-
1
-
-
0034775171
-
Steganalysis of watermarking techniques using image quality metrics
-
Jan
-
I. Avcibas, N. D. Memon, and B. Sankur, "Steganalysis of watermarking techniques using image quality metrics," Proc. SPIE, vol. 4314, pp. 523-531, Jan. 2001.
-
(2001)
Proc. SPIE
, vol.4314
, pp. 523-531
-
-
Avcibas, I.1
Memon, N.D.2
Sankur, B.3
-
2
-
-
80053005547
-
Break our steganographic system': The ins and outs of organizing BOSS
-
May
-
P. Bas, T. Filler, and T. Pevný, "'Break our steganographic system': The ins and outs of organizing BOSS," in Proc. 13th Int. Conf. Inf. Hiding, Prague, Czech Republic, May 2011, pp. 59-70.
-
(2011)
Proc. 13th Int. Conf. Inf. Hiding, Prague, Czech Republic
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
3
-
-
78149474833
-
An ensemble of classifiers approach to steganalysis
-
Aug
-
S. Bayram, A. E. Dirik, H. T. Sencar, and N. Memon, "An ensemble of classifiers approach to steganalysis," in Proc. 20th Int. Conf. Pattern Recognit. (ICPR), Istanbul, Turkey, Aug. 2010, pp. 4376-4379.
-
(2010)
Proc. 20th Int. Conf. Pattern Recognit. (ICPR), Istanbul, Turkey
, pp. 4376-4379
-
-
Bayram, S.1
Dirik, A.E.2
Sencar, H.T.3
Memon, N.4
-
4
-
-
56749107134
-
Weighted stego-image steganalysis for JPEG covers
-
Jun
-
R. Böhme, "Weighted stego-image steganalysis for JPEG covers," in Proc. 10th Int. Workshop Inf. Hiding, vol. 5284, pp. 178-194, Jun. 2007.
-
(2007)
Proc. 10th Int. Workshop Inf. Hiding
, vol.5284
, pp. 178-194
-
-
Böhme, R.1
-
5
-
-
0030211964
-
Bagging predictors
-
Aug
-
L. Breiman, "Bagging predictors," Mach. Learn., vol. 24, no. 2, pp. 123-140, Aug. 1996.
-
(1996)
Mach. Learn.
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
6
-
-
51749089283
-
JPEG image steganalysis utilizing both intrablock and interblock correlations
-
May
-
C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), Seattle, WA, USA, May 2008, pp. 3029-3032.
-
(2008)
Proc IEEE Int. Symp. Circuits Syst. (ISCAS), Seattle, WA, USA
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.Q.2
-
7
-
-
84874590883
-
Application of hypothesis testing theory for optimal detection of LSB matching data hiding
-
Jul
-
R. Cogranne and F. Retraint, "Application of hypothesis testing theory for optimal detection of LSB matching data hiding," Signal Process., vol. 93, no. 7, pp. 1724-1737, Jul. 2013.
-
(2013)
Signal Process.
, vol.93
, Issue.7
, pp. 1724-1737
-
-
Cogranne, R.1
Retraint, F.2
-
8
-
-
35248846436
-
Detecting hidden messages using higher-order statistics and support vector machines
-
Oct
-
H. Farid and L. Siwei, "Detecting hidden messages using higher-order statistics and support vector machines," in Proc. 5th Int. Workshop Inf. Hiding, Oct. 2002, pp. 340-354.
-
(2002)
Proc. 5th Int. Workshop Inf. Hiding
, pp. 340-354
-
-
Farid, H.1
Siwei, L.2
-
9
-
-
35248884299
-
Steganalysis of JPEG images: Breaking the F5 algorithm
-
Oct
-
J. Fridrich, M. Goljan, and D. Hogea, "Steganalysis of JPEG images: Breaking the F5 algorithm," in Proc. 5th Int. Workshop Inf. Hiding, Oct. 2002, pp. 310-323.
