-
1
-
-
84880080712
-
Documents reveal Al Qaeda's plans for seizing cruise ships, carnage in europe
-
April accessed February 2012.
-
Documents reveal Al Qaeda's plans for seizing cruise ships, carnage in europe. CNN, April 2012. http://edition.cnn.com/2012/04/30/world/al-qaeda- documents-future/index.html, accessed February 2012.
-
(2012)
CNN
-
-
-
2
-
-
84880055218
-
-
accessed February 2012
-
Feature extractors for steganalysis. http://dde.binghamton.edu/download/ feature-extractors/, accessed February 2012.
-
Feature Extractors for Steganalysis
-
-
-
3
-
-
84880081197
-
Steganography
-
accessed February 2012
-
MIT Technology Review: Steganography. http://www.technologyreview.com/ search/site/steganography/, accessed February 2012.
-
MIT Technology Review
-
-
-
4
-
-
84880049713
-
Russian spies' use of steganography is just the beginning
-
July accessed February 2012
-
Russian spies' use of steganography is just the beginning. MIT Technology Review, July 2010. http://www.technologyreview.com/view/419833/russian-spies- use-of-steganography-is-just-the-beginning/, accessed February 2012.
-
(2010)
MIT Technology Review
-
-
-
5
-
-
80955155205
-
Revealed: Operation Shady RAT
-
accessed February 2012
-
D. Alperovitch. Revealed: Operation Shady RAT. McAfee White Paper, 2011. http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf, accessed February 2012.
-
(2011)
McAfee White Paper
-
-
Alperovitch, D.1
-
7
-
-
84955563192
-
Stretching the limits of steganography
-
Information Hiding, 1st International Workshop, Springer-Verlag
-
R. Anderson. Stretching the limits of steganography. In Information Hiding, 1st International Workshop, volume 1174 of LNCS, pages 39-48. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 39-48
-
-
Anderson, R.1
-
11
-
-
77952635989
-
A method for automatic identification of signatures of steganography software
-
G. Bell and Y.-K. Lee. A method for automatic identification of signatures of steganography software. IEEE Trans. Inf. Forensics Security, 5(2):354-358, 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 354-358
-
-
Bell, G.1
Lee, Y.-K.2
-
13
-
-
56749107134
-
Weighted stego-image steganalysis for JPEG covers
-
Information Hiding, 10th International Workshop, Springer-Verlag
-
R. Böhme. Weighted stego-image steganalysis for JPEG covers. In Information Hiding, 10th International Workshop, volume 5284 of LNCS, pages 178-194. Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.5284
, pp. 178-194
-
-
Böhme, R.1
-
15
-
-
33845623763
-
Digital video steganalysis exploiting statistical visibility in the temporal domain
-
DOI 10.1109/TIFS.2006.885020
-
U. Budhia, D. Kundur, and T. Zourntos. Digital video steganalysis exploiting statistical visibility in the temporal domain. IEEE Trans. Inf. Forensics Security, 1(4):502-516, 2006. (Pubitemid 44947734)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.4
, pp. 502-516
-
-
Budhia, U.1
Kundur, D.2
Zourntos, T.3
-
17
-
-
84957868624
-
An information-theoretic model for steganography
-
Information Hiding, 2nd International Workshop, Springer-Verlag
-
C. Cachin. An information-theoretic model for steganography. In Information Hiding, 2nd International Workshop, volume 1525 of LNCS, pages 306-318. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
18
-
-
84873683899
-
An asymptotically uniformly most powerful test for LSB matching detection
-
R. Cogranne and F. Retraint. An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans. Inf. Forensics Security, 8(3):464-476, 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 464-476
-
-
Cogranne, R.1
Retraint, F.2
-
19
-
-
80054797149
-
Statistical decision by using quantized observations
-
IEEE
-
R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, and P. Cornu. Statistical decision by using quantized observations. In International Symposium on Information Theory, pages 1135-1139. IEEE, 2011.
