-
1
-
-
84894039003
-
Universal distortion function for steganography in an arbitrary domain
-
V. Holub, J. Fridrich, and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP J. Inf. Secur., vol. 2014, no. 1, pp. 1-13, 2014.
-
(2014)
EURASIP J. Inf. Secur.
, vol.2014
, Issue.1
, pp. 1-13
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
2
-
-
84880060316
-
Moving steganography and steganalysis from the laboratory into the real world
-
A. D. Ker et al., "Moving steganography and steganalysis from the laboratory into the real world," in Proc. 1st ACM Workshop Inf. Hiding Multimedia Secur. (IH&MMSec), 2013, pp. 45-58.
-
(2013)
Proc. 1st ACM Workshop Inf. Hiding Multimedia Secur. (IH&MMSec)
, pp. 45-58
-
-
Ker, A.D.1
-
3
-
-
4744365298
-
Detection of hiding in the least significant bit
-
Oct.
-
O. Dabeer, K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath, "Detection of hiding in the least significant bit," IEEE Trans. Signal Process., vol. 52, no. 10, pp. 3046-3058, Oct. 2004.
-
(2004)
IEEE Trans. Signal Process
, vol.52
, Issue.10
, pp. 3046-3058
-
-
Dabeer, O.1
Sullivan, K.2
Madhow, U.3
Chandrasekaran, S.4
Manjunath, B.S.5
-
4
-
-
80052987721
-
A cover image model for reliable steganalysis
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
R. Cogranne, C. Zitzmann, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu, "A cover image model for reliable steganalysis," in Information Hiding (Lecture Notes in Computer Science), vol. 6958. Berlin, Germany: Springer-Verlag, 2011, pp. 178-192.
-
(2011)
Information Hiding
, vol.6958
, pp. 178-192
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
5
-
-
80053026542
-
Statistical decision methods in hidden information detection
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, "Statistical decision methods in hidden information detection," in Information Hiding (Lecture Notes in Computer Science), vol. 6958. Berlin, Germany: Springer-Verlag, 2011, pp. 163-177.
-
(2011)
Information Hiding
, vol.6958
, pp. 163-177
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
-
6
-
-
84894239822
-
A local adaptive model of natural images for almost optimal detection of hidden data
-
Jul.
-
R. Cogranne, C. Zitzmann, F. Retraint, I. V. Nikiforov, P. Cornu, and L. Fillatre, "A local adaptive model of natural images for almost optimal detection of hidden data," Signal Process., vol. 100, pp. 169-185, Jul. 2014.
-
(2014)
Signal Process.
, vol.100
, pp. 169-185
-
-
Cogranne, R.1
Zitzmann, C.2
Retraint, F.3
Nikiforov, I.V.4
Cornu, P.5
Fillatre, L.6
-
7
-
-
84891310555
-
Statistical detection of data hidden in least significant bits of clipped images
-
May
-
T. H. Thai, F. Retraint, and R. Cogranne, "Statistical detection of data hidden in least significant bits of clipped images," Signal Process., vol. 98, pp. 263-274, May 2014.
-
(2014)
Signal Process.
, vol.98
, pp. 263-274
-
-
Thai, T.H.1
Retraint, F.2
Cogranne, R.3
-
8
-
-
84873683899
-
An asymptotically uniformly most powerful test for LSB matching detection
-
Mar.
-
R. Cogranne and F. Retraint, "An asymptotically uniformly most powerful test for LSB matching detection," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 464-476, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 464-476
-
-
Cogranne, R.1
Retraint, F.2
-
9
-
-
84867593807
-
Hidden information detection based on quantized Laplacian distribution
-
Mar.
-
C. Zitzmann, R. Cogranne, L. Fillatre, I. Nikiforov, F. Retraint, and P. Cornu, "Hidden information detection based on quantized Laplacian distribution," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Mar. 2012, pp. 1793-1796.
-
(2012)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP)
, pp. 1793-1796
-
-
Zitzmann, C.1
Cogranne, R.2
Fillatre, L.3
Nikiforov, I.4
Retraint, F.5
Cornu, P.6
-
10
-
-
84898049332
-
Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm
-
May
-
T. H. Thai, R. Cogranne, and F. Retraint, "Statistical model of quantized DCT coefficients: Application in the steganalysis of Jsteg algorithm," IEEE Trans. Image Process., vol. 23, no. 5, pp. 1980-1993, May 2014.
-
(2014)
IEEE Trans. Image Process.
, vol.23
, Issue.5
, pp. 1980-1993
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
11
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
Sep.
-
H. Farid, "Detecting hidden messages using higher-order statistical models," in Proc. IEEE Int. Conf. Image Process., vol. 2. Sep. 2002, pp. II-905-II-908.
