-
1
-
-
80053005547
-
Break our steganographic system - The ins and outs of organizing BOSS
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Prague, Czech Republic, May 18-20
-
P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Information Hiding, 13th International Conference, Volume 6958 of Lecture Notes in Computer Science
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
2
-
-
51749089283
-
JPEG image steganalysis utilizing both intrablock and interblock correlations
-
Seattle, WA, May, 18-21
-
C. Chen and Y. Q. Shi. JPEG image steganalysis utilizing both intrablock and interblock correlations. In Circuits and Systems, ISCAS 2008. IEEE International Symposium on, pages 3029-3032, Seattle, WA, May, 18-21, 2008.
-
(2008)
Circuits and Systems, ISCAS 2008. IEEE International Symposium on
, pp. 3029-3032
-
-
Chen, C.1
Shi, Y.Q.2
-
4
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
J. Dittmann and J. Fridrich, editors, Dallas, TX, September 20-21
-
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
5
-
-
84874023671
-
An efficient JPEG steganographic scheme using uniform embedding
-
Tenerife, Spain, December 2-5
-
L. Guo, J. Ni, and Y.-Q. Shi. An efficient JPEG steganographic scheme using uniform embedding. In Fourth IEEE International Workshop on Information Forensics and Security, Tenerife, Spain, December 2-5, 2012.
-
(2012)
Fourth IEEE International Workshop on Information Forensics and Security
-
-
Guo, L.1
Ni, J.2
Shi, Y.-Q.3
-
6
-
-
84899516063
-
Uniform embedding for efficient JPEG steganography
-
May
-
L. Guo, J. Ni, and Y.-Q. Shi. Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security, 9(5):814-825, May 2014.
-
(2014)
IEEE Transactions on Information Forensics and Security
, vol.9
, Issue.5
, pp. 814-825
-
-
Guo, L.1
Ni, J.2
Shi, Y.-Q.3
-
7
-
-
84880061681
-
Digital image steganography using universal distortion
-
W. Puech, M. Chaumont, J. Dittmann, and P. Campisi, editors, Montpellier, France, June 17-19
-
V. Holub and J. Fridrich. Digital image steganography using universal distortion. In W. Puech, M. Chaumont, J. Dittmann, and P. Campisi, editors, 1st ACM IH&MMSec. Workshop, Montpellier, France, June 17-19, 2013.
-
(2013)
1st ACM IH&MMSec. Workshop
-
-
Holub, V.1
Fridrich, J.2
-
9
-
-
84900391883
-
Challenging the doctrines of JPEG steganography
-
A. Alattar, N. D. Memon, and C. Heitzenrater, editors, San Francisco, CA, February 2-6
-
V. Holub and J. Fridrich. Challenging the doctrines of JPEG steganography. In A. Alattar, N. D. Memon, and C. Heitzenrater, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, volume 9028, pages 02 1-8, San Francisco, CA, February 2-6, 2014.
-
(2014)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014
, vol.9028
, pp. 1-8
-
-
Holub, V.1
Fridrich, J.2
-
10
-
-
84920768177
-
Low complexity features for JPEG steganalysis using undecimated DCT
-
February
-
V. Holub and J. Fridrich. Low complexity features for JPEG steganalysis using undecimated DCT. IEEE Transactions on Information Forensics and Security, 10(2):219-228, February 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.2
, pp. 219-228
-
-
Holub, V.1
Fridrich, J.2
-
12
-
-
84863942032
-
New channel selection rule for JPEG steganography
-
August
-
F. Huang, J. Huang, and Y.-Q. Shi. New channel selection rule for JPEG steganography. IEEE Transactions on Information Forensics and Security, 7(4):1181-1191, August 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.4
, pp. 1181-1191
-
-
Huang, F.1
Huang, J.2
Shi, Y.-Q.3
-
13
-
-
42949088538
-
Revisiting weighted stego-image steganalysis
-
E. J. Delp, P. W. Wong, J. Dittmann, and N. D. Memon, editors, San Jose, CA, January 27-31
-
A. D. Ker and R. Böhme. Revisiting weighted stego-image steganalysis. In E. J. Delp, P. W. Wong, J. Dittmann, and N. D. Memon, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1-17, San Jose, CA, January 27-31, 2008.
-
(2008)
Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 1-17
-
-
Ker, A.D.1
Böhme, R.2
-
14
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
A. Alattar, N. D. Memon, and E. J. Delp, editors, San Francisco, CA, January 23-26
-
J. Kodovský and J. Fridrich. Steganalysis of JPEG images using rich models. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012, volume 8303, pages 0A 1-13, San Francisco, CA, January 23-26, 2012.
-
(2012)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012
, vol.8303
, pp. 0A1-13
-
-
Kodovský, J.1
Fridrich, J.2
-
15
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432-444, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
16
-
-
80054778699
-
Steganalysis of DCT-embedding based adaptive steganography and YASS
-
J. Dittmann, S. Craver, and C. Heitzenrater, editors, Niagara Falls, NY, September 29-30
-
Q. Liu. Steganalysis of DCT-embedding based adaptive steganography and YASS. In J. Dittmann, S. Craver, and C. Heitzenrater, editors, Proceedings of the 13th ACM Multimedia & Security Workshop, pages 77-86, Niagara Falls, NY, September 29-30, 2011.
-
(2011)
Proceedings of the 13th ACM Multimedia & Security Workshop
, pp. 77-86
-
-
Liu, Q.1
-
17
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Alexandria, VA, July 10-12. Springer-Verlag, New York
-
Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249-264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
-
(2006)
Information Hiding, 8th International Workshop, Volume 4437 of Lecture Notes in Computer Science
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
-
18
-
-
84898049332
-
Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm
-
May
-
T. Thai, R. Cogranne, and F. Retraint. Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm. Image Processing, IEEE Transactions on, 23(5):1-14, May 2014.
-
(2014)
Image Processing, IEEE Transactions on
, vol.23
, Issue.5
, pp. 1-14
-
-
Thai, T.1
Cogranne, R.2
Retraint, F.3
-
20
-
-
84867591559
-
An efficient JPEG steganographic scheme based on the blockentropy of DCT coefficents
-
Kyoto, Japan, March 25-30
-
C. Wang and J. Ni. An efficient JPEG steganographic scheme based on the blockentropy of DCT coefficents. In Proc. of IEEE ICASSP, Kyoto, Japan, March 25-30, 2012.
-
(2012)
Proc. of IEEE ICASSP
-
-
Wang, C.1
Ni, J.2
-
21
-
-
0005105932
-
High capacity despite better steganalysis (F5 - A steganographic algorithm)
-
I. S. Moskowitz, editor, Pittsburgh, PA, April 25-27. Springer-Verlag, New York
-
A. Westfeld. High capacity despite better steganalysis (F5 - a steganographic algorithm). In I. S. Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 289-302, Pittsburgh, PA, April 25-27, 2001. Springer-Verlag, New York.
-
(2001)
Information Hiding, 4th International Workshop, Volume 2137 of Lecture Notes in Computer Science
, pp. 289-302
-
-
Westfeld, A.1
-
22
-
-
84867593807
-
Hidden information detection based on quantized Laplacian distribution
-
Kyoto, Japan, March 25-30
-
C. Zitzmann, R. Cogranne, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu. Hidden information detection based on quantized Laplacian distribution. In Proc. IEEE ICASSP, Kyoto, Japan, March 25-30, 2012.
-
(2012)
Proc. IEEE ICASSP
-
-
Zitzmann, C.1
Cogranne, R.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
|