-
(2011)
International Symposium on Information Theory
, pp. 1135-1139
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
20
-
-
84880067576
-
A locally adapted model of natural images for almost optimal hidden data detection
-
to appear
-
R. Cogranne, C. Zitzmann, F. Retraint, I. Nikiforov, P. Cornu, and L. Fillatre. A locally adapted model of natural images for almost optimal hidden data detection. IEEE Trans. Image Process., 2013. (to appear).
-
(2013)
IEEE Trans. Image Process.
-
-
Cogranne, R.1
Zitzmann, C.2
Retraint, F.3
Nikiforov, I.4
Cornu, P.5
Fillatre, L.6
-
21
-
-
14844285173
-
Some notes on steganography
-
available from
-
R. Crandall. Some notes on steganography. Steganography Mailing List, 1998. available from http://os.inf.tu-dresden.de/∼westfeld/crandall.pdf.
-
(1998)
Steganography Mailing List
-
-
Crandall, R.1
-
22
-
-
84957887122
-
On public-key steganography in the presence of an active warden
-
S. Craver. On public-key steganography in the presence of an active warden. In Information Hiding, 2nd International Workshop, volume 1525, pages 355-368, 1998.
-
(1998)
Information Hiding, 2nd International Workshop
, vol.1525
, pp. 355-368
-
-
Craver, S.1
-
23
-
-
56749164813
-
A supraliminal channel in a videoconferencing application
-
Information Hiding, 10th International Workshop, Springer-Verlag
-
S. Craver, E. Li, J. Yu, and I. Atalki. A supraliminal channel in a videoconferencing application. In Information Hiding, 10th International Workshop, volume 5284 of LNCS, pages 283-293. Springer-Verlag, 2008.
-
(2008)
LNCS
, vol.5284
, pp. 283-293
-
-
Craver, S.1
Li, E.2
Yu, J.3
Atalki, I.4
-
24
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning. An intrusion-detection model. IEEE Trans. Softw. Eng., SE-13(2):222-232, 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
25
-
-
84957886834
-
Steganalysis and game equilibria
-
Information Hiding, 2nd International Workshop, Springer-Verlag
-
M. Ettinger. Steganalysis and game equilibria. In Information Hiding, 2nd International Workshop, volume 1525 of LNCS, pages 319-328. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1525
, pp. 319-328
-
-
Ettinger, M.1
-
26
-
-
70350445582
-
Fisher information determines capacity of ε-secure steganography
-
Information Hiding, 11th International Conference, Springer-Verlag
-
T. Filler and J. Fridrich. Fisher information determines capacity of ε-secure steganography. In Information Hiding, 11th International Conference, volume 5806 of LNCS, pages 31-47. Springer-Verlag, 2009.
-
(2009)
LNCS
, vol.5806
, pp. 31-47
-
-
Filler, T.1
Fridrich, J.2
-
28
-
-
79954457569
-
Design of adaptive steganographic schemes for digital images
-
Media Watermarking, Security and Forensics XIII
-
T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. InMedia Watermarking, Security and Forensics XIII, volume 7880 of Proc. SPIE, pages OF 1-14, 2011.
-
(2011)
Proc. SPIE
, vol.7880
-
-
Filler, T.1
Fridrich, J.2
-
29
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Security, 6(3):920-935, 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 920-935
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
30
-
-
70350562893
-
The Square Root Law of steganographic capacity for Markov covers
-
Security and Forensics of Multimedia XI
-
T. Filler, A. D. Ker, and J. Fridrich. The Square Root Law of steganographic capacity for Markov covers. In Security and Forensics of Multimedia XI, volume 7254 of Proc. SPIE, pages 08 1-11, 2009.
