEE International Symposium on Information Theory, 2011, pp. 1135-1139.
-
(2011)
IEEE International Symposium on Information Theory
, pp. 1135-1139
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
9
-
-
84868243734
-
Statistical detection of LSB matching in the presence of nuisance parameters
-
R. Cogranne, C. Zitzmann, I. Nikiforov, F. Retraint, L. Fillatre, P. Cornu, Statistical detection of LSB matching in the presence of nuisance parameters, in: IEEE Workshop on Statistical Signal Processing, 2012, pp. 912-915, 10.1109/SSP.2012.6319857
-
(2012)
IEEE Workshop on Statistical Signal Processing
, pp. 912-915
-
-
Cogranne, R.1
Zitzmann, C.2
Nikiforov, I.3
Retraint, F.4
Fillatre, L.5
Cornu, P.6
-
10
-
-
84868216373
-
Statistical detection of LSB Matching Using Hypothesis Testing Theory
-
Springer, in preparation
-
R. Cogranne, C. Zitzmann, F. Retraint, I. Nikiforov, L. Fillatre, P. Cornu, Statistical detection of LSB Matching Using Hypothesis Testing Theory, in: Information Hiding, Lecture Notes in Computer Science, Springer, 2012, in preparation.
-
(2012)
Information Hiding, Lecture Notes in Computer Science
-
-
Cogranne, R.1
Zitzmann, C.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
-
12
-
-
4744365298
-
Detection of hiding in the least significant bit
-
O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, and B. Manjunath Detection of hiding in the least significant bit IEEE Transactions on Signal Processing 52 2004 3046 3058
-
(2004)
IEEE Transactions on Signal Processing
, vol.52
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
16
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
J. Fridrich, M. Goljan, On estimation of secret message length in LSB steganography in spatial domain, in: Proceedings of the SPIE, vol. 5306, pp. 23-34.
-
Proceedings of the SPIE
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
17
-
-
84863070302
-
New blind steganalysis and its implications
-
M. Goljan, J. Fridrich, T. Holotyak, New blind steganalysis and its implications, in: Proceedings of the SPIE, vol. 5306, pp. 1-13.
-
Proceedings of the SPIE
, vol.5306
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
18
-
-
0242665592
-
Higher-order statistical steganalysis of palette images
-
J. Harmsen, W. Pearlman, Higher-order statistical steganalysis of palette images, in: Proceedings of the SPIE, vol. 5020, 2003.
-
(2003)
Proceedings of the SPIE
, vol.5020
-
-
Harmsen, J.1
Pearlman, W.2
-
22
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
A. Ker Steganalysis of LSB matching in grayscale images IEEE Signal Processing Letters 12 2005 441 444
-
(2005)
IEEE Signal Processing Letters
, vol.12
, pp. 441-444
-
-
Ker, A.1
-
23
-
-
34547881527
-
A capacity result for batch steganography
-
A.D. Ker A capacity result for batch steganography IEEE Signal Processing Letters 14 2007 525 528
-
(2007)
IEEE Signal Processing Letters
, vol.14
, pp. 525-528
-
-
Ker, A.D.1
-
24
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
A.D. Ker, R. Böhme, Revisiting weighted stego-image steganalysis, in: Proceedings of the SPIE, vol. 6819, pp. 501-517.
-
Proceedings of the SPIE
, vol.6819
, pp. 501-517
-
-
Ker, A.D.1
-
25
-
-
84869846739
-
Technical Points about Adaptive Steganography by Oracle (ASO)
-
S. Kouider, M. Chaumont, W. Puech, Technical Points about Adaptive Steganography by Oracle (ASO), in: EUSIPCO'2012, the 20th European Signal Processing Conference, 2012, pp. 1703-1707.
