-
1
-
-
84892764719
-
Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-tools- and some lessons learned
-
Dresden, Germany, Sep.
-
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-tools- and some lessons learned, " in Proc. 3rd Int. Workshop Inf. Hiding, vol. 1768. Dresden, Germany, Sep. 1999, pp. 61-76.
-
(1999)
Proc. 3rd Int. Workshop Inf. Hiding
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
2
-
-
80053005547
-
Break our steganographic system': The ins and outs of organizing BOSS
-
Prague, Czech Republic, May
-
P. Bas, T. Filler, and T. Pevný, "'Break our steganographic system': The ins and outs of organizing BOSS, " in Proc. 13th Int. Workshop Inf. Hiding, vol. 6958. Prague, Czech Republic, May 2011, pp. 59-70.
-
(2011)
Proc. 13th Int. Workshop Inf. Hiding
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
3
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Jun.
-
D.-C. Wu and W.-H. Tsai, "A steganographic method for images by pixel-value differencing, " Pattern Recognit. Lett., vol. 24, pp. 1613-1626, Jun. 2003.
-
(2003)
Pattern Recognit. Lett.
, vol.24
, pp. 1613-1626
-
-
Wu, D.-C.1
Tsai, W.-H.2
-
4
-
-
34247562352
-
Steganalysis based on Markov model of thresholded prediction-error image
-
Toronto, ON, Canada, Jul.
-
D. Zou, Y. Q. Shi, W. Su, and G. Xuan, "Steganalysis based on Markov model of thresholded prediction-error image, " in Proc. IEEE Int. Conf. Multimedia Expo, Toronto, ON, Canada, Jul. 2006, pp. 1365-1368.
-
(2006)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 1365-1368
-
-
Zou, D.1
Shi, Y.Q.2
Su, W.3
Xuan, G.4
-
5
-
-
34548216307
-
Practical methods for minimizing embedding impact in steganography
-
Jan.
-
J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography, " Proc. SPIE, vol. 6505, pp. 650502-1-650502-15, Jan. 2007.
-
(2007)
Proc. SPIE
, vol.6505
, pp. 6505021-65050215
-
-
Fridrich, J.1
Filler, T.2
-
6
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun.
-
J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
7
-
-
80052990656
-
A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO)
-
Prague, Czech Republic, May
-
G. Gul and F. Kurugollu, "A new methodology in steganalysis: Breaking highly undetectable steganograpy (HUGO), " in Proc. 13th Int. Workshop Inf. Hiding, vol. 6958. Prague, Czech Republic, May 2011, pp. 71-84.
-
(2011)
Proc. 13th Int. Workshop Inf. Hiding
, vol.6958
, pp. 71-84
-
-
Gul, G.1
Kurugollu, F.2
-
9
-
-
84894039003
-
Universal distortion function for steganography in an arbitrary domain
-
V. Holub, J. Fridrich, and T. Denemark, "Universal distortion function for steganography in an arbitrary domain, " EURASIP J. Inf. Secur., vol. 2014, no. 1, pp. 1-13, 2014.
-
(2014)
EURASIP J. Inf. Secur.
, vol.2014
, Issue.1
, pp. 1-13
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
10
-
-
0034787093
-
Reliable detection of LSB steganography in color and grayscale images
-
Oct.
-
J. Fridrich, M. Goljan, and R. Du, "Reliable detection of LSB steganography in color and grayscale images, " in Proc. ACM Workshop Multimedia Secur., Oct. 2001, pp. 27-30.
-
(2001)
Proc. ACM Workshop Multimedia Secur.
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
11
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
Feb.
-
J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models, " Proc. SPIE, vol. 8303, pp. 83030A-1-83030A-13, Feb. 2012.
-
(2012)
Proc. SPIE
, vol.8303
, pp. 83030A1-83030A13
-
-
Kodovský, J.1
Fridrich, J.2
-
12
-
-
84900455270
-
Study of cover source mismatch in steganalysis and ways to mitigate its impact
-
Feb.
-
J. Kodovský, V. Sedighi, and J. Fridrich, "Study of cover source mismatch in steganalysis and ways to mitigate its impact, " Proc. SPIE, vol. 9028, pp. 90280J-1-90280J-12, Feb. 2014.
-
(2014)
Proc. SPIE
, vol.9028
, pp. 90280J1-90280J12
-
-
Kodovský, J.1
Sedighi, V.2
Fridrich, J.3
-
13
-
-
33645814428
-
LSB matching revisited
-
May
-
J. Mielikainen, "LSB matching revisited, " IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285-287, May 2006.
-
(2006)
IEEE Signal Process. Lett.
