-
1
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
N. F. Johnson and S. Jajodia, "Exploring steganography: seeing the unseen," Computer 31(2), 26-34 (1998). (Pubitemid 128555329)
-
(1998)
Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
2
-
-
84855458682
-
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
-
D.-C. Lou and C.-H. Hu, "LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis," Inf. Sci. 188(4), 346-358 (2012).
-
(2012)
Inf. Sci
, vol.188
, Issue.4
, pp. 346-358
-
-
Lou, D.-C.1
Hu, C.-H.2
-
3
-
-
59149086522
-
A generalization of LSB matching
-
X. Li et al., "A generalization of LSB matching," IEEE Signal Process. Lett. 16(2), 69-72 (2009).
-
(2009)
IEEE Signal Process. Lett
, vol.16
, Issue.2
, pp. 69-72
-
-
Li, X.1
-
4
-
-
79960738044
-
A survey on image steganography and steganalysis
-
B. Li et al., "A survey on image steganography and steganalysis," J. Inf. Hiding Multimed. Signal Process. 2(2), 142-172 (2011).
-
(2011)
J. Inf. Hiding Multimed. Signal Process
, vol.2
, Issue.2
, pp. 142-172
-
-
Li, B.1
-
5
-
-
0242576328
-
Steganalysis of additive noise modelable information hiding
-
V, E. J. Delp and P. W. Wong, Eds., SPIE, Santa Clara, California
-
J. J. Harmsen andW. A. Pearlman, "Steganalysis of additive noise modelable information hiding," in Security and Watermarking of Multimedia Contents V, E. J. Delp and P. W. Wong, Eds., pp. 131-142, SPIE, Santa Clara, California (2003).
-
(2003)
Security and Watermarking of Multimedia Contents
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
6
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
DOI 10.1109/LSP.2005.847889
-
A. D. Ker, "Steganalysis of LSB matching in grayscale images," IEEE Signal Process. Lett. 12(6), 441-444 (2005). (Pubitemid 40794877)
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
7
-
-
21844461602
-
Maximum likelihood estimation of length of secret message embedded using ±K steganography in spatial domain
-
DOI 10.1117/12.584426, 60, Proceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII
-
J. Fridrich, D. Soukal, and X. Goljan, "Maximum likelihood estimation of length of secret message embedded using ±K steganography in spatial domain," in Security, Steganography, and Watermarking of Multimedia Contents VII, pp. 595-606, SPIE, San Jose, California (2005). (Pubitemid 40953017)
-
(2005)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.5681
, pp. 595-606
-
-
Fridrich, J.1
Soukal, D.2
Goljan, M.3
-
8
-
-
77954468387
-
Detection of LSB matching steganography using the envelope of histogram
-
J. Zhang, Y. Hu, and Z. Yuan, "Detection of LSB matching steganography using the envelope of histogram," J. Comput. 4(7), 646-653 (2009).
-
(2009)
J. Comput
, vol.4
, Issue.7
, pp. 646-653
-
-
Zhang, J.1
Hu, Y.2
Yuan, Z.3
-
9
-
-
0036530067
-
Statistical evaluation of image quality measures
-
DOI 10.1117/1.1455011
-
I. Avcibas, B. Sankur, and K. Sayood, "Statistical evaluation of image quality measures," J. Electron. Imag. 11(2), 206-223 (2002). (Pubitemid 34536986)
-
(2002)
Journal of Electronic Imaging
, vol.11
, Issue.2
, pp. 206-223
-
-
Avcibas, I.1
Sankur, B.2
Sayood, K.3
-
10
-
-
34548017677
-
Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images
-
DOI 10.1016/j.patcog.2007.06.005, PII S0031320307002658
-
Q. Liu et al., "Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images," Pattern Recognit. 41(1), 56-66 (2008). (Pubitemid 47284217)
-
(2008)
Pattern Recognition
, vol.41
, Issue.1
, pp. 56-66
-
-
Liu, Q.1
Sung, A.H.2
Chen, Z.3
Xu, J.4
-
11
-
-
33645676686
-
New blind steganalysis and its implications
-
SPIE, San Jose, California
-
M. Goljan, J. Fridrich, and T. Holotyak, "New blind steganalysis and its implications," in Security, Steganography, and Watermarking of Multimedia Contents VIII, pp. 7201-7201, SPIE, San Jose, California (2006).
