-
3
-
-
84887442459
-
Generalized likelihood ratio tests and uniformly most powerful tests
-
D. Birkes Generalized likelihood ratio tests and uniformly most powerful tests Am. Stat. 44 2 1990 163 166
-
(1990)
Am. Stat.
, vol.44
, Issue.2
, pp. 163-166
-
-
Birkes, D.1
-
5
-
-
80054797149
-
Statistical decision by using quantized observations
-
R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, P. Cornu, Statistical decision by using quantized observations, in: 2011 IEEE International Symposium on Information Theory Proceedings (ISIT), 2011, pp. 1210-1214.
-
(2011)
2011 IEEE International Symposium on Information Theory Proceedings (ISIT)
, pp. 1210-1214
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
6
-
-
84874590883
-
Application of hypothesis testing theory for optimal detection of LSB matching data hiding
-
R. Cogranne, and F. Retraint Application of hypothesis testing theory for optimal detection of LSB matching data hiding Signal Process. 93 7 2013 1724 1737
-
(2013)
Signal Process.
, vol.93
, Issue.7
, pp. 1724-1737
-
-
Cogranne, R.1
Retraint, F.2
-
7
-
-
84873683899
-
An asymptotically uniformly most powerful test for LSB matching detection
-
R. Cogranne, and F. Retraint An asymptotically uniformly most powerful test for LSB matching detection IEEE Trans. Inf. Forensics Secur. 8 March (3) 2013 464 476
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.MARCH 3
, pp. 464-476
-
-
Cogranne, R.1
Retraint, F.2
-
8
-
-
80052987721
-
A cover image model for reliable steganalysis
-
Springer-Verlag, New York, Prague, Czech Republic, May 18-20
-
R. Cogranne, C. Zitzmann, L. Fillatre, I. Nikiforov, F. Retraint, P. Cornu, A cover image model for reliable steganalysis, in: Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, vol. 6958, Springer-Verlag, New York, Prague, Czech Republic, May 18-20, 2011, pp. 178-192.
-
(2011)
Information Hiding, 13th International Workshop, Lecture Notes in Computer Science
, vol.6958
, pp. 178-192
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
9
-
-
80052227499
-
Reliable detection of hidden information based on a non-linear local model
-
28-30 June
-
R. Cogranne, C. Zitzmann, L. Fillatre, I. Nikiforov, F. Retraint, P. Cornu, Reliable detection of hidden information based on a non-linear local model, in: Proceedings of IEEE Workshop on Statistical Signal Processing, 28-30 June 2011, pp. 493-496.
-
(2011)
Proceedings of IEEE Workshop on Statistical Signal Processing
, pp. 493-496
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
10
-
-
0001618597
-
Estimating the mean and variance of normal populations from singly truncated and doubly truncated samples
-
A. Cohen Estimating the mean and variance of normal populations from singly truncated and doubly truncated samples Ann. Math. Statist. 21 4 1950 557 569
-
(1950)
Ann. Math. Statist.
, vol.21
, Issue.4
, pp. 557-569
-
-
Cohen, A.1
-
11
-
-
53349159971
-
-
Morgan Kaufmann San Francisco, CA
-
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker Digital Watermarking and Steganography 2007 Morgan Kaufmann San Francisco, CA
-
(2007)
Digital Watermarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
12
-
-
4744365298
-
Detection of hiding in the least significant bit
-
O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, and B. Manjunath Detection of hiding in the least significant bit IEEE Trans. Signal Process. 52 October (10) 2004 3046 3058
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.OCTOBER 10
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
13
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
S. Dumitrescu, X. Wu, and W. Zhe Detection of LSB steganography via sample pair analysis IEEE Trans. Signal Process. 51 6 2003 1995 2007
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.6
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Zhe, W.3
-
14
-
-
84855933278
-
Adaptive steganalysis of least significant bit replacement in grayscale natural images
-
L. Fillatre Adaptive steganalysis of least significant bit replacement in grayscale natural images IEEE Trans. Signal Process. 60 February (2) 2012 556 569
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.FEBRUARY 2
, pp. 556-569
-
-
Fillatre, L.1
-
15
-
-
54949104957
-
Optimal non-Bayesian anomaly detection for parametric tomography
-
L. Fillatre, I. Nikiforov, and F. Retraint ε-optimal non-Bayesian anomaly detection for parametric tomography IEEE Trans. Image Process. 17 11 2008 1985 1999
-
(2008)
IEEE Trans. Image Process.
