-
2
-
-
84880060316
-
Moving steganography and steganalysis from the laboratory into the real world
-
New York, NY, USA: ACM
-
A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevný. "Moving steganography and steganalysis from the laboratory into the real world". in Proceedings of the first ACM workshop on Information hiding and multimedia security, ser. IH&MMSec '13. New York, NY, USA: ACM, 2013, pp. 45-58
-
(2013)
Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, ser IH&MMSec '13
, pp. 45-58
-
-
Ker, A.D.1
Bas, P.2
Böhme, R.3
Cogranne, R.4
Craver, S.5
Filler, T.6
Fridrich, J.7
Pevný., T.8
-
3
-
-
84873683899
-
An asymptotically uniformly most powerful test for lsb matching detection
-
March
-
R. Cogranne and F. Retraint. "An asymptotically uniformly most powerful test for lsb matching detection". Information Forensics and Security, IEEE Transactions on, vol. 8, no. 3, pp. 464-476, March 2013
-
(2013)
Information Forensics and Security, IEEE Transactions on
, vol.8
, Issue.3
, pp. 464-476
-
-
Cogranne, R.1
Retraint, F.2
-
4
-
-
84894239822
-
A local adaptive model of natural images for almost optimal detection of hidden data
-
R. Cogranne, C. Zitzmann, F. Retraint, I. V. Nikiforov, P. Cornu, and L. Fillatre. "A local adaptive model of natural images for almost optimal detection of hidden data". Signal Processing, vol. 100, pp. 169-185, 2014
-
(2014)
Signal Processing
, vol.100
, pp. 169-185
-
-
Cogranne, R.1
Zitzmann, C.2
Retraint, F.3
Nikiforov, I.V.4
Cornu, P.5
Fillatre, L.6
-
6
-
-
84898049332
-
Statistical model of quantized DCT coefficients: Application in the steganalysis of JSteg algorithm
-
T. H. Thai, R. Cogranne, and F. Retraint. "Statistical model of quantized DCT coefficients: Application in the steganalysis of JSteg algorithm". Image Processing, IEEE Transactions on, vol. 23, no. 5, pp. 1-14, 2014
-
(2014)
Image Processing IEEE Transactions on
, vol.23
, Issue.5
, pp. 1-14
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
7
-
-
80053047483
-
Steganalysis of content-adaptive steganography in spatial domain
-
T. Filler, T. Pevny, S. Craver, and A. Ker, Eds. Springer Berlin Heidelberg
-
J. Fridrich, J. Kodovsky, V. Holub, and M. Goljan. "Steganalysis of content-adaptive steganography in spatial domain". in Information Hiding, ser. Lecture Notes in Computer Science, T. Filler, T. Pevny, S. Craver, and A. Ker, Eds., vol. 6958. Springer Berlin Heidelberg, 2011, pp. 102-117
-
(2011)
Information Hiding, ser Lecture Notes in Computer Science
, vol.6958
, pp. 102-117
-
-
Fridrich, J.1
Kodovsky, J.2
Holub, V.3
Goljan, M.4
-
8
-
-
80053005547
-
Break our steganographic system- The ins and outs of organizing boss
-
Prague, Czech Republic: LNCS vol.6958, Springer-Verlag, New York, May 18-20
-
P. Bas, T. Filler, and T. Pevný. "Break our steganographic system- the ins and outs of organizing boss". in Information Hiding, 13th International Workshop, ser. Lecture Notes in Computer Science. Prague, Czech Republic: LNCS vol.6958, Springer-Verlag, New York, May 18-20, 2011, pp. 59-70
-
(2011)
Information Hiding, 13th International Workshop, Ser. Lecture Notes in Computer Science
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný., T.3
-
9
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
April
-
J. Kodovsky, J. Fridrich, and V. Holub. "Ensemble classifiers for steganalysis of digital media". Information Forensics and Security, IEEE Transactions on, vol. 7, no. 2, pp. 432-444, April 2012
-
(2012)
Information Forensics and Security IEEE Transactions on
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovsky, J.1
Fridrich, J.2
Holub, V.3