-
(2009)
Proc. SPIE
, vol.7254
, pp. 081-111
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
31
-
-
84955601215
-
Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best
-
Information Hiding, 1st International Workshop, Springer-Verlag
-
E. Franz, A. Jerichow, S. Möller, A. Pfitzmann, and I. Stierand. Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best. In Information Hiding, 1st International Workshop, volume 1174 of LNCS, pages 7-21. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1174
, pp. 7-21
-
-
Franz, E.1
Jerichow, A.2
Möller, S.3
Pfitzmann, A.4
Stierand, I.5
-
32
-
-
84872311781
-
Effect of cover quantization on steganographic fisher information
-
J. Fridrich. Effect of cover quantization on steganographic fisher information. IEEE Trans. Inf. Forensics Security, 8(2):361-372, 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.2
, pp. 361-372
-
-
Fridrich, J.1
-
33
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
Security, Steganography, and Watermarking of Multimedia Contents VI
-
J. Fridrich and M. Goljan. On estimation of secret message length in LSB steganography in spatial domain. In Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306 of Proc. SPIE, pages 23-34, 2004.
-
(2004)
Proc. SPIE
, vol.5306
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
34
-
-
8844265283
-
Searching for the stego key
-
J. Fridrich, M. Goljan, and D. Soukal. Searching for the stego key. In Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 70-82, 2004.
-
(2004)
Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 70-82
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
36
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, 2007.
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
37
-
-
84957806554
-
Covert Messaging through TCP Timestamps
-
Privacy Enhancing Technologies
-
J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts. Covert messaging through TCP timestamps. In Privacy Enhancing Technologies, volume 2482 of LNCS, pages 194-208. Springer-Verlag, 2002. (Pubitemid 36309889)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2482
, pp. 194-208
-
-
Giffin, J.1
Greenstadt, R.2
Litwack, P.3
Tibbetts, R.4
-
38
-
-
84874072264
-
Forensic analysis of ordered data structures on the example of JPEG files
-
IEEE
-
T. Gloe. Forensic analysis of ordered data structures on the example of JPEG files. In Information Forensics and Security, 4th International Workshop, pages 139-144. IEEE, 2012.
-
(2012)
Information Forensics and Security, 4th International Workshop
, pp. 139-144
-
-
Gloe, T.1
-
39
-
-
84874023671
-
An efficient JPEG steganographic scheme using uniform embedding
-
IEEE
-
L. Guo, J. Ni, and Y.-Q. Shi. An efficient JPEG steganographic scheme using uniform embedding. In Information Forensics and Security, 4th International Workshop, pages 169-174. IEEE, 2012.
-
(2012)
Information Forensics and Security, 4th International Workshop
, pp. 169-174
-
-
Guo, L.1
Ni, J.2
Shi, Y.-Q.3
-
41
-
-
84937438364
-
Provably secure steganography
-
Advances in Cryptology, CRYPTO '02, Springer-Verlag
-
N. J. Hopper, J. Langford, and L. von Ahn. Provably secure steganography. In Advances in Cryptology, CRYPTO '02, volume 2442 of LNCS, pages 77-92. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 77-92
-
-
Hopper, N.J.1
Langford, J.2
Von Ahn, L.3
-
42
-
-
84873190974
-
Forensics aided steganalysis of heterogeneous bitmap images with different compression history
-
X. Hou, T. Zhang, G. Xiong, and B. Wan. Forensics aided steganalysis of heterogeneous bitmap images with different compression history. In Multimedia Information Networking and Security, 4th International Conference, pages 874-877, 2012.
-
(2012)
Multimedia Information Networking and Security, 4th International Conference
, pp. 874-877
-
-
Hou, X.1
Zhang, T.2
Xiong, G.3
Wan, B.4
-
43
-
-
84863942032
-
New channel selection rule for JPEG steganography
-
F. Huang, J. Huang, and Y.-Q. Shi. New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Security, 7(4):1181-1191, 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1181-1191
-
-
Huang, F.1
Huang, J.2
Shi, Y.-Q.3
-
44
-
-
77249127498
-
Provably secure steganography and the complexity of sampling
-
Algorithms and Computation, Springer-Verlag
-
C. Hundt, M. Liskiewicz, and U. Wölfel. Provably secure steganography and the complexity of sampling. In Algorithms and Computation, volume 4317 of LNCS, pages 754-763. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4317
, pp. 754-763
-
-
Hundt, C.1
Liskiewicz, M.2
Wölfel, U.3
-
45
-
-
84869417796
-
Where to hide the bits?
