-
3
-
-
79960738044
-
A survey on image steganography and steganalysis
-
Apr.
-
B. Li, J. He, J. Huang, and Y. Q. Shi, "A survey on image steganography and steganalysis," J. Inform. Hiding Multimedia Signa Process., vol. 2, no. 2, pp. 142-172, Apr. 2011.
-
(2011)
J. Inform. Hiding Multimedia Signa Process.
, vol.2
, Issue.2
, pp. 142-172
-
-
Li, B.1
He, J.2
Huang, J.3
Shi, Y.Q.4
-
4
-
-
84880060316
-
Moving steganography and steganalysis from the laboratory into the real world
-
A. D. Ker et al., "Moving steganography and steganalysis from the laboratory into the real world," in Proc. 1st ACM Workshop Inform. Hiding Multimedia Security, 2013, pp. 45-58.
-
(2013)
Proc. 1st ACM Workshop Inform. Hiding Multimedia Security
, pp. 45-58
-
-
Ker, A.D.1
-
5
-
-
84957868624
-
An information-theoretic model for steganography
-
Berlin, Germany: Springer-Verlag
-
C. Cachin, "An information-theoretic model for steganography," in Information Hiding (Lecture Notes in Computer Science) vol. 1525. Berlin, Germany: Springer-Verlag, 1998, pp. 306-318.
-
(1998)
Information Hiding (Lecture Notes in Computer Science)
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
6
-
-
56749152307
-
Benchmarking for steganography
-
Information Hiding Berlin, Germany: Springer-Verlag
-
T. Pevný and J. Fridrich, "Benchmarking for steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 5284. Berlin, Germany: Springer-Verlag, 2008, pp. 251-267.
-
(2008)
Lecture Notes in Computer Science
, vol.5284
, pp. 251-267
-
-
Pevný, T.1
Fridrich, J.2
-
7
-
-
34247562352
-
Steganalysis based on Markov model of thresholded prediction-error image
-
DOI 10.1109/ICME.2006.262792, 4036862, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
-
D. Zou, Y. Shi, W. Su, and G. Xuan, "Steganalysis based on markov model of thresholded prediction-error image," in Proc. IEEE Int. Conf. Multimedia Expo, Jul. 2006, pp. 1365-1368. (Pubitemid 46679978)
-
(2006)
2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings
, vol.2006
, pp. 1365-1368
-
-
Zou, D.1
Shi, Y.Q.2
Su, W.3
Xuan, G.4
-
8
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Feb.
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Feb. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
9
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun.
-
J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
10
-
-
84878455879
-
Random projections of residuals as an alternative to co-occurrences in steganalysis
-
Mar.
-
V. Holub, J. Fridrich, and T. Denemark, "Random projections of residuals as an alternative to co-occurrences in steganalysis," Proc. SPIE, vol. 8665, p. 86650L, Mar. 2013.
-
(2013)
Proc. SPIE
, vol.8665
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
11
-
-
84883172225
-
A novel mapping scheme for steganalysis
-
Digital Forensics and Watermaking Berlin, Germany: Springer-Verlag
-
L. Chen, Y. Q. Shi, P. Sutthiwan, and X. Niu, "A novel mapping scheme for steganalysis," in Digital Forensics and Watermaking (Lecture Notes in Computer Science), vol. 7809. Berlin, Germany: Springer-Verlag, 2013, pp. 19-33.
-
(2013)
Lecture Notes in Computer Science
, vol.7809
, pp. 19-33
-
-
Chen, L.1
Shi, Y.Q.2
Sutthiwan, P.3
Niu, X.4
-
12
-
-
85084160704
-
Defending against statistical steganalysis
-
N. Provos, "Defending against statistical steganalysis," in Proc. 10th USENIX, 2001, pp. 323-335.
-
(2001)
Proc. 10th USENIX
, pp. 323-335
-
-
Provos, N.1
-
13
-
-
84937814312
-
F5-A steganographic algorithm
-
Information Hiding Berlin, Germany: Springer-Verlag
-
A. Westfeld, "F5-A steganographic algorithm," in Information Hiding (Lecture Notes in Computer Science), vol. 2137. Berlin, Germany: Springer-Verlag, 2001, pp. 289-302.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
14
-
-
35048819204
-
Model-Based Steganography
-
P. Sallee, "Model-based steganography," in Digital Watermarking (Lecture Notes in Computer Science), vol. 2939. Berlin, Germany: Springer-Verlag, 2003, pp. 154-167. (Pubitemid 38334550)
-
(2003)
Lecture Notes In Computer Science
, Issue.2939
, pp. 154-167
-
-
Sallee, P.1
-
15
-
-
21144432330
-
Steganography with least histogram abnormality
-
Computer Network Security Berlin, Germany: Springer-Verlag
-
X. Zhang, S. Wang, and K. Zhang, "Steganography with least histogram abnormality," in Computer Network Security (Lecture Notes in Computer Science), vol. 2776. Berlin, Germany: Springer-Verlag, 2003, pp. 395-406.