-
(2002)
Proc. IEEE Int. Conf. Image Process.
, vol.2
, pp. 905-908
-
-
Farid, H.1
-
12
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun.
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
13
-
-
84858191862
-
From blind to quantitative steganalysis
-
Apr.
-
T. Pevný, J. Fridrich, and A. D. Ker, "From blind to quantitative steganalysis," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 445-454, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 445-454
-
-
Pevný, T.1
Fridrich, J.2
Ker, A.D.3
-
14
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
Apr.
-
J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovsky, J.1
Fridrich, J.2
Holub, V.3
-
15
-
-
56749170425
-
Multiclass detector of current steganographic methods for JPEG format
-
Dec.
-
T. Pevný and J. Fridrich, "Multiclass detector of current steganographic methods for JPEG format," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 635-650, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 635-650
-
-
Pevný, T.1
Fridrich, J.2
-
17
-
-
84932126015
-
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model
-
Mar.
-
V. Sedighi, J. Fridrich, and R. Cogranne, "Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model," Proc. SPIE, vol. 9409, p. 94090H, Mar. 2015.
-
(2015)
Proc. SPIE
, vol.9409
, pp. 94090H
-
-
Sedighi, V.1
Fridrich, J.2
Cogranne, R.3
-
18
-
-
84929248903
-
Theoretical model of the FLD ensemble classifier based on hypothesis testing theory
-
Dec.
-
R. Cogranne, T. Denemark, and J. Fridrich, "Theoretical model of the FLD ensemble classifier based on hypothesis testing theory," in Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), Dec. 2014, pp. 167-172.
-
(2014)
Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS)
, pp. 167-172
-
-
Cogranne, R.1
Denemark, T.2
Fridrich, J.3
-
19
-
-
32944455697
-
Similarity-based online feature selection in content-based image retrieval
-
Mar.
-
W. Jiang, G. Er, Q. Dai, and J. Gu, "Similarity-based online feature selection in content-based image retrieval," IEEE Trans. Image Process., vol. 15, no. 3, pp. 702-712, Mar. 2006.
-
(2006)
IEEE Trans. Image Process
, vol.15
, Issue.3
, pp. 702-712
-
-
Jiang, W.1
Er, G.2
Dai, Q.3
Gu, J.4
-
20
-
-
68149125478
-
Hierarchical ensemble of global and local classifiers for face recognition
-
Aug.
-
Y. Su, S. Shan, X. Chen, and W. Gao, "Hierarchical ensemble of global and local classifiers for face recognition," IEEE Trans. Image Process., vol. 18, no. 8, pp. 1885-1896, Aug. 2009.
-
(2009)
IEEE Trans. Image Process
, vol.18
, Issue.8
, pp. 1885-1896
-
-
Su, Y.1
Shan, S.2
Chen, X.3
Gao, W.4
-
21
-
-
40849134401
-
Integrating concept ontology and multitask learning to achieve more effective classifier training for multilevel image annotation
-
Mar.
-
J. Fan, Y. Gao, and H. Luo, "Integrating concept ontology and multitask learning to achieve more effective classifier training for multilevel image annotation," IEEE Trans. Image Process., vol. 17, no. 3, pp. 407-426, Mar. 2008.
-
(2008)
IEEE Trans. Image Process
, vol.17
, Issue.3
, pp. 407-426
-
-
Fan, J.1
Gao, Y.2
Luo, H.3
-
22
-
-
80053005547
-
Break our steganographic system: The ins and outs of organizing BOSS
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
P. Bas, T. Filler, and T. Pevný, "'Break our steganographic system': The ins and outs of organizing BOSS," in Information Hiding (Lecture Notes in Computer Science), vol. 6958. Berlin, Germany: Springer-Verlag, 2011, pp. 59-70.
-
(2011)
Information Hiding
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
24
-
-
0003922190
-
-
2nd ed. Hoboken, NJ, USA: Wiley
-
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, 2nd ed. Hoboken, NJ, USA: Wiley, 2012.
-
(2012)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
27
-
-
84964725560
-
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces
-
R. Cogranne, V. Sedighi, J. Frdrich, and T. Pevný, "Is ensemble classifier needed for steganalysis in high-dimensional feature spaces," in Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), 2015.
-
(2015)
Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS)
-
-
Cogranne, R.1
Sedighi, V.2
Frdrich, J.3
Pevný, T.4
-
28
-
-
84875866796
-
Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features
-
Sep./Oct.
-
M. Chaumont and S. Kouider, "Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features," in Proc. IEEE Int. Conf. Image Process. (ICIP), Sep./Oct. 2012, pp. 1133-1136.
