-
1
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
Lyu S, Farid H. Steganalysis using higher-order image statistics. IEEE Trans Inf Forensic Secur, 2006, 1: 111-119.
-
(2006)
IEEE Trans Inf Forensic Secur
, vol.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
2
-
-
33645676686
-
New blind steganalysis and its implications
-
Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications. In: Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, 2006. 1-13.
-
(2006)
Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
3
-
-
0242576328
-
Steganalysis of additive noise moderable information hiding
-
Harmsen J J, Pearlman W A. Steganalysis of additive noise moderable information hiding. In: Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, Santa Clara, 2003. 131-142.
-
(2003)
Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, Santa Clara
, pp. 131-142
-
-
Harmsen, J.J.1
Pearlman, W.A.2
-
4
-
-
33847717054
-
Optimized feature extraction for learning-based image steganalysis
-
Wang Y, Moulin P. Optimized feature extraction for learning-based image steganalysis. IEEE Trans Inf Forensic Secur, 2007, 2: 31-45.
-
(2007)
IEEE Trans Inf Forensic Secur
, vol.2
, pp. 31-45
-
-
Wang, Y.1
Moulin, P.2
-
5
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
J. L. Camenisch, C. S. Collberg, and N. F. Johnson (Eds.), Berlin: Springer-Verlag
-
Shi Y Q, Chen C, Chen W. A Markov process based approach to effective attacking JPEG steganography. In: Camenisch J L, Collberg C S, Johnson N F, et al., eds. Information Hiding, 8th International Workshop. Berlin: Springer-Verlag, 2006. 249-264.
-
(2006)
Information Hiding, 8th International Workshop
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
7
-
-
84897576803
-
Steganalysis of content-adaptive steganography in spatial domain
-
T. Filler, T. Pevný, and A. Ker (Eds.), Berlin: Springer-Verlag
-
Fridrich J, Kodovský J, Holub V, et al. Steganalysis of content-adaptive steganography in spatial domain. In: Filler T, Pevný T, Ker A, et al., eds. Information Hiding, 13th International Workshop. Berlin: Springer-Verlag, 2011. 101-11.
-
(2011)
Information Hiding, 13th International Workshop
, pp. 101-111
-
-
Fridrich, J.1
Kodovský, J.2
Holub, V.3
-
8
-
-
84897576599
-
Detection of ±1 steganography based on the amplitude of histogram local extreme. I
-
Cancelli G, Doërr G, Cox I, et al. Detection of ±1 steganography based on the amplitude of histogram local extreme. I In: Proceedings of the 15th IEEE International Conference on Image Processing, San Diego, 2008. 12-15.
-
(2008)
Proceedings of the 15th IEEE International Conference on Image Processing, San Diego
, pp. 12-15
-
-
Cancelli, G.1
Doërr, G.2
Cox, I.3
-
9
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
Pevný T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, 2007. 1-14.
-
(2007)
Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose
, pp. 1-14
-
-
Pevný, T.1
Fridrich, J.2
-
10
-
-
49949091527
-
YASS: Yet another steganographic scheme that resist blind steganalysis
-
T. Furon, F. Cayre, G. Doërr (Eds.), Berlin: Springer-Verlag
-
Solanki K, Sarkar A, Manjunath B S. YASS: Yet another steganographic scheme that resist blind steganalysis. In: Furon T, Cayre F, Doërr G, et al., eds. Information Hiding, 9th International Workshop. Berlin: Springer-Verlag, 2007. 16-31.
-
(2007)
Information Hiding, 9th International Workshop
, pp. 16-31
-
-
Solanki, K.1
Sarkar, A.2
Manjunath, B.S.3
-
11
-
-
42949166748
-
Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis
-
Sarkar A, Solanki K, Manjunath B S. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. In: Proceedings of SPIE, Electronic Imaging, Security, Forensics, Steganography, andWatermarking of Multimedia Contents X, San Jose, 2008. 16-31.
-
(2008)
Proceedings of SPIE, Electronic Imaging, Security, Forensics, Steganography, AndWatermarking of Multimedia Contents X, San Jose
, pp. 16-31
-
-
Sarkar, A.1
Solanki, K.2
Manjunath, B.S.3
-
12
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
P. Fong, R. Böhme, and R. Safavinaini (Eds.), Berlin: Springer-Verlag
-
Pevný T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography. In: Fong P, Böhme R, Safavinaini R, eds. Information Hiding, 12th International Workshop. Berlin: Springer-Verlag, 2010. 161-177.
-
(2010)
Information Hiding, 12th International Workshop
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
|