-
(2003)
Lecture Notes in Computer Science
, vol.2776
, pp. 395-406
-
-
Zhang, X.1
Wang, S.2
Zhang, K.3
-
16
-
-
34547514532
-
Secure steganography: Statistical restoration of the second order dependencies for improved security
-
Apr.
-
A. Sarkar, K. Solanki, U. Madhow, S. Chandrasekaran, and B. Manjunath, "Secure steganography: Statistical restoration of the second order dependencies for improved security," in Proc. IEEE ICASSP, vol. 2. Apr. 2007, pp. 277-280.
-
(2007)
Proc. IEEE ICASSP
, vol.2
, pp. 277-280
-
-
Sarkar, A.1
Solanki, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.5
-
18
-
-
79954489095
-
Feature restoration and distortion metrics
-
Jul.
-
V. K. Chonev and A. D. Ker, "Feature restoration and distortion metrics," Proc. SPIE, vol. 7880, pp. 0G01-0G14, Jul. 2011.
-
(2011)
Proc. SPIE
, vol.7880
-
-
Chonev, V.K.1
Ker, A.D.2
-
19
-
-
34548216307
-
Practical methods for minimizing embedding impact in steganography
-
Jun.
-
J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography," Proc. SPIE, vol. 6505, pp. 0201-0215, Jun. 2007.
-
(2007)
Proc. SPIE
, vol.6505
, pp. 0201-0215
-
-
Fridrich, J.1
Filler, T.2
-
20
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Berlin, Germany: Springer-Verlag
-
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 6387. Berlin, Germany: Springer-Verlag, 2010, pp. 161-177.
-
(2010)
Information Hiding (Lecture Notes in Computer Science)
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
21
-
-
78149255931
-
Gibbs construction in steganography
-
Dec.
-
T. Filler and J. Fridrich, "Gibbs construction in steganography," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 705-720
-
-
Filler, T.1
Fridrich, J.2
-
22
-
-
84863942032
-
New channel selection rule for JPEG steganography
-
Aug.
-
F. Huang, J. Huang, and Y.-Q. Shi, "New channel selection rule for JPEG steganography," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1181-1191, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1181-1191
-
-
Huang, F.1
Huang, J.2
Shi, Y.-Q.3
-
23
-
-
84874023671
-
An efficient JPEG steganographic scheme using uniform embedding
-
Dec.
-
L. Guo, J. Ni, and Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in Proc. IEEE Int. Workshop Inf. Forensics Security, Dec. 2012, pp. 169-174.
-
(2012)
Proc. IEEE Int. Workshop Inf. Forensics Security
, pp. 169-174
-
-
Guo, L.1
Ni, J.2
Shi, Y.Q.3
-
26
-
-
84889632364
-
Multivariate Gaussian model for designing additive distortion for steganography
-
May
-
J. Fridrich and J. Kodovský, "Multivariate Gaussian model for designing additive distortion for steganography," in Proc. IEEE ICASSP, May 2013, pp. 2949-2953.
-
(2013)
Proc. IEEE ICASSP
, pp. 2949-2953
-
-
Fridrich, J.1
Kodovský, J.2
-
27
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Berlin, Germany: Springer-Verlag
-
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 4437. Berlin, Germany: Springer-Verlag, 2007, pp. 314-327.
-
(2007)
Information Hiding (Lecture Notes in Computer Science)
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
28
-
-
70350449404
-
Fast BCH syndrome coding for steganography
-
Berlin, Germany: Springer-Verlag
-
R. Zhang, V. Sachnev, and H. Kim, "Fast BCH syndrome coding for steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 5806. Berlin, Germany: Springer-Verlag, 2009, pp. 48-58.
-
(2009)
Information Hiding (Lecture Notes in Computer Science)
, vol.5806
, pp. 48-58
-
-
Zhang, R.1
Sachnev, V.2
Kim, H.3
-
29
-
-
77949520885
-
Near-optimal codes for information embedding in gray-scale signals
-
Mar.
-
W. Zhang, X. Zhang, and S. Wang, "Near-optimal codes for information embedding in gray-scale signals," IEEE Trans. Inf. Theory, vol. 56, no. 3, pp. 1262-1270, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.3
, pp. 1262-1270
-
-
Zhang, W.1
Zhang, X.2
Wang, S.3
-
30
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
Mar.
-
T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920-935, Mar. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 920-935
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
31
-
-
70350440358
-
Estimating steganographic Fisher information in real images
-
Information Hiding Berlin, Germany: Springer-Verlag
-
A. D. Ker, "Estimating steganographic Fisher information in real images," in Information Hiding (Lecture Notes in Computer Science), vol. 5806. Berlin, Germany: Springer-Verlag, 2009, pp. 73-88.