-
J. Grossklags and J. Walrand, editors, Decision and Game Theory for Security, Springer-Verlag
-
B. Johnson, P. Schöttle, and R. Böhme. Where to hide the bits? In J. Grossklags and J. Walrand, editors, Decision and Game Theory for Security, volume 7638 of LNCS, pages 1-17. Springer-Verlag, 2012.
-
(2012)
LNCS
, vol.7638
, pp. 1-17
-
-
Johnson, B.1
Schöttle, P.2
Böhme, R.3
-
48
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
Information Hiding, 8th International Workshop, Springer-Verlag
-
A. D. Ker. Batch steganography and pooled steganalysis. In Information Hiding, 8th International Workshop, volume 4437 of LNCS, pages 265-281. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4437
, pp. 265-281
-
-
Ker, A.D.1
-
49
-
-
34548293733
-
Batch steganography and the threshold game
-
Security, Steganography, and Watermarking of of Multimedia Contents IX
-
A. D. Ker. Batch steganography and the threshold game. In Security, Steganography, and Watermarking of of Multimedia Contents IX, volume 6505 of Proc. SPIE, pages 04 1-13, 2007.
-
(2007)
Proc. SPIE
, vol.6505
, pp. 041-113
-
-
Ker, A.D.1
-
50
-
-
34547881527
-
A capacity result for batch steganography
-
A. D. Ker. A capacity result for batch steganography. IEEE Signal Process. Lett., 14(8):525-528, 2007.
-
(2007)
IEEE Signal Process. Lett.
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
52
-
-
42949178523
-
Steganographic strategies for a square distortion function
-
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
-
A. D. Ker. Steganographic strategies for a square distortion function. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 04 1-13, 2008.
-
(2008)
Proc. SPIE
, vol.6819
, pp. 041-113
-
-
Ker, A.D.1
-
53
-
-
70350539243
-
Estimating the information theoretic optimal stego noise
-
Digital Watermarking, 8th International Workshop, Springer-Verlag
-
A. D. Ker. Estimating the information theoretic optimal stego noise. In Digital Watermarking, 8th International Workshop, volume 5703 of LNCS, pages 184-198. Springer-Verlag, 2009.
-
(2009)
LNCS
, vol.5703
, pp. 184-198
-
-
Ker, A.D.1
-
54
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
-
A. D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 05 1-17, 2008.
-
(2008)
Proc. SPIE
, vol.6819
, pp. 051-117
-
-
Ker, A.D.1
Böhme, R.2
-
56
-
-
84858188731
-
Identifying a steganographer in realistic and heterogeneous data sets
-
Media Watermarking, Security, and Forensics XIV
-
A. D. Ker and T. Pevný. Identifying a steganographer in realistic and heterogeneous data sets. In Media Watermarking, Security, and Forensics XIV, volume 8303 of Proc. SPIE, pages 0N 1-13, 2012.
-
(2012)
Proc. SPIE
, vol.8303
-
-
Ker, A.D.1
Pevný, T.2
-
57
-
-
56749160546
-
The Square Root Law of steganographic capacity
-
A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich. The Square Root Law of steganographic capacity. In Proceedings of the 10th ACM Multimedia & Security Workshop, pages 107-116, 2008.
