-
1
-
-
0034775171
-
Steganalysis using image quality metrics
-
Jan.
-
I. Avcibas, N. D. Memon, and B. Sankur, "Steganalysis using image quality metrics," Proc. SPIE, vol. 4314, pp. 523-531, Jan. 2001.
-
(2001)
Proc. SPIE
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.D.2
Sankur, B.3
-
2
-
-
80053005547
-
Break our steganographic system-The ins and outs of organizing BOSS
-
May
-
P. Bas, T. Filler, and T. Pevný, "Break our steganographic system-The ins and outs of organizing BOSS," in Proc. 13th Int. Conf., May 2011, pp. 59-70.
-
(2011)
Proc. 13th Int. Conf.
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
4
-
-
0030211964
-
Bagging predictors
-
L. Breiman, "Bagging predictors," Mach. Learn., vol. 24, pp. 123-140, Aug. 1996. (Pubitemid 126724382)
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
5
-
-
84873683899
-
An asymptotically uniformly most powerful test for LSB matching detection
-
Mar.
-
R. Cogranne and F. Retraint, "An asymptotically uniformly most powerful test for LSB matching detection," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 464-476, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 464-476
-
-
Cogranne, R.1
Retraint, F.2
-
6
-
-
84874425513
-
Statistical detection LSB matching using hypothesis testing theory
-
May
-
R. Cogranne, C. Zitzmann, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, "Statistical detection LSB matching using hypothesis testing theory," in Proc. 14th Int. Conf., May 2012, pp. 46-62.
-
(2012)
Proc. 14th Int. Conf.
, pp. 46-62
-
-
Cogranne, R.1
Zitzmann, C.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
-
7
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Oct.
-
H. Farid and L. Siwei, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop, Oct. 2002,pp. 340-354.
-
(2002)
Proc. 5th Int. Workshop
, pp. 340-354
-
-
Farid, H.1
Siwei, L.2
-
8
-
-
84855933278
-
Adaptive steganalysis of least significant bit replacement in grayscale images
-
Feb.
-
L. Fillatre, "Adaptive steganalysis of least significant bit replacement in grayscale images," IEEE Trans. Signal Process., vol. 60, no. 2, pp. 556-569, Feb. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.60
, Issue.2
, pp. 556-569
-
-
Fillatre, L.1
-
9
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
Sep.
-
T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920-935, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 920-935
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
10
-
-
14844321910
-
Perturbed Quantization steganography with wet paper codes
-
Proceedings of the Multimedia and Security Workshop 2004, MM and Sec'04
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography using wet paper codes," in Proc. 6th ACM, Sep. 2004, pp. 4-15. (Pubitemid 40338445)
-
(2004)
Proceedings of the Multimedia and Security Workshop 2004, MM and Sec'04
, pp. 4-15
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
11
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun.
-
J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
12
-
-
80053003434
-
Breaking HUGO-The process discovery
-
May 2011
-
J. Fridrich, J. Kodovský, M. Goljan, and V. Holub, "Breaking HUGO- The process discovery," in Proc. 13th Int. Conf., May 2011, pp. 85-101.
-
Proc. 13th Int. Conf.
, pp. 85-101
-
-
Fridrich, J.1
Kodovský, J.2
Goljan, M.3
Holub, V.4
-
13
-
-
80053047483
-
Steganalysis of content-adaptive steganography in spatial domain
-
May
-
J. Fridrich, J. Kodovský, M. Goljan, and V. Holub, "Steganalysis of content-adaptive steganography in spatial domain," in Proc. 13th Int. Conf., May 2011, pp. 102-117.
-
(2011)
Proc. 13th Int. Conf.
, pp. 102-117
-
-
Fridrich, J.1
Kodovský, J.2
Goljan, M.3
Holub, V.4
-
14
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities," in Proc. 9th ACM Multimedia Security Workshop, Sep. 2007, pp. 3-14. (Pubitemid 351203799)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
-
15
-
-
33645676686
-
New blind steganalysis and its implications
-
Jan.
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," Proc. SPIE, vol. 6072, pp. 1-13, Jan. 2006.
-
(2006)
Proc. SPIE
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
16
-
-
80052990656
-
A new methodology in steganalysis: Breaking highly undetectable steganography (HUGO)
-
May
-
G. Gül and F. Kurugollu, "A new methodology in steganalysis: Breaking highly undetectable steganography (HUGO)," in Proc. 13th Int. Conf., May 2011, pp. 71-84.
-
(2011)
Proc. 13th Int. Conf.
, pp. 71-84
-
-
Gül, G.1
Kurugollu, F.2
-
17
-
-
84874023671
-
An efficient JPEG steganographic scheme using uniform embedding
-
Dec.
-
L. Guo, J. Ni, and Y.-Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in Proc. 4th IEEE Int. Workshop Inf. Forensics Security, Dec. 2012, pp. 169-174.
-
(2012)
Proc. 4th IEEE Int. Workshop Inf. Forensics Security
, pp. 169-174
-
-
Guo, L.1
Ni, J.2
Shi, Y.-Q.3
-
19
-
-
84880061681
-
Digital image steganography using universal distortion
-
Jun.
-
V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. 1st ACM Workshop, Jun. 2013, pp. 59-68.
