-
1
-
-
80053005547
-
Break our steganographic system- The ins and outs of organizing BOSS
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, volume 6958 of Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
-
P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Information Hiding, 13th International Workshop
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
2
-
-
0030196364
-
Stacked regressions
-
L. Breiman. Stacked regressions. Machine Learning, 24:49-64, 1996.
-
(1996)
Machine Learning
, vol.24
, pp. 49-64
-
-
Breiman, L.1
-
3
-
-
0003802343
-
-
Wadsworth and Brooks, Monterey, CA
-
L. Breiman, J. Friedman, R. Olshen, and C. Stone. Classification and Regression Trees. Wadsworth and Brooks, Monterey, CA, 1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.2
Olshen, R.3
Stone, C.4
-
4
-
-
0001573594
-
Regression, prediction and shrinkage
-
Series B (Methodological)
-
J. B. Copas. Regression, prediction and shrinkage. Journal of the Royal Statistical Society. Series B (Methodological), 45(3):311-354, 1983.
-
(1983)
Journal of the Royal Statistical Society
, vol.45
, Issue.3
, pp. 311-354
-
-
Copas, J.B.1
-
5
-
-
35248901820
-
Detection of LSB steganography via sample pairs analysis
-
F.A.P. Petitcolas, editor, volume 2578 of Lecture Notes in Computer Science, Noordwijkerhout, The Netherlands, October 7-9, Springer-Verlag, New York
-
S. Dumitrescu, X. Wu, and Z. Wang. Detection of LSB steganography via Sample Pairs Analysis. In F.A.P. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 355-372, Noordwijkerhout, The Netherlands, October 7-9, 2002. Springer-Verlag, New York.
-
(2002)
Information Hiding, 5th International Workshop
, pp. 355-372
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
6
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
E.J. Delp and P.W. Wong, editors, volume, San Jose, CA, January 19-22
-
J. Fridrich and M. Goljan. On estimation of secret message length in LSB steganography in spatial domain. In E.J. Delp and P.W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 23-34, San Jose, CA, January 19-22, 2004.
-
(2004)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
7
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
October-December
-
J. Fridrich, M. Goljan, and R. Du. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, Special Issue on Security, 8(4):22-28, October-December 2001.
-
(2001)
IEEE Multimedia, Special Issue on Security
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
9
-
-
85053452541
-
Steganalysis of LSB replacement using parity-aware features
-
Lecture Notes in Computer Science, Berkeley, CA, May 15-18, To appear
-
J. Fridrich and J. Kodovský. Steganalysis of LSB replacement using parity-aware features. In Information Hiding, 14th International Workshop, Lecture Notes in Computer Science, Berkeley, CA, May 15-18, 2012. To appear.
-
(2012)
Information Hiding, 14th International Workshop
-
-
Fridrich, J.1
Kodovský, J.2
-
10
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
J. Dittmann and J. Fridrich, editors, Dallas, TX, September 20-21
-
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
11
-
-
0035470889
-
Greedy function approximation: A gradient boosting machine
-
J. H. Friedman. Greedy function approximation: A gradient boosting machine. Annals of Statistics, 29:1189-1232, 2000.
-
(2000)
Annals of Statistics
, vol.29
, pp. 1189-1232
-
-
Friedman, J.H.1
-
12
-
-
80052990656
-
A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, volume 6958 of Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
-
G. Gül and F. Kurugollu. A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, volume 6958 of Lecture Notes in Computer Science, pages 71-84, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Information Hiding, 13th International Workshop
, pp. 71-84
-
-
Gül, G.1
Kurugollu, F.2
-
13
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
E.J. Delp and P.W. Wong, editors, volume, San Jose, CA, January 27-31
-
A.D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In E.J. Delp and P.W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1-17, San Jose, CA, January 27-31, 2008.