-
(2002)
Proc. 5th Int. Workshop Inf. Hiding
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
10
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun
-
J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
11
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
Sep
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th ACM Multimedia Security Workshop, Sep. 2007, pp. 3-14.
-
(2007)
Proc. 9th ACM Multimedia Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
12
-
-
84874023671
-
An efficient JPEG steganographic scheme using uniform embedding
-
Dec
-
L. Guo, J. Ni, and Y.-Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in Proc. 4th IEEE Int. Workshop Inf. Forensics Security, Tenerife, Spain, Dec. 2012, pp. 169-174.
-
(2012)
Proc. 4th IEEE Int. Workshop Inf. Forensics Security, Tenerife, Spain
, pp. 169-174
-
-
Guo, L.1
Ni, J.2
Shi, Y.-Q.3
-
13
-
-
84888323613
-
Random projections of residuals for digital image steganalysis
-
Dec
-
V. Holub and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1996-2006, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 1996-2006
-
-
Holub, V.1
Fridrich, J.2
-
14
-
-
84894039003
-
Universal distortion design for steganography in an arbitrary domain
-
V. Holub and J. Fridrich, "Universal distortion design for steganography in an arbitrary domain," EURASIP J. Inf. Security, vol. 2014, no. 1, pp. 1-13, 2014.
-
(2014)
EURASIP J. Inf. Security
, vol.2014
, Issue.1
, pp. 1-13
-
-
Holub, V.1
Fridrich, J.2
-
15
-
-
84863942032
-
New channel selection rule for JPEG steganography
-
Aug
-
F. Huang, J. Huang, and Y.-Q. Shi, "New channel selection rule for JPEG steganography," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1181-1191, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1181-1191
-
-
Huang, F.1
Huang, J.2
Shi, Y.-Q.3
-
16
-
-
84900434217
-
Implementing the projected spatial rich features on a GPU
-
Feb
-
A. D. Ker, "Implementing the projected spatial rich features on a GPU," Proc. SPIE, vol. 9028, pp. 1801-1810, Feb. 2014.
-
(2014)
Proc. SPIE
, vol.9028
, pp. 1801-1810
-
-
Ker, A.D.1
-
17
-
-
84858188731
-
Identifying a steganographer in realistic and heterogeneous data sets
-
Jan
-
A. D. Ker and T. Pevný, "Identifying a steganographer in realistic and heterogeneous data sets," Proc. SPIE, vol. 8303, pp. 83030N-1-83030N-13, Jan. 2012.
-
(2012)
Proc. SPIE
, vol.8303
, pp. 83030N1-83030N13
-
-
Ker, A.D.1
Pevný, T.2
-
19
-
-
78649425529
-
Quantitative structural steganalysis of Jsteg
-
Dec
-
J. Kodovský and J. Fridrich, "Quantitative structural steganalysis of Jsteg," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 681-693, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 681-693
-
-
Kodovský, J.1
Fridrich, J.2
-
20
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
Jan
-
J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, pp. 83030A-1-83030A-13, Jan. 2012.
-
Proc. SPIE
, vol.8303
, Issue.2012
, pp. 83030A1-83030A13
-
-
Kodovský, J.1
Fridrich, J.2
-
21
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
Apr
-
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
22
-
-
84878432433
-
A cost-effective decision tree based approach to steganalysis
-
Feb
-
L. Li, H. T. Sencar, and N. Memon, "A cost-effective decision tree based approach to steganalysis," Proc. SPIE, vol. 8665, pp. 86650P-1-86650P-7, Feb. 2013.
-
(2013)
Proc. SPIE
, vol.8665
, pp. 86650P1-86650P7
-
-
Li, L.1
Sencar, H.T.2
Memon, N.3
-
23
-
-
80054778699
-
Steganalysis of DCT-embedding based adaptive steganography and YASS
-
Sep
-
Q. Liu, "Steganalysis of DCT-embedding based adaptive steganography and YASS," in Proc. 13th ACM Multimedia Security Workshop, Sep. 2011, pp. 77-86.