-
(2008)
Proceedings of the 10th ACM Multimedia & Security Workshop
, pp. 107-116
-
-
Ker, A.D.1
Pevný, T.2
Kodovský, J.3
Fridrich, J.4
-
58
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Information Hiding, 8th International Workshop, Springer-Verlag
-
Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In Information Hiding, 8th International Workshop, volume 4437 of LNCS, pages 314-327. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
59
-
-
84878430667
-
Quantitative steganalysis using rich models
-
Media Watermarking, Security, and Forensics 2013, to appear
-
Kodovský and J. Fridrich. Quantitative steganalysis using rich models. In Media Watermarking, Security, and Forensics 2013, Proc. SPIE, 2013. (to appear).
-
Proc. SPIE, 2013
-
-
Kodovský1
Fridrich, J.2
-
62
-
-
79954474492
-
Steganalysis in high dimensions: Fusing classifiers built on random subspaces
-
J. Kodovský and J. Fridrich. Steganalysis in high dimensions: Fusing classifiers built on random subspaces. In Media Watermarking, Security and Forensics XIII, volume 7880, pages OL 1-13, 2011.
-
(2011)
Media Watermarking, Security and Forensics XIII
, vol.7880
-
-
Kodovský, J.1
Fridrich, J.2
-
63
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
Media Watermarking, Security, and Forensics 2012
-
J. Kodovský and J. Fridrich. Steganalysis of JPEG images using rich models. In Media Watermarking, Security, and Forensics 2012, volume 8303 of Proc. SPIE, pages 0A 1-13, 2012.
-
(2012)
Proc. SPIE
, vol.8303
-
-
Kodovský, J.1
Fridrich, J.2
-
66
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Security, 7(2):432-444, 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
67
-
-
20444495394
-
How to achieve blocking resistance for existing systems enabling anonymous web surfing
-
ACM
-
S. Köpsell and U. Hillig. How to achieve blocking resistance for existing systems enabling anonymous web surfing. In Privacy in the Electronic Society, ACM Workshop, pages 47-58. ACM, 2004.
-
(2004)
Privacy in the Electronic Society, ACM Workshop
, pp. 47-58
-
-
Köpsell, S.1
Hillig, U.2
-
68
-
-
0032658498
-
The CFAR adaptive subspace detector is a scale-invariant GLRT
-
S. Kraut and L. L. Scharf. The CFAR adaptive subspace detector is a scale-invariant GLRT. IEEE Trans. Sig. Proc., 47(9):2538-2541, 1999.
-
(1999)
IEEE Trans. Sig. Proc.
, vol.47
, Issue.9
, pp. 2538-2541
-
-
Kraut, S.1
Scharf, L.L.2
-
72
-
-
84858252960
-
Going from small to large data sets in steganalysis
-
Media Watermarking, Security, and Forensics 2012
-
I. Lubenko and A. D. Ker. Going from small to large data sets in steganalysis. In Media Watermarking, Security, and Forensics 2012, volume 8303 of Proc. SPIE, pages OM 1-10, 2012.
-
(2012)
Proc. SPIE
, vol.8303
-
-
Lubenko, I.1
Ker, A.D.2
-
73
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
S. Lyu and H. Farid. Steganalysis using higher-order image statistics. IEEE Trans. Inf. Forensics Security, 1(1):111-119, 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
74
-
-
33746584368
-
Embedding covert channels in TCP/IP
-
Information Hiding, 7th International Workshop, Springer-Verlag
-
S. J. Murdoch and S. Lewis. Embedding covert channels in TCP/IP. In Information Hiding, 7th International Workshop, volume 3727 of LNCS, pages 247-261. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3727
, pp. 247-261
-
-
Murdoch, S.J.1
Lewis, S.2
-
75
-
-
42949095246
-
Steganalysis-aware steganography: Statistical indistinguishability despite high distortion
-
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
-
A. Orsdemir, O. Altun, G. Sharma, and M. Bocko. Steganalysis-aware steganography: Statistical indistinguishability despite high distortion. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 15 1-19, 2008.
