-
1
-
-
84961389381
-
Local Approximation Techniques in Signal and Image Processing, vol. PM157
-
SPIE Press Monograph
-
[1] Astola, J., Egiazarian, K., Katkovnik, V., Local Approximation Techniques in Signal and Image Processing, vol. PM157. 2006, SPIE Press, Monograph.
-
(2006)
-
-
Astola, J.1
Egiazarian, K.2
Katkovnik, V.3
-
2
-
-
80053005547
-
Break our steganographic system—The ins and outs of organizing boss
-
Springer Berlin, Heidelberg
-
[2] Bas, P., Filler, T., Pevný, T., Break our steganographic system—The ins and outs of organizing boss. Information Hiding Lecture Notes in Comput. Sci., vol. 6958, 2011, Springer, Berlin, Heidelberg, 59–70.
-
(2011)
Information Hiding, Lecture Notes in Comput. Sci.
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
3
-
-
0004302610
-
Probability and Measure
-
3rd edition Wiley–Interscience
-
[3] Billingsley, P., Probability and Measure. 3rd edition, 1995, Wiley–Interscience.
-
(1995)
-
-
Billingsley, P.1
-
4
-
-
79954512366
-
Advanced Statistical Steganalysis
-
1st edition Springer Publishing Company
-
[4] Böhme, R., Advanced Statistical Steganalysis. 1st edition, 2010, Springer Publishing Company.
-
(2010)
-
-
Böhme, R.1
-
5
-
-
58049131290
-
A comparative study of ±1 steganalyzers
-
[5] Cancelli, G., Doërr, G., Barni, M., Cox, I.J., A comparative study of ±1 steganalyzers. IEEE 10th Workshop on Multimedia Signal Processing, 2008, 791–796.
-
(2008)
IEEE 10th Workshop on Multimedia Signal Processing
, pp. 791-796
-
-
Cancelli, G.1
Doërr, G.2
Barni, M.3
Cox, I.J.4
-
6
-
-
84874590883
-
Application of hypothesis testing theory for optimal detection of LSB matching data hiding
-
[6] Cogranne, R., Retraint, F., Application of hypothesis testing theory for optimal detection of LSB matching data hiding. Signal Process., Elsevier 93 (2013), 1724–1737.
-
(2013)
Signal Process., Elsevier
, vol.93
, pp. 1724-1737
-
-
Cogranne, R.1
Retraint, F.2
-
7
-
-
84873683899
-
An asymptotically uniformly most powerful test for LSB matching detection
-
[7] Cogranne, R., Retraint, F., An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans. Inf. Forensics Secur. 8 (2013), 464–476.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, pp. 464-476
-
-
Cogranne, R.1
Retraint, F.2
-
8
-
-
80052227499
-
Reliable detection of hidden information based on a non-linear local model
-
[8] Cogranne, R., Zitzmann, C., Fillatre, L., Nikiforov, I., Retraint, F., Cornu, P., Reliable detection of hidden information based on a non-linear local model. IEEE International Workshop on Statistical Signal Processing Workshop (SSP), 2011, 493–496.
-
(2011)
IEEE International Workshop on Statistical Signal Processing Workshop (SSP)
, pp. 493-496
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
9
-
-
80052987721
-
A cover image model for reliable steganalysis
-
Springer Berlin, Heidelberg
-
[9] Cogranne, R., Zitzmann, C., Fillatre, L., Retraint, F., Nikiforov, I., Cornu, P., A cover image model for reliable steganalysis. Information Hiding Lecture Notes in Comput. Sci., vol. 6958, 2011, Springer, Berlin, Heidelberg, 178–192.
-
(2011)
Information Hiding, Lecture Notes in Comput. Sci.
, vol.6958
, pp. 178-192
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
10
-
-
80054797149
-
Statistical decision by using quantized observations
-
[10] Cogranne, R., Zitzmann, C., Fillatre, L., Retraint, F., Nikiforov, I., Cornu, P., Statistical decision by using quantized observations. IEEE International Symposium on Information Theory Proceedings, ISIT, 2011, 1210–1214.