-
(2011)
Proc. 13th ACM Multimedia Security Workshop
, pp. 77-86
-
-
Liu, Q.1
-
24
-
-
84925137351
-
Improved approaches to steganalysis and seamcarved forgery detection in JPEG images
-
Q. Liu and Z. Chen, "Improved approaches to steganalysis and seamcarved forgery detection in JPEG images," ACM Trans. Intell. Syst. Tech. Syst., vol. 5, no. 4, pp. 39:1-39:30, 2014.
-
(2014)
ACM Trans. Intell. Syst. Tech. Syst.
, vol.5
, Issue.4
, pp. 391-3930
-
-
Liu, Q.1
Chen, Z.2
-
25
-
-
84858252960
-
Going from small to large data in steganalysis
-
Jan
-
I. Lubenko and A. D. Ker, "Going from small to large data in steganalysis," Proc. SPIE, vol. 8303, pp. 83030M-1-83030M-10, Jan. 2012.
-
(2012)
Proc. SPIE
, vol.8303
, pp. 83030M1-83030M10
-
-
Lubenko, I.1
Ker, A.D.2
-
26
-
-
33644999904
-
Steganalysis using higher-order image statistics
-
Mar
-
S. Lyu and H. Farid, "Steganalysis using higher-order image statistics," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111-119, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 111-119
-
-
Lyu, S.1
Farid, H.2
-
27
-
-
34548232251
-
Merging Markov and DCT features for multi-class JPEG steganalysis
-
Feb
-
T. Pevný and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG steganalysis," Proc. SPIE, vol. 6505, pp. 650503-1-650503-14, Feb. 2007.
-
(2007)
Proc. SPIE
, vol.6505
, pp. 6505031-65050314
-
-
Pevný, T.1
Fridrich, J.2
-
29
-
-
38049166461
-
A markov process based approach to effective attacking JPEG steganography
-
Jul
-
Y. Q. Shi, C. Chen, and W. Chen, "A Markov process based approach to effective attacking JPEG steganography," in Proc. 8th Int. Workshop Inf. Hiding, Jul. 2006, pp. 249-264.
-
(2006)
Proc. 8th Int. Workshop Inf. Hiding
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
30
-
-
84898049332
-
Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm
-
May
-
T. H. Thai, R. Cogranne, and F. Retraint, "Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm," IEEE Trans. Image Process., vol. 23, no. 5, pp. 1980-1993, May 2014.
-
(2014)
IEEE Trans. Image Process.
, vol.23
, Issue.5
, pp. 1980-1993
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
31
-
-
85099425940
-
Generic adoption of spatial steganalysis to transformed domain
-
Jun
-
A. Westfeld, "Generic adoption of spatial steganalysis to transformed domain," in Proc. 10th Int. Workshop Inf. Hiding, Jun. 2007, pp. 161-177.
-
(2007)
Proc. 10th Int. Workshop Inf. Hiding
, pp. 161-177
-
-
Westfeld, A.1
-
33
-
-
0038675417
-
A fast and effective steganalytic technique against JSteg-like algorithms
-
Mar
-
T. Zhang and X. Ping, "A fast and effective steganalytic technique against JSteg-like algorithms," in Proc. ACM Symp. Appl. Comput., Melbourne, FL, USA, Mar. 2003, pp. 307-311.
-
(2003)
Proc ACM Symp. Appl. Comput., Melbourne, FL, USA
, pp. 307-311
-
-
Zhang, T.1
Ping, X.2
-
34
-
-
84867593807
-
Hidden information detection based on quantized Laplacian distribution
-
Mar
-
C. Zitzmann, R. Cogranne, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu, "Hidden information detection based on quantized Laplacian distribution," in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 2012, pp. 1793-1796.
-
(2012)
Proc IEEE ICASSP, Kyoto, Japan
, pp. 1793-1796
-
-
Zitzmann, C.1
Cogranne, R.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
|