, vol.17
, Issue.11
, pp. 1985-1999
-
-
Fillatre, L.1
Nikiforov, I.2
Retraint, F.3
-
16
-
-
67651089691
-
Clipped noisy images heteroskedastic modeling and practical denoising
-
A. Foi Clipped noisy images heteroskedastic modeling and practical denoising Signal Process. 89 12 2009 2609 2629
-
(2009)
Signal Process.
, vol.89
, Issue.12
, pp. 2609-2629
-
-
Foi, A.1
-
17
-
-
52649143252
-
Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data
-
A. Foi, M. Trimeche, V. Katkovnik, and K. Egiazarian Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data IEEE Trans. Image Process. 17 October (10) 2008 1737 1754
-
(2008)
IEEE Trans. Image Process.
, vol.17
, Issue.OCTOBER 10
, pp. 1737-1754
-
-
Foi, A.1
Trimeche, M.2
Katkovnik, V.3
Egiazarian, K.4
-
18
-
-
18444382369
-
Optimal statistical fault detection with nuisance parameters
-
M. Fouladirad, and I. Nikiforov Optimal statistical fault detection with nuisance parameters Automatica 41 2005 1157 1171
-
(2005)
Automatica
, vol.41
, pp. 1157-1171
-
-
Fouladirad, M.1
Nikiforov, I.2
-
20
-
-
8844243986
-
On estimation of secret message length in LSB steganography in spatial domain
-
J. Fridrich, M. Goljan, On estimation of secret message length in LSB steganography in spatial domain, in: Security, Steganography and Watermarking of Multimedia Contents VI. Proceedings of the SPIE, vol. 5306, 2004.
-
(2004)
Security, Steganography and Watermarking of Multimedia Contents VI. Proceedings of the SPIE
, vol.5306
-
-
Fridrich, J.1
Goljan, M.2
-
21
-
-
0035472155
-
Reliable detection of LSB steganography in color and grayscale images
-
J. Fridrich, M. Goljan, R. Du, Reliable detection of LSB steganography in color and grayscale images, in: Magazine of IEEE Multimedia Special Issue on Security, vol. 8, 2001, pp. 22-28.
-
(2001)
Magazine of IEEE Multimedia Special Issue on Security
, vol.8
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
22
-
-
84874437807
-
Steganalysis of LSB replacement using parity-aware features
-
J. Fridrich, J. Kodovsky, Steganalysis of LSB replacement using parity-aware features, in: 14th Information Hiding Conference, vol. 7692, 2012, pp. 31-45.
-
(2012)
14th Information Hiding Conference
, vol.7692
, pp. 31-45
-
-
Fridrich, J.1
Kodovsky, J.2
-
23
-
-
77954723646
-
The 'dresden image database' for benchmarking digital image forensics
-
T. Gloe, R. Bohme, The 'dresden image database' for benchmarking digital image forensics, in: Proceedings of ACM SAC, vol. 2, 2010, pp. 1585-1591.
-
(2010)
Proceedings of ACM SAC
, vol.2
, pp. 1585-1591
-
-
Gloe, T.1
Bohme, R.2
-
26
-
-
33645652933
-
Fourth-order structural steganalysis and analysis of cover assumptions
-
A. Ker, Fourth-order structural steganalysis and analysis of cover assumptions, in: Security, Steganography and Watermarking of Multimedia Contents X, Proceedings of the SPIE, 2006, pp. 25-38.
-
(2006)
Security, Steganography and Watermarking of Multimedia Contents X, Proceedings of the SPIE
, pp. 25-38
-
-
Ker, A.1
-
27
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
A. Ker, R. Böhme, Revisiting weighted stego-image steganalysis, in: Security, Steganography and Watermarking of Multimedia Contents X, Proceedings of the SPIE, 2008, pp. 501-517.
-
(2008)
Security, Steganography and Watermarking of Multimedia Contents X, Proceedings of the SPIE
, pp. 501-517
-
-
Ker, A.1
-
30
-
-
49949111194
-
Generalized category attack: Improving histogram-based attack on JPEG LSB embedding
-
Springer
-
K. Lee, et al., Generalized category attack: improving histogram-based attack on JPEG LSB embedding, in: Proceedings of 9th International Workshop on Information Hiding, vol. 4567, Springer, 2007, pp. 378-392.