-
(2013)
Proc. 1st ACM Workshop
, pp. 59-68
-
-
Holub, V.1
Fridrich, J.2
-
20
-
-
84878455879
-
Random projections of residuals as an alternative to co-occurrences in steganalysis
-
Feb
-
V. Holub and J. Fridrich, "Random projections of residuals as an alternative to co-occurrences in steganalysis," Proc. SPIE, vol. 8665, pp. 1-11, Feb. 2013.
-
(2013)
Proc. SPIE
, vol.8665
, pp. 1-11
-
-
Holub, V.1
Fridrich, J.2
-
21
-
-
84863942032
-
New channel selection rule for JPEG steganography
-
Aug.
-
F. Huang, J. Huang, and Y.-Q. Shi, "New channel selection rule for JPEG steganography," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1181-1191, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1181-1191
-
-
Huang, F.1
Huang, J.2
Shi, Y.-Q.3
-
22
-
-
49949117942
-
A fusion of maximal likelihood and structural steganalysis
-
Jun.
-
A. D. Ker, "A fusion of maximal likelihood and structural steganalysis," in Proc. 9th Int. Workshop, Jun. 2007, pp. 204-219.
-
(2007)
Proc. 9th Int. Workshop
, pp. 204-219
-
-
Ker, A.D.1
-
24
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
Jan
-
A. D. Ker and R. Böhme, "Revisiting weighted stego-image steganalysis," Proc. SPIE, vol. 6819, pp. 1-17, Jan. 2008.
-
(2008)
Proc. SPIE
, vol.6819
, pp. 1-17
-
-
Ker, A.D.1
Böhme, R.2
-
25
-
-
56749160546
-
The square root law of steganographic capacity
-
Sep
-
A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich, "The square root law of steganographic capacity," in Proc. 10th ACM Multimedia Security Workshop, Sep. 2008, pp. 107-116.
-
(2008)
Proc. 10th ACM Multimedia Security Workshop
, pp. 107-116
-
-
Ker, A.D.1
Pevný, T.2
Kodovský, J.3
Fridrich, J.4
-
26
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Jul.
-
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Int. Workshop Inf. Hiding, Jul. 2006, pp. 314-327.
-
(2006)
Proc. 8th Int. Workshop Inf. Hiding
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
28
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
Jan.
-
J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, pp. 1-13, Jan. 2012.
-
(2012)
Proc. SPIE
, vol.8303
, pp. 1-13
-
-
Kodovský, J.1
Fridrich, J.2
-
29
-
-
84890489734
-
Steganalysis in resized images
-
May
-
J. Kodovský and J. Fridrich, "Steganalysis in resized images," in Proc. IEEE ICASSP, May 2013, pp. 1-19.
-
(2013)
Proc. IEEE ICASSP
, pp. 1-19
-
-
Kodovský, J.1
Fridrich, J.2
-
30
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
Apr.
-
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
31
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
Mar.
-
S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
32
-
-
84858244890
-
Co-occurrence steganalysis in high dimension
-
Jan.
-
T. Pevný, "Co-occurrence steganalysis in high dimension," Proc. SPIE, vol. 8303, pp. 1-13, Jan. 2012.
-
(2012)
Proc. SPIE
, vol.8303
, pp. 1-13
-
-
Pevný, T.1
-
33
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun.
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
34
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Jun.
-
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. 12th Int. Conf. Inf. Hiding, Jun. 2010, pp. 161-177.
-
(2010)
Proc. 12th Int. Conf. Inf. Hiding
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
35
-
-
70449657749
-
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
-
Sep.
-
V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding," in Proc. 11th ACM Multimedia Security Workshop, Sep. 2009, pp. 131-140.
-
(2009)
Proc. 11th ACM Multimedia Security Workshop
, pp. 131-140
-
-
Sachnev, V.1
Kim, H.J.2
Zhang, R.3
-
37
-
-
84937814312
-
F5-A Steganographic algorithm: High capacity despite better steganalysis
-
Information Hiding
-
A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)," in Proc. 4th Int. Workshop Inf. Hiding, Apr. 2001, pp. 289-302. (Pubitemid 33367674)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 289-302
-
-
Westfeld, A.1
-
38
-
-
84867593807
-
Hidden information detection based on quantized Laplacian distribution
-
Mar.
-
C. Zitzmann, R. Cogranne, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu, "Hidden information detection based on quantized Laplacian distribution," in Proc. IEEE ICASSP, Mar. 2012, pp. 1793-1796.
-
(2012)
Proc. IEEE ICASSP
, pp. 1793-1796
-
-
Zitzmann, C.1
Cogranne, R.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
39
-
-
34247562352
-
Steganalysis based on Markov model of thresholded prediction-error image
-
DOI 10.1109/ICME.2006.262792, 4036862, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
-
D. Zou, Y. Q. Shi, W. Su, and G. Xuan, "Steganalysis based on Markov model of thresholded prediction-error image," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2006, pp. 1365-1368. (Pubitemid 46679978)
-
(2006)
2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
, vol.2006
, pp. 1365-1368
-
-
Zou, D.1
Shi, Y.Q.2
Su, W.3
Xuan, G.4
|