-
(2011)
IEEE International Symposium on Information Theory Proceedings, ISIT
, pp. 1210-1214
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
11
-
-
84869849870
-
Statistical detection of information hiding based on adjacent pixels difference
-
[11] Cogranne, R., Zitzmann, C., Retraint, F., Nikiforov, I., Cornu, P., Fillatre, L., Statistical detection of information hiding based on adjacent pixels difference. Proceedings of the 20th European Signal Processing Conference, EUSIPCO, 2012, 1737–1741.
-
(2012)
Proceedings of the 20th European Signal Processing Conference, EUSIPCO
, pp. 1737-1741
-
-
Cogranne, R.1
Zitzmann, C.2
Retraint, F.3
Nikiforov, I.4
Cornu, P.5
Fillatre, L.6
-
12
-
-
53349159971
-
Digital Watermarking and Steganography
-
2nd edition Morgan Kaufmann
-
[12] Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T., Digital Watermarking and Steganography. 2nd edition, 2007, Morgan Kaufmann.
-
(2007)
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
13
-
-
4744365298
-
Detection of hiding in the least significant bit
-
[13] Dabeer, O., Sullivan, K., Madhow, U., Chandrasekaran, S., Manjunath, B., Detection of hiding in the least significant bit. IEEE Trans. Signal Process. 52 (2004), 3046–3058.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
14
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
[14] Dumitrescu, S., Wu, X., Wang, Z., Detection of LSB steganography via sample pair analysis. IEEE Trans. Signal Process. 51 (2003), 1995–2007.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
15
-
-
33646023117
-
An introduction to ROC analysis
-
[15] Fawcett, T., An introduction to ROC analysis. Pattern Recogn. Lett., Elsevier 27 (2006), 861–874.
-
(2006)
Pattern Recogn. Lett., Elsevier
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
-
16
-
-
84855933278
-
Adaptive steganalysis of least significant bit replacement in grayscale natural images
-
[16] Fillatre, L., Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans. Signal Process. 60 (2012), 556–569.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, pp. 556-569
-
-
Fillatre, L.1
-
17
-
-
54949104957
-
ε-optimal non-Bayesian anomaly detection for parametric tomography
-
[17] Fillatre, L., Nikiforov, I., Retraint, F., ε-optimal non-Bayesian anomaly detection for parametric tomography. IEEE Trans. Image Process. 17 (2008), 1985–1999.
-
(2008)
IEEE Trans. Image Process.
, vol.17
, pp. 1985-1999
-
-
Fillatre, L.1
Nikiforov, I.2
Retraint, F.3
-
18
-
-
70350562893
-
The square root law of steganographic capacity for Markov covers
-
[18] Filler, T., Ker, A.D., Fridrich, J., The square root law of steganographic capacity for Markov covers. Media Forensics and Security Proc. SPIE, vol. 7254, 2009, 725408–725411.
-
(2009)
Media Forensics and Security, Proc. SPIE
, vol.7254
, pp. 725408-725411
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
19
-
-
52649143252
-
Practical Poissonian–Gaussian noise modeling and fitting for single-image raw-data
-
[19] Foi, A., Trimeche, M., Katkovnik, V., Egiazarian, K., Practical Poissonian–Gaussian noise modeling and fitting for single-image raw-data. IEEE Trans. Image Process. 17 (2008), 1737–1754.
-
(2008)
IEEE Trans. Image Process.
, vol.17
, pp. 1737-1754
-
-
Foi, A.1
Trimeche, M.2
Katkovnik, V.3
Egiazarian, K.4
-
20
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
Proc. SPIE 5306
-
[20] Fridrich, J., Goljan, M., On estimation of secret message length in LSB steganography in spatial domain. Security, Steganography, and Watermarking of Multimedia Contents VI, 2004, Proc. SPIE, 5306, 23–34.