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents
, vol.8
, pp. 7201-7201
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
12
-
-
84879660459
-
Image textural features for steganalysis of spatial domain steganography
-
G. Xiong et al., "Image textural features for steganalysis of spatial domain steganography," J. Electron. Imag. 21(3), 033015 (2012).
-
(2012)
J. Electron. Imag
, vol.21
, Issue.3
, pp. 033015
-
-
Xiong, G.1
-
13
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security 5(2), 215-224 (2010).
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
14
-
-
78651097195
-
Reliable histogram features for detecting LSB matching
-
IEEE, Beijing, China
-
K. Cai et al., "Reliable histogram features for detecting LSB matching," in 17th IEEE Int. Conf. on Image Processing, pp. 1761-1764, IEEE, Beijing, China (2010).
-
(2010)
17th IEEE Int. Conf. on Image Processing
, pp. 1761-1764
-
-
Cai, K.1
-
15
-
-
84858191862
-
From blind to quantitative steganalysis
-
T. Pevny, J. Fridrich, and A. D. Ker, "From blind to quantitative steganalysis," IEEE Trans. Inf. Forensics Security 7(2), 445-454 (2012).
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 445-454
-
-
Pevny, T.1
Fridrich, J.2
Ker, A.D.3
-
16
-
-
84855458682
-
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
-
L. Der-Chyuan and H. Chen-Hao, "LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis," Inf. Sci. 188(1), 346-358 (2012).
-
(2012)
Inf. Sci
, vol.188
, Issue.1
, pp. 346-358
-
-
Der-Chyuan, L.1
Chen-Hao, H.2
-
17
-
-
69949122982
-
Detection of ± LSB steganography based on the amplitude of histogram local extrema
-
IEEE, Piscataway, New Jersey
-
G. Cancelli et al., "Detection of ± LSB steganography based on the amplitude of histogram local extrema," in 15th IEEE Int. Conf. on Image Processing, pp. 1288-1291, IEEE, Piscataway, New Jersey (2008).
-
(2008)
15th IEEE Int. Conf. on Image Processing
, pp. 1288-1291
-
-
Cancelli, G.1
-
19
-
-
48149084629
-
Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels
-
San Antonio, TX
-
F. J. Huang, B. Li, and J. W. Huang, "Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels," in IEEE Int. Conf. on Image Processing, pp. 401-404, San Antonio, TX (2007).
-
(2007)
IEEE Int. Conf. on Image Processing
, pp. 401-404
-
-
Huang, F.J.1
Li, B.2
Huang, J.W.3
-
20
-
-
70449644855
-
Steganalysis by subtractive pixel adjacency matrix
-
Association for Computing Machinery, NJ
-
T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," in 11th ACM Workshop on Multimedia Security, pp. 75-83, Association for Computing Machinery, NJ (2009).
-
(2009)
11th ACM Workshop on Multimedia Security
, pp. 75-83
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
21
-
-
54049087457
-
Run length based steganalysis for LSB matching steganography
-
Hannover, Germany
-
X. Y. Yu and N. Babaguchi, "Run length based steganalysis for LSB matching steganography," in IEEE Int. Conf. on Multimedia and Expo, pp. 353-356, Hannover, Germany (2008).
-
(2008)
IEEE Int. Conf. on Multimedia and Expo
, pp. 353-356
-
-
Yu, X.Y.1
Babaguchi, N.2
-
22
-
-
77956618202
-
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions
-
T. Zhang et al., "Steganalysis of LSB matching based on statistical modeling of pixel difference distributions," Inf. Sci. 180(23), 4685-4694 (2010).
-
(2010)
Inf. Sci
, vol.180
, Issue.23
, pp. 4685-4694
-
-
Zhang, T.1
-
23
-
-
79955965095
-
A learning-based steganalytic method against LSB matching steganography
-
Z. Xia et al., "A learning-based steganalytic method against LSB matching steganography," Radioengineering 20(1), 102-109 (2011).
-
(2011)
Radioengineering
, vol.20
, Issue.1
, pp. 102-109
-
-
Xia, Z.1
-
24
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security 5(2), 215-224 (2010).
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
25
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. J. C. Burges, "A tutorial on support vector machines for pattern recognition," Data Min. Knowl. Discov. 2(2), 121-167 (1998). (Pubitemid 128695475)
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
|