-
11
-
-
78149277361
-
Simple algorithmic modifications for improving blind steganalysis performance
-
New York, NY, USA: ACM
-
V. Schwamberger and M. O. Franz. "Simple algorithmic modifications for improving blind steganalysis performance". in Proceedings of the 12th ACM Workshop on Multimedia and Security, ser. MM&Sec '10. New York, NY, USA: ACM, 2010, pp. 225-230
-
(2010)
Proceedings of the 12th ACM Workshop on Multimedia and Security, ser MM&Sec '10
, pp. 225-230
-
-
Schwamberger, V.1
Franz, M.O.2
-
14
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
A. D. Ker. "Batch steganography and pooled steganalysis". in Information Hiding, ser. LNCS, vol. 4437, 2007 pp. 265-281
-
(2007)
Information Hiding, ser LNCS
, vol.4437
, pp. 265-281
-
-
Ker, A.D.1
-
15
-
-
84874034720
-
Designing steganographic distortion using directional filters
-
IEEE International Workshop on, Dec 2012
-
V. Holub and J. Fridrich. "Designing steganographic distortion using directional filters". in Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, Dec 2012, pp. 234-239
-
(2012)
Information Forensics and Security (WIFS
, pp. 234-239
-
-
Holub, V.1
Fridrich, J.2
-
16
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
T. Pevny, P. Bas, and J. Fridrich. "Steganalysis by subtractive pixel adjacency matrix". IEEE Trans. Inform. Forensics and Security, vol. 5, no. 2, pp. 215-224, 2010
-
(2010)
IEEE Trans. Inform. Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
17
-
-
84894039003
-
Universal distortion function for steganography in an arbitrary domain
-
V. Holub, J. Fridrich, and T. Denemark. "Universal distortion function for steganography in an arbitrary domain". EURASIP Journal on Information Security, vol. 2014, no. 1, pp. 1-13, 2014
-
(2014)
Eurasip Journal on Information Security
, vol.2014
, Issue.1
, pp. 1-13
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
18
-
-
84860434682
-
Rich models for steganalysis of digital images
-
june
-
J. Fridrich and J. Kodovsky. "Rich models for steganalysis of digital images". Information Forensics and Security, IEEE Transactions on, vol. 7, no. 3, pp. 868-882, june 2012
-
(2012)
Information Forensics and Security IEEE Transactions on
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovsky, J.2
-
19
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
R. Bhme, P. Fong, and R. Safavi- Naini, Eds. Springer Berlin /Heidelberg
-
T. Pevn, T. Filler, and P. Bas. "Using high-dimensional image models to perform highly undetectable steganography". in Information Hiding, ser. Lecture Notes in Computer Science, R. Bhme, P. Fong, and R. Safavi- Naini, Eds. Springer Berlin /Heidelberg, vol. 6387, pp. 161-177
-
Information Hiding, Ser. Lecture Notes in Computer Science
, vol.6387
, pp. 161-177
-
-
Pevn, T.1
Filler, T.2
Bas, P.3
-
20
-
-
78149255931
-
Gibbs construction in steganography
-
Dec
-
T. Filler and J. Fridrich. "Gibbs construction in steganography". Information Forensics and Security, IEEE Transactions on, vol. 5, no. 4, pp. 705-720, Dec 2010
-
(2010)
Information Forensics and Security IEEE Transactions on
, vol.5
, Issue.4
, pp. 705-720
-
-
Filler, T.1
Fridrich, J.2
-
21
-
-
38849102269
-
Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities
-
New York, NY, USA ACM
-
J. Fridrich, T. Pevný, and J. Kodovský. "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities". in Proceedings of the 9th Workshop on Multimedia & Security, ser. MM&Sec'07. New York, NY, USA: ACM, 2007, pp. 3-14
-
(2007)
Proceedings of the 9th Workshop on Multimedia & Security, ser MM&Sec'07
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
|