-
(2004)
Security, Steganography, and Watermarking of Multimedia Contents VI
, pp. 23-34
-
-
Fridrich, J.1
Goljan, M.2
-
21
-
-
0035472155
-
Detecting LSB steganography in color, and gray-scale images
-
[21] Fridrich, J., Goljan, M., Du, R., Detecting LSB steganography in color, and gray-scale images. IEEE Multimed. 8 (2001), 22–28.
-
(2001)
IEEE Multimed.
, vol.8
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
22
-
-
84874437807
-
Steganalysis of LSB replacement using parity-aware features
-
Springer Berlin, Heidelberg
-
[22] Fridrich, J., Kodovský, J., Steganalysis of LSB replacement using parity-aware features. Information Hiding Lecture Notes in Comput. Sci., vol. 7692, 2013, Springer, Berlin, Heidelberg, 31–45.
-
(2013)
Information Hiding, Lecture Notes in Comput. Sci.
, vol.7692
, pp. 31-45
-
-
Fridrich, J.1
Kodovský, J.2
-
23
-
-
84988262106
-
Digital Image Processing
-
3rd edition Prentice Hall
-
[23] Gonzalez, R.C., Woods, R.E., Digital Image Processing. 3rd edition, 2008, Prentice Hall.
-
(2008)
-
-
Gonzalez, R.C.1
Woods, R.E.2
-
25
-
-
34548240827
-
Low bit-rate image coding using adaptive geometric piecewise polynomial approximation
-
[25] Kazinnik, R., Dekel, S., Dyn, N., Low bit-rate image coding using adaptive geometric piecewise polynomial approximation. IEEE Trans. Image Process. 16 (2007), 2225–2233.
-
(2007)
IEEE Trans. Image Process.
, vol.16
, pp. 2225-2233
-
-
Kazinnik, R.1
Dekel, S.2
Dyn, N.3
-
26
-
-
33746613626
-
A general framework for structural steganalysis of LSB replacement
-
Springer Berlin, Heidelberg
-
[26] Ker, A.D., A general framework for structural steganalysis of LSB replacement. Information Hiding Lecture Notes in Comput. Sci., vol. 3727, 2005, Springer, Berlin, Heidelberg, 296–311.
-
(2005)
Information Hiding, Lecture Notes in Comput. Sci.
, vol.3727
, pp. 296-311
-
-
Ker, A.D.1
-
27
-
-
33645652933
-
Fourth-order structural steganalysis and analysis of cover assumptions
-
[27] Ker, A.D., Fourth-order structural steganalysis and analysis of cover assumptions. Security, Steganography, and Watermarking of Multimedia Contents VIII Proc. SPIE, vol. 6072, 2006, 607203–607214.
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VIII, Proc. SPIE
, vol.6072
, pp. 607203-607214
-
-
Ker, A.D.1
-
28
-
-
56749175498
-
Locating steganographic payload via ws residuals
-
ACM New York, NY, USA
-
[28] Ker, A.D., Locating steganographic payload via ws residuals. Proc of the 10th Workshop on Multimedia and Security, MM&Sec ʼ08, 2008, ACM, New York, NY, USA, 27–32.
-
(2008)
Proc of the 10th Workshop on Multimedia and Security, MM&Sec ʼ08
, pp. 27-32
-
-
Ker, A.D.1
-
29
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
[29] Ker, A.D., Böhme, R., Revisiting weighted stego-image steganalysis. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X Proc. SPIE, vol. 6819, 2008, 681905–681917.
-
(2008)
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Proc. SPIE
, vol.6819
, pp. 681905-681917
-
-
Ker, A.D.1
Böhme, R.2
-
30
-
-
15044364586
-
Locally linear discriminant analysis for multimodally distributed classes for face recognition with a single model image
-
[30] Kim, T.K., Kittler, J., Locally linear discriminant analysis for multimodally distributed classes for face recognition with a single model image. IEEE Trans. Pattern Anal. Mach. Intell. 27 (2005), 318–327.