-
(2008)
Proc. SPIE
, vol.6819
, pp. 151-219
-
-
Orsdemir, A.1
Altun, O.2
Sharma, G.3
Bocko, M.4
-
77
-
-
79954485517
-
Detecting messages of unknown length
-
Media Watermarking, Security and Forensics XIII
-
T. Pevný. Detecting messages of unknown length. In Media Watermarking, Security and Forensics XIII, volume 7880 of Proc. SPIE, pages OT 1-12, 2011.
-
(2011)
Proc. SPIE
, vol.7880
-
-
Pevný, T.1
-
78
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Security, 5(2):215-224, 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
79
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Information Hiding, 12th International Conference, Springer-Verlag
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, 12th International Conference, volume 6387 of LNCS, pages 161-177. Springer-Verlag, 2010.
-
(2010)
LNCS
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
80
-
-
44049087452
-
Detection of double-compression in JPEG images for applications in steganography
-
DOI 10.1109/TIFS.2008.922456, 4512175
-
T. Pevny and J. Fridrich. Detection of double-compression in JPEG images for applications in steganography. IEEE Trans. Inf. Forensics Security, 3(2):247-258, 2008. (Pubitemid 351709458)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 247-258
-
-
Pevny, T.1
Fridrich, J.2
-
81
-
-
56749170425
-
Multiclass detector of current steganographic methods for JPEG format
-
T. Pevný and J. Fridrich. Multiclass detector of current steganographic methods for JPEG format. IEEE Trans. Inf. Forensics Security, 3(4):635-650, 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 635-650
-
-
Pevný, T.1
Fridrich, J.2
-
83
-
-
84858191862
-
From blind to quantitative steganalysis
-
T. Pevny, J. Fridrich, and A. D. Ker. From blind to quantitative steganalysis. IEEE Trans. Inf. Forensics Security, 7(2):445-454, 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 445-454
-
-
Pevny, T.1
Fridrich, J.2
Ker, A.D.3
-
85
-
-
33745868393
-
Simple stateless steganography
-
L. Reyzin and S. Russell. Simple stateless steganography. IACR Eprint archive, 2003. http://eprint.iacr.org/2003/093.
-
(2003)
IACR Eprint Archive
-
-
Reyzin, L.1
Russell, S.2
-
89
-
-
84874399529
-
A game-theoretic approach to content-adaptive steganography
-
Information Hiding, 14th International Conference, S pringer-Verlag
-
P. Schöttle and R. Böhme. A game-theoretic approach to content-adaptive steganography. In Information Hiding, 14th International Conference, volume 7692 of LNCS, pages 125-141. Springer-Verlag, 2012.
-
(2012)
LNCS
, vol.7692
, pp. 125-141
-
-
Schöttle, P.1
Böhme, R.2
-
90
-
-
27744553952
-
A Neyman-Pearson approach to statistical learning
-
DOI 10.1109/TIT.2005.856955
-
C. Scott and R. Nowak. A Neyman-Pearson approach to statistical learning. IEEE Trans. Inf. Theory, 51(8):3806-3819, 2005. (Pubitemid 41622582)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.11
, pp. 3806-3819
-
-
Scott, C.1
Nowak, R.2
-
91
-
-
0003214704
-
Coding theorems for a discrete source with a fidelity criterion
-
C. E. Shannon. Coding theorems for a discrete source with a fidelity criterion. IRE Nat. Conv. Rec., 4:142-163, 1959.
-
(1959)
IRE Nat. Conv. Rec.
, vol.4
, pp. 142-163
-
-
Shannon, C.E.1
-
92
-
-
0001217738
-
The prisoner's problem and the subliminal channel
-
Plenum Press
-
G. J. Simmons. The prisoner's problem and the subliminal channel. In Advances in Cryptology, CRYPTO '83, pages 51-67. Plenum Press, 1983.
-
(1983)
Advances in Cryptology, CRYPTO '83
, pp. 51-67
-
-
Simmons, G.J.1
-
94
-
-
80052904726
-
Learning non-local range Markov random field for image restoration
-
IEEE
-
J. Sun and M. F. Tappen. Learning non-local range Markov random field for image restoration. In Computer Vision and Pattern Recognition, pages 2745-2752. IEEE, 2011.
