-
2
-
-
0003214704
-
Coding theorems for a discrete source with a fidelity criterion
-
Shannon CE: Coding theorems for a discrete source with a fidelity criterion. IRE Nat. Conv. Rec 1959, 4:142-163.
-
(1959)
IRE Nat. Conv. Rec
, vol.4
, pp. 142-163
-
-
Shannon, C.E.1
-
3
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
10.1109/TIFS.2011.2134094
-
Filler T, Judas J, Fridrich J: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur 2011,6(3):920-935.
-
(2011)
IEEE Trans. Inf. Forensics Secur
, vol.6
, Issue.3
, pp. 920-935
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
4
-
-
78149255931
-
Gibbs construction in steganography
-
10.1109/TIFS.2010.2077629
-
Filler T, Fridrich J: Gibbs construction in steganography. IEEE Trans. Inf. Forensics Secur 2010,5(4):705-720.
-
(2010)
IEEE Trans. Inf. Forensics Secur
, vol.5
, Issue.4
, pp. 705-720
-
-
Filler, T.1
Fridrich, J.2
-
5
-
-
79954457569
-
Design of adaptive steganographic schemes for digital images
-
A. Alattar N.D. Memon E.J. Delp J. Dittmann (eds) San Francisco
-
Filler T, Fridrich J: Design of adaptive steganographic schemes for digital images. In Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics III, vol. 7880. Edited by: Alattar A, Memon ND, Delp EJ, Dittmann J. San Francisco; 2011:1-14.
-
(2011)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics III, Vol. 7880
, pp. 1-14
-
-
Filler, T.1
Fridrich, J.2
-
6
-
-
33749598442
-
Breaking Cauchy model-based JPEG steganography with first order statistics
-
Springer Berlin
-
Böhme R, Westfeld A: Breaking Cauchy model-based JPEG steganography with first order statistics. In Computer Security - ESORICS 2004. Proceedings 9th European Symposium on Research in Computer Security, ed. by P Samarati, PYA Ryan, D Gollmann, R Molvapages, Sophia Antipolis, France. Lecture Notes in Computer Science. Berlin: Springer; 2004:125-140.
-
(2004)
Computer Security - ESORICS 2004. Proceedings 9th European Symposium on Research in Computer Security, Ed. by P Samarati, PYA Ryan, D Gollmann, R Molvapages, Sophia Antipolis, France. Lecture Notes in Computer Science
, pp. 125-140
-
-
Böhme, R.1
Westfeld, A.2
-
7
-
-
80054777166
-
On dangers of overtraining steganography to incomplete cover model
-
J. Dittmann S. Craver C. Heitzenrater (eds) Niagara Falls
-
Kodovský J, Fridrich J, Holub V: On dangers of overtraining steganography to incomplete cover model. In Proceedings of the 13th ACM Multimedia & Security Workshop. Edited by: Dittmann J, Craver S, Heitzenrater C. Niagara Falls; 2011:69-76.
-
(2011)
Proceedings of the 13th ACM Multimedia & Security Workshop
, pp. 69-76
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
8
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Springer-Verlag New York
-
Kim Y, Duric Z, Richards D: Modified matrix encoding technique for minimal distortion steganography. In 8th International Workshop on Information Hiding, ed. by JL Camenisch, CS Collberg, NF Johnson, P Sallee, Alexandria, 10-12 July 2006. Lecture Notes in Computer Science. New York: Springer-Verlag; 2006:314-327.
-
(2006)
8th International Workshop on Information Hiding, Ed. by JL Camenisch, CS Collberg, NF Johnson, P Sallee, Alexandria, 10-12 July 2006. Lecture Notes in Computer Science
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
9
-
-
70449657749
-
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
-
J. Dittmann S. Craver J. Fridrich (eds) Princeton
-
Sachnev V, Kim HJ, Zhang R: Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Multimedia & Security Workshop. Edited by: Dittmann J, Craver S, Fridrich J. Princeton; 2009:131-140.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 131-140
-
-
Sachnev, V.1
Kim, H.J.2
Zhang, R.3
-
10
-
-
84867591559
-
An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficients
-
25-30 March; Kyoto
-
Wang C, Ni J: An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficients. In Proceedings of IEEE ICASSP. Kyoto; 25-30 March 2012.