-
(2005)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.27
, pp. 318-327
-
-
Kim, T.K.1
Kittler, J.2
-
31
-
-
0018998148
-
Digital image enhancement and noise filtering by use of local statistics
-
[31] Lee, J.S., Digital image enhancement and noise filtering by use of local statistics. IEEE Trans. Pattern Anal. Mach. Intell. 2 (1980), 165–168.
-
(1980)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.2
, pp. 165-168
-
-
Lee, J.S.1
-
32
-
-
49949111194
-
Generalised category attack—Improving histogram-based attack on JPEG LSB embedding
-
Springer Berlin, Heidelberg
-
[32] Lee, K., Westfeld, A., Lee, S., Generalised category attack—Improving histogram-based attack on JPEG LSB embedding. Information Hiding Lecture Notes in Comput. Sci., vol. 4567, 2007, Springer, Berlin, Heidelberg, 378–391.
-
(2007)
Information Hiding, Lecture Notes in Comput. Sci.
, vol.4567
, pp. 378-391
-
-
Lee, K.1
Westfeld, A.2
Lee, S.3
-
33
-
-
84964991239
-
Testing Statistical Hypotheses
-
3rd edition Springer
-
[33] Lehmann, E., Romano, J., Testing Statistical Hypotheses. 3rd edition, 2005, Springer.
-
(2005)
-
-
Lehmann, E.1
Romano, J.2
-
34
-
-
35048859775
-
An improved sample pairs method for detection of LSB embedding
-
Springer Berlin, Heidelberg
-
[34] Lu, P., Luo, X., Tang, Q., Shen, L., An improved sample pairs method for detection of LSB embedding. Information Hiding Lecture Notes in Comput. Sci., vol. 3200, 2005, Springer, Berlin, Heidelberg, 116–127.
-
(2005)
Information Hiding, Lecture Notes in Comput. Sci.
, vol.3200
, pp. 116-127
-
-
Lu, P.1
Luo, X.2
Tang, Q.3
Shen, L.4
-
35
-
-
0003456805
-
A Wavelet Tour of Signal Processing
-
3rd edition Academic Press
-
[35] Mallat, S., A Wavelet Tour of Signal Processing. 3rd edition, 2008, Academic Press.
-
(2008)
-
-
Mallat, S.1
-
36
-
-
33847156891
-
Steganography and error-correcting codes
-
[36] Munuera, C., Steganography and error-correcting codes. Signal Process., Elsevier 87 (2007), 1528–1533.
-
(2007)
Signal Process., Elsevier
, vol.87
, pp. 1528-1533
-
-
Munuera, C.1
-
37
-
-
77955421242
-
Classification of steganalysis techniques: A study
-
[37] Nissar, A., Mir, A., Classification of steganalysis techniques: A study. Digit. Signal Proces., Elsevier 20 (2010), 1758–1770.
-
(2010)
Digit. Signal Proces., Elsevier
, vol.20
, pp. 1758-1770
-
-
Nissar, A.1
Mir, A.2
-
38
-
-
33646167860
-
Towards multi-class blind steganalyzer for JPEG images
-
Springer Berlin, Heidelberg
-
[38] Pevný, T., Fridrich, J., Towards multi-class blind steganalyzer for JPEG images. Digital Watermarking Lecture Notes in Comput. Sci., vol. 3710, 2005, Springer, Berlin, Heidelberg, 39–53.
-
(2005)
Digital Watermarking, Lecture Notes in Comput. Sci.
, vol.3710
, pp. 39-53
-
-
Pevný, T.1
Fridrich, J.2
-
39
-
-
85032778679
-
Color image processing pipeline
-
[39] Ramanath, R., Snyder, W., Yoo, Y., Drew, M., Color image processing pipeline. IEEE Signal Process. Mag. 22 (2005), 34–43.
-
(2005)
IEEE Signal Process. Mag.
, vol.22
, pp. 34-43
-
-
Ramanath, R.1
Snyder, W.2
Yoo, Y.3
Drew, M.4
-
41
-
-
27744553952
-
A Neyman–Pearson approach to statistical learning
-
[41] Scott, C., Nowak, R., A Neyman–Pearson approach to statistical learning. IEEE Trans. Inform. Theory 51 (2005), 3806–3819.