-
(2011)
Computer Vision and Pattern Recognition
, pp. 2745-2752
-
-
Sun, J.1
Tappen, M.F.2
-
95
-
-
84880064175
-
Statistical model of natural images
-
IEEE
-
T. H. Thai, F. Retraint, and R. Cogranne. Statistical model of natural images. In Proceedings IEEE, International Conference on Image Processing, ICIP 2012, pages 2525-2528. IEEE, 2012.
-
(2012)
Proceedings IEEE, International Conference on Image Processing, ICIP 2012
, pp. 2525-2528
-
-
Thai, T.H.1
Retraint, F.2
Cogranne, R.3
-
97
-
-
84947911018
-
A stochastic approach to content adaptive digital image watermarking
-
Information Hiding, 3rd International Workshop, Springer-Verlag
-
S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun. A stochastic approach to content adaptive digital image watermarking. In Information Hiding, 3rd International Workshop, volume 1768 of LNCS, pages 211-236. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1768
, pp. 211-236
-
-
Voloshynovskiy, S.1
Herrigel, A.2
Baumgaertner, N.3
Pun, T.4
-
99
-
-
0000090155
-
Sequential tests of statistical hypotheses
-
A. Wald. Sequential tests of statistical hypotheses. Ann. Math. Stat., 16(2):117-186, 1945.
-
(1945)
Ann. Math. Stat.
, vol.16
, Issue.2
, pp. 117-186
-
-
Wald, A.1
-
100
-
-
84867591559
-
An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents
-
IEEE
-
C. Wang and J. Ni. An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficents. In International Conference on Acoustics, Speech, and Signal Processing, pages 1785-1788. IEEE, 2012.
-
(2012)
International Conference on Acoustics, Speech, and Signal Processing
, pp. 1785-1788
-
-
Wang, C.1
Ni, J.2
-
101
-
-
45249103920
-
Perfectly secure steganography: Capacity, error exponents, and code constructions
-
Y. Wang and P. Moulin. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Trans. Inf. Theory, 55(6):2706-2722, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2706-2722
-
-
Wang, Y.1
Moulin, P.2
-
104
-
-
71849083789
-
A study of on/off timing channel based on packet delay distribution
-
L. Yao, X. Zi, L. Pan, and J. Li. A study of on/off timing channel based on packet delay distribution. Computers & Security, 28(8):785-794, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 785-794
-
-
Yao, L.1
Zi, X.2
Pan, L.3
Li, J.4
-
105
-
-
84865843918
-
Twenty years of mixture of experts
-
S. Yuksel, J. Wilson, and P. Gader. Twenty years of mixture of experts. IEEE Trans. Neural Netw. Learn. Syst., 23(8):1177-1193, 2012.
-
(2012)
IEEE Trans. Neural Netw. Learn. Syst.
, vol.23
, Issue.8
, pp. 1177-1193
-
-
Yuksel, S.1
Wilson, J.2
Gader, P.3
-
106
-
-
84867593807
-
Hidden information detection based on quantized Laplacian distribution
-
IEEE
-
C. Zitzmann, R. Cogranne, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu. Hidden information detection based on quantized Laplacian distribution. In International Conference on Acoustics, Speech, and Signal Processing, pages 1793-1796. IEEE, 2012.
-
(2012)
International Conference on Acoustics, Speech, and Signal Processing
, pp. 1793-1796
-
-
Zitzmann, C.1
Cogranne, R.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
107
-
-
80053026542
-
Statistical decision methods in hidden information detection
-
Information Hiding, 13th International Conference, Springer-Verlag
-
C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu. Statistical decision methods in hidden information detection. In Information Hiding, 13th International Conference, LNCS, pages 163-177. Springer-Verlag, 2011.
-
(2011)
LNCS
, pp. 163-177
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
|