-
1
-
-
80053005547
-
Break our steganographic system - The ins and outs of organizing BOSS
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Prague, Czech Republic, May 18-20
-
P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Information Hiding, 13th International Conference, Volume 6958 of Lecture Notes in Computer Science
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
2
-
-
84883172225
-
A novel mapping scheme for steganalysis
-
Y. Q. Shi, F. Pérez-Gonzáles, and H. J. Kim, editors, Shanghai, China, October 31-November 3. Springer-Verlag, New York
-
L. Chen, Y. Q. Shi, P. Sutthiwan, and X. Niu. A novel mapping scheme for steganalysis. In Y. Q. Shi, F. Pérez-Gonzáles, and H. J. Kim, editors, Proc. 11th International Workshop on Digital-Forensics and Watermarking, volume 7809 of Lecture Notes in Computer Science, pages 19-33, Shanghai, China, October 31-November 3, 2012. Springer-Verlag, New York.
-
(2012)
Proc. 11th International Workshop on Digital-Forensics and Watermarking, Volume 7809 of Lecture Notes in Computer Science
, pp. 19-33
-
-
Chen, L.1
Shi, Y.Q.2
Sutthiwan, P.3
Niu, X.4
-
4
-
-
84887312389
-
Statistical detection of defects in radiographic images using an adaptive parametric model
-
R. Cogranne and F. Retraint. Statistical detection of defects in radiographic images using an adaptive parametric model. Signal Processing, 96-B(3):173-189, 2014.
-
(2014)
Signal Processing
, vol.96 B
, Issue.3
, pp. 173-189
-
-
Cogranne, R.1
Retraint, F.2
-
6
-
-
80052987721
-
A cover image model for reliable steganalysis
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20
-
R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, and P. Cornu. A cover image model for reliable steganalysis. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, Lecture Notes in Computer Science, pages 178-192, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Information Hiding, 13th International Conference
, pp. 178-192
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
7
-
-
84929231486
-
Selection-channel-aware rich model for steganalysis of digital images
-
Atlanta, GA, USA, December 3-5
-
T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich. Selection-channel-aware rich model for steganalysis of digital images. In Sixth IEEE International Workshop on Information Forensics and Security, Atlanta, GA, USA, December 3-5 2014.
-
(2014)
Sixth IEEE International Workshop on Information Forensics and Security
-
-
Denemark, T.1
Sedighi, V.2
Holub, V.3
Cogranne, R.4
Fridrich, J.5
-
8
-
-
78149253209
-
Steganography using gibbs random fields
-
J. Dittmann, S. Craver, and P. Campisi, editors, Rome, Italy, September 9-10. ACM
-
T. Filler and J. Fridrich. Steganography using Gibbs random fields. In J. Dittmann, S. Craver, and P. Campisi, editors, Proceedings of the 12th ACM Multimedia & Security Workshop, pages 199-212, Rome, Italy, September 9-10, 2010. ACM.
-
(2010)
Proceedings of the 12th ACM Multimedia & Security Workshop
, pp. 199-212
-
-
Filler, T.1
Fridrich, J.2
-
9
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
September
-
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(3):920-935, September 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 920-935
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
10
-
-
70350562893
-
The square root law of steganographic capacity for markov covers
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Jose, CA, January 18-21
-
T. Filler, A. D. Ker, and J. Fridrich. The Square Root Law of steganographic capacity for Markov covers. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Media Forensics and Security, volume 7254, pages 08 1-11, San Jose, CA, January 18-21, 2009.
-
(2009)
Proceedings SPIE, Electronic Imaging, Media Forensics and Security
, vol.7254
, pp. 1-11
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
12
-
-
84889632364
-
Multivariate gaussian model for designing additive distortion for steganography
-
Vancouver, BC, May 26-31
-
J. Fridrich and J. Kodovský. Multivariate Gaussian model for designing additive distortion for steganography. In Proc. IEEE ICASSP, Vancouver, BC, May 26-31, 2013.
-
(2013)
Proc. IEEE ICASSP
-
-
Fridrich, J.1
Kodovský, J.2
-
14
-
-
0003984062
-
-
JCD Publishing & SPIE Press, USA, 2nd edition
-
G. C. Holst. CCD Arrays, Cameras, and Displays. JCD Publishing & SPIE Press, USA, 2nd edition, 1998.
-
(1998)
CCD Arrays, Cameras, and Displays
-
-
Holst, G.C.1
-
18
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432-444, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
20
-
-
84904685564
-
Investigation on cost assignment in spatial image steganography
-
August
-
B. Li, S. Tan, M. Wang, and J. Huang. Investigation on cost assignment in spatial image steganography. IEEE Transactions on Information Forensics and Security, 9(8):1264-1277, August 2014.
-
(2014)
IEEE Transactions on Information Forensics and Security
, vol.9
, Issue.8
, pp. 1264-1277
-
-
Li, B.1
Tan, S.2
Wang, M.3
Huang, J.4
-
21
-
-
84983146156
-
A new cost function for spatial image steganography
-
Paris, France, October 27-30
-
B. Li, M. Wang, and J. Huang. A new cost function for spatial image steganography. In Proceedings IEEE, International Conference on Image Processing, ICIP, Paris, France, October 27-30, 2014.
-
(2014)
Proceedings IEEE, International Conference on Image Processing, ICIP
-
-
Li, B.1
Wang, M.2
Huang, J.3
-
22
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
R. Böhme and R. Safavi-Naini, editors, Calgary, Canada, June 28-30. Springer-Verlag, New York
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Conference, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
-
(2010)
Information Hiding, 12th International Conference, Volume 6387 of Lecture Notes in Computer Science
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
23
-
-
84927741168
-
Adaptive steganalysis against WOW embedding algorithm
-
A. Uhl, S. Katzenbeisser, R. Kwitt, and A. Piva, editors, Salzburg, Austria, June 11-13
-
W. Tang, H. Li, W. Luo, and J. Huang. Adaptive steganalysis against WOW embedding algorithm. In A. Uhl, S. Katzenbeisser, R. Kwitt, and A. Piva, editors, 2nd ACM IH&MMSec. Workshop, Salzburg, Austria, June 11-13, 2014.
-
(2014)
2nd ACM IH&MMSec. Workshop
-
-
Tang, W.1
Li, H.2
Luo, W.3
Huang, J.4
|