-
(2012)
Proc. IEEE Int. Conf. Image Process. (ICIP)
, pp. 1133-1136
-
-
Chaumont, M.1
Kouider, S.2
-
29
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
A. D. Ker, "Batch steganography and pooled steganalysis," in Information Hiding (Lecture Notes in Computer Science), vol. 4437. Berlin, Germany: Springer-Verlag, 2007, pp. 265-281.
-
(2007)
Information Hiding
, vol.4437
, pp. 265-281
-
-
Ker, A.D.1
-
31
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
(Lecture Notes in Computer Science), Berlin, Germany: Springer-Verlag
-
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding (Lecture Notes in Computer Science), vol. 6387. Berlin, Germany: Springer-Verlag, 2010, pp. 161-177.
-
(2010)
Information Hiding
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
32
-
-
78149255931
-
Gibbs construction in steganography
-
Dec.
-
T. Filler and J. Fridrich, "Gibbs construction in steganography," IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 705-720
-
-
Filler, T.1
Fridrich, J.2
-
34
-
-
79954485517
-
Detecting messages of unknown length
-
Feb.
-
T. Pevný, "Detecting messages of unknown length," Proc. SPIE, vol. 7880, p. 78800T, Feb. 2014.
-
(2014)
Proc. SPIE
, vol.7880
, pp. 78800T
-
-
Pevný, T.1
-
37
-
-
0003462953
-
-
Hoboken, NJ, USA: Wiley
-
H. Van Trees, Detection, Estimation, and Modulation Theory, vols. 1-4. Hoboken, NJ, USA: Wiley, 2004.
-
(2004)
Detection, Estimation, and Modulation Theory
, vol.1-4
-
-
Van Trees, H.1
-
38
-
-
84900445103
-
A mishmash of methods for mitigating the model mismatch mess
-
Feb.
-
A. D. Ker and T. Pevný, "A mishmash of methods for mitigating the model mismatch mess," Proc. SPIE, vol. 9028, pp. 90280I-1-90280I-14, Feb. 2014.
-
(2014)
Proc. SPIE
, vol.9028
, pp. 1-14
-
-
Ker, A.D.1
Pevný, T.2
-
39
-
-
0029308861
-
Optimal simultaneous detection and estimation under a false alarm constraint
-
May
-
B. Baygün and A. O. Hero, III, "Optimal simultaneous detection and estimation under a false alarm constraint," IEEE Trans. Inf. Theory, vol. 41, no. 3, pp. 688-703, May 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.3
, pp. 688-703
-
-
Baygün, B.1
Hero, A.O.2
-
40
-
-
0036926244
-
Computing multivariate normal probabilities: A new look
-
H. Gassmann, I. Deák, and T. Szántai, "Computing multivariate normal probabilities: A new look," J. Comput. Graph. Statist., vol. 11, no. 4, pp. 920-949, 2002.
-
(2002)
J. Comput. Graph. Statist.
, vol.11
, Issue.4
, pp. 920-949
-
-
Gassmann, H.1
Deák, I.2
Szántai, T.3
-
42
-
-
0000238336
-
A simplex method for function minimization
-
J. A. Nelder and R. Mead, "A simplex method for function minimization," Comput. J., vol. 7, no. 4, pp. 308-313, 1965.
-
(1965)
Comput. J.
, vol.7
, Issue.4
, pp. 308-313
-
-
Nelder, J.A.1
Mead, R.2
-
43
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun.
-
J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
44
-
-
84929231486
-
Selection-channel-aware rich model for steganalysis of digital images
-
Dec.
-
T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, "Selection-channel-aware rich model for steganalysis of digital images," in Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), Dec. 2014, pp. 48-53.
-
(2014)
Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS)
, pp. 48-53
-
-
Denemark, T.1
Sedighi, V.2
Holub, V.3
Cogranne, R.4
Fridrich, J.5
-
45
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th Workshop Multimedia Secur. (MM&Sec), 2007, pp. 3-14.
-
(2007)
Proc. 9th Workshop Multimedia Secur. (MM&Sec)
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
46
-
-
84874023671
-
An efficient JPEG steganographic scheme using uniform embedding
-
Dec.
-
L. Guo, J. Ni, and Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), Dec. 2012, pp. 169-174.
-
(2012)
Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS)
, pp. 169-174
-
-
Guo, L.1
Ni, J.2
Shi, Y.Q.3
-
47
-
-
84867591559
-
An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients
-
Mar.
-
C. Wang and J. Ni, "An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Mar. 2012, pp. 1785-1788.
-
(2012)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)
, pp. 1785-1788
-
-
Wang, C.1
Ni, J.2
-
48
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
Feb.
-
J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, pp. 83030A-1-83030A-13, Feb. 2012.
-
(2012)
Proc. SPIE
, vol.8303
, pp. 1-13
-
-
Kodovský, J.1
Fridrich, J.2
|