-
(2007)
Proceedings of 9th International Workshop on Information Hiding
, vol.4567
, pp. 378-392
-
-
Lee, K.1
-
32
-
-
0000238336
-
A simplex method for function minimization
-
J. Nelder, and R. Mead A simplex method for function minimization Comput. J. 7 1965 308 313
-
(1965)
Comput. J.
, vol.7
, pp. 308-313
-
-
Nelder, J.1
Mead, R.2
-
33
-
-
77955421242
-
Classification of steganalysis techniques: A study
-
A. Nissar, and A. Mir Classification of steganalysis techniques: a study Digital Signal Process. 20 6 2010 1758 1770
-
(2010)
Digital Signal Process.
, vol.20
, Issue.6
, pp. 1758-1770
-
-
Nissar, A.1
Mir, A.2
-
35
-
-
0027702324
-
On the generalized likelihood ratio test for a class of nonlinear detection problems
-
B. Porat, and B. Friedlander On the generalized likelihood ratio test for a class of nonlinear detection problems IEEE Trans. Signal Process. 41 11 1993 3186 3190
-
(1993)
IEEE Trans. Signal Process.
, vol.41
, Issue.11
, pp. 3186-3190
-
-
Porat, B.1
Friedlander, B.2
-
36
-
-
84975647860
-
Transformation of image-signal-dependent noise into image-signal- independent noise
-
P. Prucnal, and B. Saleh Transformation of image-signal-dependent noise into image-signal-independent noise Opt. Lett. 6 July (7) 1981 316 318
-
(1981)
Opt. Lett.
, vol.6
, Issue.JULY 7
, pp. 316-318
-
-
Prucnal, P.1
Saleh, B.2
-
38
-
-
34547917144
-
Performance measures for Neyman-Pearson classification
-
C. Scott Performance measures for Neyman-Pearson classification IEEE Trans. Inf. Theory 53 August (8) 2007 2852 2863
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.AUGUST 8
, pp. 2852-2863
-
-
Scott, C.1
-
40
-
-
33744728031
-
Steganalysis for Markov cover data with applications to images
-
K. Sullivan, U. Madhow, S. Chandrasekaran, and B. Manjunath Steganalysis for Markov cover data with applications to images IEEE Trans. Inf. Forensics Secur. 1 June (2) 2006 275 287
-
(2006)
IEEE Trans. Inf. Forensics Secur.
, vol.1
, Issue.JUNE 2
, pp. 275-287
-
-
Sullivan, K.1
Madhow, U.2
Chandrasekaran, S.3
Manjunath, B.4
-
41
-
-
84869790998
-
Camera model identification based on hypothesis testing theory
-
August
-
T.H. Thai, R. Cogranne, F. Retraint, Camera model identification based on hypothesis testing theory, in: Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European, August 2012, pp. 1747-1751.
-
(2012)
Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European
, pp. 1747-1751
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
42
-
-
84891296342
-
Camera model identification based on heteroscedastic noise model
-
(January (1))
-
T.H. Thai, R. Cogranne, F. Retraint, Camera model identification based on heteroscedastic noise model, IEEE Trans. Image Process. 23(January (1)) (2014) 250-263.
-
(2014)
IEEE Trans. Image Process.
, vol.23
, pp. 250-263
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
43
-
-
84880064175
-
Statistical model of natural images
-
ICIP, September
-
T.H. Thai, F. Retraint, R. Cogranne, Statistical model of natural images, in: IEEE International Conference on Image Processing, ICIP, September 2012, pp. 2525-2528.
-
(2012)
IEEE International Conference on Image Processing
, pp. 2525-2528
-
-
Thai, T.H.1
Retraint, F.2
Cogranne, R.3
-
44
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
Y. Wang, and P. Moulin Optimized feature extraction for learning-based image steganalysis IEEE Trans. Inf. Forensics Secur. 2 March (1) 2007 31 45
-
(2007)
IEEE Trans. Inf. Forensics Secur.
, vol.2
, Issue.MARCH 1
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
46
-
-
80053026542
-
Statistical decision methods in hidden information detection
-
Prague, Czech Republic
-
C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, P. Cornu, Statistical decision methods in hidden information detection, in: Information Hiding, Lecture Notes in Computer Science, vol. 6958, Prague, Czech Republic, 2011, pp. 163-177.
-
(2011)
Information Hiding, Lecture Notes in Computer Science
, vol.6958
, pp. 163-177
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
|