-
(2012)
EUSIPCO'2012, the 20th European Signal Processing Conference
, pp. 1703-1707
-
-
Kouider, S.1
Chaumont, M.2
Puech, W.3
-
28
-
-
77955340188
-
Data hiding based on the similarity between neighboring pixels with reversibility
-
Y.C. Li, C.M. Yeh, and C.C. Chang Data hiding based on the similarity between neighboring pixels with reversibility Digital Signal Processing 20 2010 1116 1128
-
(2010)
Digital Signal Processing
, vol.20
, pp. 1116-1128
-
-
Li, Y.C.1
Yeh, C.M.2
Chang, C.C.3
-
29
-
-
34548017677
-
Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images
-
Q. Liu, A.H. Sung, Z. Chen, and J. Xu Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images Pattern Recognition 41 2008 56 66
-
(2008)
Pattern Recognition
, vol.41
, pp. 56-66
-
-
Liu, Q.1
Sung, A.H.2
Chen, Z.3
Xu, J.4
-
31
-
-
44649098085
-
A review on blind detection for image steganography
-
X.Y. Luo, D.S. Wang, P. Wang, and F.L. Liu A review on blind detection for image steganography Signal Processing 88 2008 2138 2157
-
(2008)
Signal Processing
, vol.88
, pp. 2138-2157
-
-
Luo, X.Y.1
Wang, D.S.2
Wang, P.3
Liu, F.L.4
-
34
-
-
33847156891
-
Steganography and error-correcting codes
-
C. Munuera Steganography and error-correcting codes Signal Processing 87 2007 1528 1533
-
(2007)
Signal Processing
, vol.87
, pp. 1528-1533
-
-
Munuera, C.1
-
35
-
-
77955421242
-
Classification of steganalysis techniques a study
-
A. Nissar, and A. Mir Classification of steganalysis techniques a study Digital Signal Processing 20 2010 1758 1770
-
(2010)
Digital Signal Processing
, vol.20
, pp. 1758-1770
-
-
Nissar, A.1
Mir, A.2
-
36
-
-
67349111800
-
Product perfect codes and steganography
-
H. Rifà-Pous, and J. Rifà Product perfect codes and steganography Digital Signal Processing 19 2009 764 769
-
(2009)
Digital Signal Processing
, vol.19
, pp. 764-769
-
-
Rifà-Pous, H.1
Rifà, J.2
-
37
-
-
34547917144
-
Performance measures for Neyman-Pearson classification
-
C. Scott Performance measures for Neyman-Pearson classification IEEE Transactions on Information Theory 53 2007 2852 2863
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, pp. 2852-2863
-
-
Scott, C.1
-
39
-
-
0001217738
-
The prisoners problem and the subliminal channel
-
G. Simmons, The prisoners problem and the subliminal channel, in: CRYPTO, 1983, pp. 51-67.
-
(1983)
CRYPTO
, pp. 51-67
-
-
Simmons, G.1
-
40
-
-
60749112009
-
Reversible image hiding scheme using predictive coding and histogram shifting
-
P. Tsai, Y.C. Hu, and H.L. Yeh Reversible image hiding scheme using predictive coding and histogram shifting Signal Processing 89 2009 1129 1143
-
(2009)
Signal Processing
, vol.89
, pp. 1129-1143
-
-
Tsai, P.1
Hu, Y.C.2
Yeh, H.L.3
-
41
-
-
0035283377
-
Image hiding by optimal LSB substitution and genetic algorithm
-
R.Z. Wang, C.F. Lin, and J.C. Lin Image hiding by optimal LSB substitution and genetic algorithm Pattern Recognition 34 2001 671 683
-
(2001)
Pattern Recognition
, vol.34
, pp. 671-683
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
43
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
D.C. Wu, and W.H. Tsai A steganographic method for images by pixel-value differencing Pattern Recognition Letters 24 2003 1613 1626
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
45
-
-
48149108030
-
Steganalysis for LSB matching in images with high-frequency noise
-
J. Zhang, I. Cox, G. Doerr, Steganalysis for LSB matching in images with high-frequency noise, in: IEEE Workshop on Multimedia Signal Processing, 2007, pp. 385-388.
-
(2007)
IEEE Workshop on Multimedia Signal Processing
, pp. 385-388
-
-
Zhang, J.1
Cox, I.2
Doerr, G.3
-
46
-
-
77956618202
-
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions
-
T. Zhang, W. Li, Y. Zhang, E. Zheng, and X. Ping Steganalysis of LSB matching based on statistical modeling of pixel difference distributions Information Sciences 180 2010 4685 4694
-
(2010)
Information Sciences
, vol.180
, pp. 4685-4694
-
-
Zhang, T.1
Li, W.2
Zhang, Y.3
Zheng, E.4
Ping, X.5
-
47
-
-
0041821327
-
A new approach to reliable detection of LSB steganography in natural images
-
T. Zhang, and X. Ping A new approach to reliable detection of LSB steganography in natural images Signal Processing 83 2003 2085 2093
-
(2003)
Signal Processing
, vol.83
, pp. 2085-2093
-
-
Zhang, T.1
Ping, X.2
-
48
-
-
80053026542
-
Statistical decision methods in hidden information detection
-
Springer
-
C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, P. Cornu, Statistical decision methods in hidden information detection, in: Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, vol. 6958, Springer, 2011, pp. 163-177.
-
(2011)
Information Hiding, 13th International Workshop, Lecture Notes in Computer Science
, vol.6958
, pp. 163-177
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
|