-
(2012)
Proceedings of IEEE ICASSP
-
-
Wang, C.1
Ni, J.2
-
11
-
-
84863942032
-
New channel selection rule for JPEG steganography
-
10.1109/TIFS.2012.2198213
-
Huang F, Huang J, Shi Y-Q: New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Secur 2012,7(4):1181-1191.
-
(2012)
IEEE Trans. Inf. Forensics Secur
, vol.7
, Issue.4
, pp. 1181-1191
-
-
Huang, F.1
Huang, J.2
Shi, Y.-Q.3
-
14
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
J. Dittmann J. Fridrich (eds) 20-21 September; Dallas
-
Fridrich J, Pevný T, Kodovský J: Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In Proceedings of the 9th ACM Multimedia & Security Workshop. Edited by: Dittmann J, Fridrich J. Dallas; 20-21 September 2007:3-14.
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
15
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Springer Heidelberg
-
Pevný T, Filler T, Bas P: Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, ed. by R Böhme, R Safavi-Naini. 12th International Conference, IH 2010, Calgary, 28-30 June 2010. Lecture Notes in Computer Science. Heidelberg: Springer; 2010:161-177.
-
(2010)
Information Hiding, Ed. by R Böhme, R Safavi-Naini. 12th International Conference, IH 2010, Calgary, 28-30 June 2010. Lecture Notes in Computer Science
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
16
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
10.1109/TIFS.2010.2045842
-
Pevný T, Bas P, Fridrich J: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur 2010,5(2):215-224.
-
(2010)
IEEE Trans. Inf. Forensics Secur
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
18
-
-
84860434682
-
Rich models for steganalysis of digital images
-
10.1109/TIFS.2012.2190402
-
Fridrich J, Kodovský J: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur 2011,7(3):868-882.
-
(2011)
IEEE Trans. Inf. Forensics Secur
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
20
-
-
80053047483
-
Steganalysis of content-adaptive steganography in spatial domain
-
Czech Republic Prague May 18-20
-
Fridrich J, Kodovský J, Goljan M, Holub V: Steganalysis of content-adaptive steganography in spatial domain. In Information Hiding, 13th International Conference, Lecture Notes in Computer Science, ed. by T Filler, T Pevný, A Ker, S Craver. Prague: Czech Republic; May 18-20, 2011:102-117.
-
(2011)
Information Hiding, 13th International Conference, Lecture Notes in Computer Science, Ed. by T Filler, T Pevný, A Ker, S Craver
, pp. 102-117
-
-
Fridrich, J.1
Kodovský, J.2
Goljan, M.3
Holub, V.4
-
21
-
-
80052990656
-
-
Springer Heidelberg
-
Gül G, Kurugollu F: A new methodology in steganalysis: breaking highly undetactable steganograpy (HUGO), Information Hiding, ed. by T Filler, T Pevný, A Ker, S Craver, 13th International Conference, IH 2011, Prague, 18-20 May 2011. Lecture Notes in Computer Science. Heidelberg: Springer; 2011:71-84.
-
(2011)
A New Methodology in Steganalysis: Breaking Highly Undetactable Steganograpy (HUGO), Information Hiding, Ed. by T Filler, T Pevný, A Ker, S Craver, 13th International Conference, IH 2011, Prague, 18-20 May 2011. Lecture Notes in Computer Science
, pp. 71-84
-
-
Gül, G.1
Kurugollu, F.2
-
22
-
-
84874405772
-
Textural features for steganalysis
-
Springer Heidelberg
-
Shi Y-Q, Sutthiwan P, Chen L: Textural features for steganalysis. In Information Hiding, ed. by M Kirchner, D Ghosal. 14th International Conference, IH 2012, Berkeley, 15-18 May 2012. Lecture Notes in Computer Science. Heidelberg: Springer; 2012:63-77.