-
(2005)
IEEE Trans. Inform. Theory
, vol.51
, pp. 3806-3819
-
-
Scott, C.1
Nowak, R.2
-
42
-
-
14844361142
-
Rate-distortion optimized tree-structured compression algorithms for piecewise polynomial images
-
[42] Shukla, R., Dragotti, P., Do, M., Vetterli, M., Rate-distortion optimized tree-structured compression algorithms for piecewise polynomial images. IEEE Trans. Image Process. 14 (2005), 343–359.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, pp. 343-359
-
-
Shukla, R.1
Dragotti, P.2
Do, M.3
Vetterli, M.4
-
43
-
-
0001217738
-
The prisonersʼ problem and the subliminal channel
-
Springer, US
-
[43] Simmons, G., The prisonersʼ problem and the subliminal channel. Advances in Cryptology, 1984, Springer, US, 51–67.
-
(1984)
Advances in Cryptology
, pp. 51-67
-
-
Simmons, G.1
-
44
-
-
0017542211
-
A necessary and sufficient condition for quantization errors to be uniform and white
-
[44] Sripad, A., Snyder, D., A necessary and sufficient condition for quantization errors to be uniform and white. IEEE Trans. Signal Process. 25 (1977), 442–448.
-
(1977)
IEEE Trans. Signal Process.
, vol.25
, pp. 442-448
-
-
Sripad, A.1
Snyder, D.2
-
45
-
-
84999896402
-
-
Steganalysis of LSB replacement in clipped images based on the heteroscedastic noise model, Signal Process., in press.
-
[45] T. Thai, F. Retraint, R. Cogranne, Steganalysis of LSB replacement in clipped images based on the heteroscedastic noise model, Signal Process., in press.
-
-
-
Thai, T.1
Retraint, F.2
Cogranne, R.3
-
46
-
-
84880064175
-
Statistical model of natural images
-
[46] Thai, T., Retraint, F., Cogranne, R., Statistical model of natural images. 19th IEEE International Conference on Image Processing, ICIP, 2012, 2525–2528.
-
(2012)
19th IEEE International Conference on Image Processing, ICIP
, pp. 2525-2528
-
-
Thai, T.1
Retraint, F.2
Cogranne, R.3
-
47
-
-
0003998885
-
CRC Concise Encyclopedia of Mathematics
-
Chapman & Hall/CRC
-
[47] Weisstein, E.W., CRC Concise Encyclopedia of Mathematics. 2003, Chapman & Hall/CRC.
-
(2003)
-
-
Weisstein, E.W.1
-
48
-
-
84892764719
-
Attacks on steganographic systems
-
Springer Berlin, Heidelberg
-
[48] Westfeld, A., Pfitzmann, A., Attacks on steganographic systems. Information Hiding Lecture Notes in Comput. Sci., vol. 1768, 2000, Springer, Berlin, Heidelberg, 61–76.
-
(2000)
Information Hiding, Lecture Notes in Comput. Sci.
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
49
-
-
70249094955
-
Quantization Noise: Roundoff Error in Digital Computation
-
Cambridge University Press Cambridge, UK
-
[49] Widrow, B., Kollár, I., Quantization Noise: Roundoff Error in Digital Computation. Signal Processing, Control, and Communications, 2008, Cambridge University Press, Cambridge, UK.
-
(2008)
Signal Processing, Control, and Communications
-
-
Widrow, B.1
Kollár, I.2
-
50
-
-
80053026542
-
Statistical decision methods in hidden information detection
-
Springer Berlin, Heidelberg
-
[50] Zitzmann, C., Cogranne, R., Retraint, F., Nikiforov, I., Fillatre, L., Cornu, P., Statistical decision methods in hidden information detection. Information Hiding Lecture Notes in Comput. Sci., vol. 6958, 2013, Springer, Berlin, Heidelberg.
-
(2013)
Information Hiding, Lecture Notes in Comput. Sci.
, vol.6958
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
|