-
(2009)
Lecture Notes in Computer Science
, vol.5806
, pp. 73-88
-
-
Ker, A.D.1
-
32
-
-
70350445582
-
Fisher information determines capacity of secure steganography
-
Information Hiding Berlin, Germany: Springer-Verlag
-
T. Filler and J. Fridrich, "Fisher information determines capacity of secure steganography," in Information Hiding, (Lecture Notes in Computer Science), vol. 5806. Berlin, Germany: Springer-Verlag, 2009, pp. 31-47.
-
(2009)
Lecture Notes in Computer Science
, vol.5806
, pp. 31-47
-
-
Filler, T.1
Fridrich, J.2
-
33
-
-
0037854454
-
The duality between information embedding and source coding with side information and some applications
-
May
-
R. Barron, B. Chen, and G. W. Wornell, "The duality between information embedding and source coding with side information and some applications," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1159-1180, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1159-1180
-
-
Barron, R.1
Chen, B.2
Wornell, G.W.3
-
34
-
-
80053005547
-
Break our steganographic system: The ins and outs of organizing BOSS
-
Information Hiding Berlin, Germany: Springer-Verlag
-
P. Bas, T. Filler, and T. Pevný, "'Break our steganographic system': The ins and outs of organizing BOSS," in Information Hiding (Lecture Notes in Computer Science), vol. 6958. Berlin, Germany: Springer-Verlag, 2011, pp. 59-70.
-
(2011)
Lecture Notes in Computer Science
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
35
-
-
33645814428
-
LSB matching revisited
-
May
-
J. Mielikainen, "LSB matching revisited," IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285-287, May 2006.
-
(2006)
IEEE Signal Process. Lett.
, vol.13
, Issue.5
, pp. 285-287
-
-
Mielikainen, J.1
-
36
-
-
47349094397
-
Efficient steganographic embedding by exploiting modification direction
-
Nov.
-
X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Lett., vol. 10, no. 11, pp. 781-783, Nov. 2006.
-
(2006)
IEEE Commun. Lett.
, vol.10
, Issue.11
, pp. 781-783
-
-
Zhang, X.1
Wang, S.2
-
37
-
-
21844470700
-
Writing on wet paper
-
DOI 10.1109/TSP.2005.855393
-
J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on wet paper," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 3923-3935, Oct. 2005. (Pubitemid 41638244)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
39
-
-
80054777166
-
On dangers of overtraining steganography to incomplete cover model
-
J. Kodovský, J. Fridrich, and V. Holub, "On dangers of overtraining steganography to incomplete cover model," in Proc. 13th ACM Multimedia Workshop Multimedia Security, 2011, pp. 69-76.
-
(2011)
Proc. 13th ACM Multimedia Workshop Multimedia Security
, pp. 69-76
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
40
-
-
84904695227
-
Improved steganographic embedding using feature restoration
-
Oxford, U.K., Tech. Rep.
-
V. K. Chonev, "Improved steganographic embedding using feature restoration," Oxford Univ. Comput. Lab., Oxford, U.K., Tech. Rep., 2010.
-
(2010)
Oxford Univ. Comput. Lab.
-
-
Chonev, V.K.1
-
41
-
-
33750058556
-
A pseudo-hilbert scan algorithm for arbitrarily-sized rectangle region
-
Advances in Machine Vision, Image Processing, and Pattern Analysis - International Workshop on Intelligent Computing in Pattern Analysis/Synthesis, IWICPAS 2006, Proceedings
-
J. Zhang, S. Kamata, and Y. Ueshige, "A pseudo-Hilbert scan algorithm for arbitrarily-sized rectangle region," in Advances in Machine Vision, Image Processing, and Pattern Analysis (Lecture Notes in Computer Science), vol. 4153. Berlin, Germany: Springer-Verlag, 2006, pp. 290-299. (Pubitemid 44577688)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4153
, pp. 290-299
-
-
Zhang, J.1
Kamata, S.-I.2
Ueshige, Y.3
-
42
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
Mar.
-
A. D. Ker and R. Bohme, "Revisiting weighted stego-image steganalysis," Proc. SPIE, vol. 6819, pp. 05-1-05-17, Mar. 2008.
-
(2008)
Proc. SPIE
, vol.6819
, pp. 051-0517
-
-
Ker, A.D.1
Bohme, R.2
-
43
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
Jul.
-
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Jul. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
44
-
-
84858225018
-
Optimizing pixel predictors for steganalysis
-
Feb.
-
V. Holub and J. Fridrich, "Optimizing pixel predictors for steganalysis," Proc. SPIE, vol. 8303, pp. 0901-0913, Feb. 2012.
-
(2012)
Proc. SPIE
, vol.8303
, pp. 0901-0913
-
-
Holub, V.1
Fridrich, J.2
|