-
1
-
-
80053005547
-
Break our steganographic system- The ins and outs of organizing BOSS
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, volume 6958 of Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
-
P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Information Hiding, 13th International Conference
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
3
-
-
80052990656
-
A new methodology in steganalysis: Breaking highly undetactable steganograpy (HUGO)
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
-
G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly undetactable steganograpy (HUGO). In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, Lecture Notes in Computer Science, pages 71-84, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Information Hiding, 13th International Conference
, pp. 71-84
-
-
Gül, G.1
Kurugollu, F.2
-
5
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
E. J. Delp, P. W. Wong, J. Dittmann, and N. D. Memon, editors, San Jose, CA, January 27-31
-
A. D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In E. J. Delp, P. W. Wong, J. Dittmann, and N. D. Memon, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1-5 17, San Jose, CA, January 27-31, 2008.
-
(2008)
Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 51-517
-
-
Ker, A.D.1
Böhme, R.2
-
6
-
-
80054777166
-
On dangers of overtraining steganography to incomplete cover model
-
J. Dittmann, S. Craver, and C. Heitzenrater, editors, Niagara Falls, NY, September 29-30
-
J. Kodovský, J. Fridrich, and V. Holub. On dangers of overtraining steganography to incomplete cover model. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 69-76, Niagara Falls, NY, September 29-30, 2011.
-
(2011)
Proceedings of the 13th ACM Multimedia & Security Workshop
, pp. 69-76
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
7
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432-444, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
8
-
-
84858252960
-
Going from small to large data sets in steganalysis
-
A. Alattar, N. D. Memon, and E. J. Delp, editors, San Francisco, CA, January 23-26
-
I. Lubenko and A. D. Ker. Going from small to large data sets in steganalysis. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, volume 8303, pages 0M 1-10, San Francisco, CA, January 23-26, 2012.
-
(2012)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV
, vol.8303
-
-
Lubenko, I.1
Ker, A.D.2
-
9
-
-
84858244890
-
Co-occurrence steganalysis in high dimension
-
A. Alattar, N. D. Memon, and E. J. Delp, editors, San Francisco, CA, January 23-26
-
T. Pevný. Co-occurrence steganalysis in high dimension. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, volume 8303, pages 0B 1-13, San Francisco, CA, January 23-26, 2012.
-
(2012)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV
, vol.8303
-
-
Pevný, T.1
-
10
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
June
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2):215-224, June 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
11
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
R. Böhme and R. Safavi-Naini, editors, volume 6387 of Lecture Notes in Computer Science, Calgary, Canada, June 28-30, Springer-Verlag, New York
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Conference, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
-
(2010)
Information Hiding, 12th International Conference
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
|