-
(2012)
Information Hiding, Ed. by M Kirchner, D Ghosal. 14th International Conference, IH 2012, Berkeley, 15-18 May 2012. Lecture Notes in Computer Science
, pp. 63-77
-
-
Shi, Y.-Q.1
Sutthiwan, P.2
Chen, L.3
-
24
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
A. Alattar N.D. Memon E.J. Delp (eds) 23-26 January; San Francisco 1-13
-
Kodovský J, Fridrich J: Steganalysis of JPEG images using rich models. In Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012. Edited by: Alattar A, Memon ND, Delp EJ. San Francisco; 23-26 2012 January:0A 1-13.
-
(2012)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012
-
-
Kodovský, J.1
Fridrich, J.2
-
26
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
10.1109/TIFS.2011.2175919
-
Kodovský J, Fridrich J, Holub V: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur 2012,7(2):432-444.
-
(2012)
IEEE Trans. Inf. Forensics Secur
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
27
-
-
84894034762
-
-
A. Alattar N.D. Memon C.D. Heitzenrater (eds) 2-6 February; San Francisco; TBD
-
Denemark T, Fridrich J, Holub V: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014. Edited by: Alattar A, Memon ND, Heitzenrater CD. San Francisco; 2-6 February 2014:TBD-TBD.
-
(2014)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014
-
-
Denemark, T.1
Fridrich, J.2
Holub, V.3
-
28
-
-
77952620028
-
Edge adaptive image steganography based on LSB matching revisited
-
10.1109/TIFS.2010.2041812 2649719
-
Luo W, Huang F, Huang J: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur 2010,5(2):201-214.
-
(2010)
IEEE Trans. Inf. Forensics Secur
, vol.5
, Issue.2
, pp. 201-214
-
-
Luo, W.1
Huang, F.2
Huang, J.3
-
29
-
-
21844452710
-
Writing on wet paper
-
E.J. Delp W. Wong (eds) 10.1117/12.583160 16-20 January; San Jose
-
Fridrich J, Goljan M, Soukal D, Lisoněk P: Writing on wet paper. In Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII. Edited by: Delp EJ, Wong PW. San Jose; 16-20 January 2005:328-340.
-
(2005)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII
, pp. 328-340
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
Lisoněk, P.4
-
30
-
-
49949117942
-
A fusion of maximal likelihood and structural steganalysis
-
Information Hiding, ed. by T Furon, F Cayre, G Doërr, P Bas Berlin: Springer-Verlag
-
Ker AD: A fusion of maximal likelihood and structural steganalysis. In Information Hiding, ed. by T Furon, F Cayre, G Doërr, P Bas. 9th International Workshop, IH 2007, Saint Malo, 11-13 June 2007. Lecture Notes in Computer Science. Berlin: Springer-Verlag; 204-219.
-
9th International Workshop, IH 2007, Saint Malo, 11-13 June 2007. Lecture Notes in Computer Science
, pp. 204-219
-
-
Ker, A.D.1
-
31
-
-
84940448623
-
Secure steganographic methods for palette images
-
Springer-Verlag New York
-
Fridrich J, Du R: Secure steganographic methods for palette images. In Information Hiding, ed. by A Pfitzmann, 3rd International Workshop, IH 1999, Dresden, 29 September-1 October 1999. Lecture Notes in Computer Science. New York: Springer-Verlag; 1999:47-60.
-
(1999)
Information Hiding, Ed. by A Pfitzmann, 3rd International Workshop, IH 1999, Dresden, 29 September-1 October 1999. Lecture Notes in Computer Science
, pp. 47-60
-
-
Fridrich, J.1
Du, R.2
-
33
-
-
79954485517
-
Detecting messages of unknown length
-
A. Alattar N.D. Memon E.J. Delp J. Dittmann (eds) January 23-26; San Francisco
-
Pevný T: Detecting messages of unknown length. In Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics III. Edited by: Alattar A, Memon ND, Delp EJ, Dittmann J. San Francisco; January 23-26, 2011:OT 1-12.
-
(2011)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics III
, pp. 1-12
-
-
Pevný, T.1
|