-
1
-
-
70350562893
-
The Square Root Law of steganographic capacity for Markov covers
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, January 18-21
-
T. Filler, A. D. Ker, and J. Fridrich, "The Square Root Law of steganographic capacity for Markov covers," in Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, January 18-21, 2009, vol. 7254, pp. 08 1-08 11.
-
(2009)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI
, vol.7254
, pp. 081-0811
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
2
-
-
80053005547
-
Break our steganographic system-the ins and outs of organizing BOSS
-
T. Filler, T. Pevný, A. Ker, and S. Craver, Eds., Prague, Czech Republic, May 18-20 of Lecture Notes in Computer Science
-
P. Bas, T. Filler, and T. Pevný, "Break our steganographic system-the ins and outs of organizing BOSS," in Information Hiding, 13th International Workshop, T. Filler, T. Pevný, A. Ker, and S. Craver, Eds., Prague, Czech Republic, May 18-20, 2011, vol. 6958 of Lecture Notes in Computer Science, pp. 59-70.
-
(2011)
Information Hiding, 13th International Workshop
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
3
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, June 28-30 of Lecture Notes in Computer Science, Springer-Verlag, New York
-
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding, 12th International Workshop, R. Böhme and R. Safavi-Naini, Eds., Calgary, Canada, June 28-30, 2010, vol. 6387 of Lecture Notes in Computer Science, pp. 161-177, Springer-Verlag, New York.
-
(2010)
Information Hiding, 12th International Workshop
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
4
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
April
-
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 432-444, April 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
5
-
-
84860434682
-
Rich models for steganalysis of digital images
-
June
-
J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, June 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
7
-
-
0019654284
-
Cubic convolution interpolation for digital image processing
-
December
-
R. G. Keys, "Cubic convolution interpolation for digital image processing," IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. ASSP-29, no. 6, pp. 1153-1160, December 1981.
-
(1981)
IEEE Transactions on Acoustics, Speech, and Signal Processing
, vol.ASSP-29
, Issue.6
, pp. 1153-1160
-
-
Keys, R.G.1
-
8
-
-
42949088538
-
Revisiting weighted stegoimage steganalysis
-
E. J. Delp, P. W. Wong, J. Dittmann, and N. D. Memon, Eds., San Jose, CA, January 27-31
-
A. D. Ker and R. Böhme, "Revisiting weighted stegoimage steganalysis," in Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, E. J. Delp, P. W. Wong, J. Dittmann, and N. D. Memon, Eds., San Jose, CA, January 27-31, 2008, vol. 6819, pp. 5 1-5 17.
-
(2008)
Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 51-517
-
-
Ker, A.D.1
Böhme, R.2
-
9
-
-
85053452541
-
Steganalysis of LSB replacement using parity-aware features
-
Berkeley, CA, May 15-18, Lecture Notes in Computer Science, To appear
-
J. Fridrich and J. Kodovský, "Steganalysis of LSB replacement using parity-aware features," in Information Hiding, 14th International Workshop, Berkeley, CA, May 15-18, 2012, Lecture Notes in Computer Science, To appear.
-
(2012)
Information Hiding, 14th International Workshop
-
-
Fridrich, J.1
Kodovský, J.2
-
10
-
-
70350445582
-
Fisher information determines capacity of-secure steganography
-
S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, June 7-10 of Lecture Notes in Computer Science, Springer-Verlag, New York
-
T. Filler and J. Fridrich, "Fisher information determines capacity of-secure steganography," in Information Hiding, 11th International Workshop, S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, June 7-10, 2009, vol. 5806 of Lecture Notes in Computer Science, pp. 31-47, Springer-Verlag, New York.
-
(2009)
Information Hiding, 11th International Workshop
, vol.5806
, pp. 31-47
-
-
Filler, T.1
Fridrich, J.2
-
11
-
-
0029250999
-
On the modeling of DCT and subband image data for compression
-
February
-
S. Meignen and H. Meignen, "On the modeling of DCT and subband image data for compression," IEEE Transactions on Image Processing, vol. 4, no. 2, pp. 186-193, February 1995.
-
(1995)
IEEE Transactions on Image Processing
, vol.4
, Issue.2
, pp. 186-193
-
-
Meignen, S.1
Meignen, H.2
|