-
(2008)
Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 1-17
-
-
Ker, A.D.1
Böhme, R.2
-
14
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
J.L. Camenisch, C.S. Collberg, N.F. Johnson, and P. Sallee, editors, volume 4437 of Lecture Notes in Computer Science, Alexandria, VA, July 10-12, Springer-Verlag, New York
-
Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In J.L. Camenisch, C.S. Collberg, N.F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 314-327, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
-
(2006)
Information Hiding, 8th International Workshop
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
15
-
-
70449646940
-
Calibration revisited
-
J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
-
J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63-74, Princeton, NJ, September 7-8, 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 63-74
-
-
Kodovský, J.1
Fridrich, J.2
-
16
-
-
79954474492
-
Steganalysis in high dimensions: Fusing classifiers built on random subspaces
-
N.D. Memon, E.J. Delp, P.W. Wong, and J. Dittmann, editors, volume, San Francisco, CA, January 23-26
-
J. Kodovský and J. Fridrich. Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In N.D. Memon, E.J. Delp, P.W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, volume 7880, pages OL 1-13, San Francisco, CA, January 23-26, 2011.
-
(2011)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII
, vol.7880
, pp. 1-13
-
-
Kodovský, J.1
Fridrich, J.2
-
17
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
A. Alattar, N. D. Memon, and E. J. Delp, editors, San Francisco, CA, January 23-26
-
J. Kodovský and J. Fridrich. Steganalysis of JPEG images using rich models. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, volume 8303, pages 0A 1-13, San Francisco, CA, January 23-26, 2012.
-
(2012)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV
, vol.8303
, pp. 1-13
-
-
Kodovský, J.1
Fridrich, J.2
-
18
-
-
80054777166
-
On dangers of overtraining steganography to incomplete cover model
-
J. Dittmann, S. Craver, and C. Heitzenrater, editors, Niagara Falls, NY, September 29-30
-
J. Kodovský, J. Fridrich, and V. Holub. On dangers of overtraining steganography to incomplete cover model. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 69-76, Niagara Falls, NY, September 29-30, 2011.
-
(2011)
Proceedings of the 13th ACM Multimedia & Security Workshop
, pp. 69-76
-
-
Kodovsḱ, J.1
Fridrich, J.2
Holub, V.3
-
19
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
April
-
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432-444, April 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
20
-
-
84858252960
-
Going from small to large data sets in steganalysis
-
A. Alattar, N. D. Memon, and E. J. Delp, editors, volume, San Francisco, CA, January 23-26
-
I. Lubenko and A. D. Ker. Going from small to large data sets in steganalysis. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, volume 8303, pages OM 1-10, San Francisco, CA, January 23-26, 2012.
-
(2012)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV
, vol.8303
-
-
Lubenko, I.1
Ker, A.D.2
-
21
-
-
70449644855
-
Steganalysis by subtractive pixel adjacency matrix
-
J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 75-84, Princeton, NJ, September 7-8, 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 75-84
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
22
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
R. Böhme and R. Safavi-Naini, editors, volume 6387 of Lecture Notes in Computer Science, Calgary, Canada, June 28-30, Springer-Verlag, New York
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
-
(2010)
Information Hiding, 12th International Workshop
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
23
-
-
71449120465
-
From blind to quantitative steganalysis
-
N.D. Memon, E.J. Delp, P.W. Wong, and J. Dittmann, editors, volume, San Jose, CA, January 18-21
-
T. Pevný, J. Fridrich, and A.D. Ker. From blind to quantitative steganalysis. In N.D. Memon, E.J. Delp, P.W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 0C 1-14, San Jose, CA, January 18-21, 2009.
-
(2009)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI
, vol.7254
-
-
Pevný, T.1
Fridrich, J.2
Ker, A.D.3
-
24
-
-
70449657749
-
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
-
J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
-
V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131-140, Princeton, NJ, September 7-8, 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 131-140
-
-
Sachnev, V.1
Kim, H.J.2
Zhang, R.3
-
26
-
-
0026692226
-
Stacked generalization
-
D. H. Wolpert. Stacked generalization. Neural Networks, 5:241-259, 1992.
-
(1992)
Neural Networks
, vol.5
, pp. 241-259
-
-
Wolpert, D.H.1
|