, vol.13
, Issue.5
, pp. 285-287
-
-
Mielikainen, J.1
-
14
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
Apr.
-
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
15
-
-
84899516063
-
Uniform embedding for efficient JPEG steganography
-
May
-
L. Guo, J. Ni, and Y. Q. Shi, "Uniform embedding for efficient JPEG steganography, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 814-825, May 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.5
, pp. 814-825
-
-
Guo, L.1
Ni, J.2
Shi, Y.Q.3
-
16
-
-
84932163348
-
Predictable rain? Steganalysis of public-key steganography using wet paper codes
-
Salzburg, Austria, Jun.
-
M. Carnein, P. Schöttle, and R. Böhme, "Predictable rain? Steganalysis of public-key steganography using wet paper codes, " in Proc. 2nd ACM Workshop Inf. Hiding Multimedia Secur., Salzburg, Austria, Jun. 2014, pp. 97-108.
-
(2014)
Proc. 2nd ACM Workshop Inf. Hiding Multimedia Secur.
, pp. 97-108
-
-
Carnein, M.1
Schöttle, P.2
Böhme, R.3
-
17
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Calgary, AB, Canada, Jun.
-
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography, " in Proc. 12th Int. Workshop Inf. Hiding, vol. 6387. Calgary, AB, Canada, Jun. 2010, pp. 161-177.
-
(2010)
Proc. 12th Int. Workshop Inf. Hiding
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
18
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun.
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix, " IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
19
-
-
84874399529
-
A game-theoretic approach to contentadaptive steganography
-
Berkeley, CA, USA, May
-
P. Schöttle and R. Böhme, "A game-theoretic approach to contentadaptive steganography, " in Proc. 14th Int. Workshop Inf. Hiding, vol. 7692. Berkeley, CA, USA, May 2012, pp. 125-141.
-
(2012)
Proc. 14th Int. Workshop Inf. Hiding
, vol.7692
, pp. 125-141
-
-
Schöttle, P.1
Böhme, R.2
-
20
-
-
84874090897
-
Weighted stego-image steganalysis for naive content-adaptive embedding
-
Tenerife, Spain, Dec.
-
P. Schöttle, S. Korff, and R. Böhme, "Weighted stego-image steganalysis for naive content-adaptive embedding, " in Proc. IEEE Int. Workshop Inf. Forensics Secur., Tenerife, Spain, Dec. 2012, pp. 193-198.
-
(2012)
Proc. IEEE Int. Workshop Inf. Forensics Secur.
, pp. 193-198
-
-
Schöttle, P.1
Korff, S.2
Böhme, R.3
-
21
-
-
0037524382
-
Detection of LSB steganography via sample pair analysis
-
Jul.
-
S. Dumitrescu, X. Wu, and Z. Wang, "Detection of LSB steganography via sample pair analysis, " IEEE Trans. Signal Process., vol. 51, no. 7, pp. 1995-2007, Jul. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.7
, pp. 1995-2007
-
-
Dumitrescu, S.1
Wu, X.2
Wang, Z.3
-
22
-
-
84885641053
-
Adaptive steganography by oracle (ASO)
-
San Jose, CA, USA, Jul.
-
S. Kouider, M. Chaumont, and W. Puech, "Adaptive steganography by oracle (ASO), " in Proc. IEEE Int. Conf. Multimedia Expo, San Jose, CA, USA, Jul. 2013, pp. 1-6.
-
(2013)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 1-6
-
-
Kouider, S.1
Chaumont, M.2
Puech, W.3
-
23
-
-
84929231486
-
Selection-channel-aware rich model for steganalysis of digital images
-
Dec.
-
T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, "Selection-channel-aware rich model for steganalysis of digital images, " in Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), Dec. 2014, pp. 48-53.
-
(2014)
Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS)
, pp. 48-53
-
-
Denemark, T.1
Sedighi, V.2
Holub, V.3
Cogranne, R.4
Fridrich, J.5
-
24
-
-
78149255931
-
Gibbs construction in steganography
-
Dec.
-
T. Filler and J. Fridrich, "Gibbs construction in steganography, " IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 705-720
-
-
Filler, T.1
Fridrich, J.2
-
25
-
-
79954485517
-
Detecting messages of unknown length
-
Feb.
-
T. Pevny, "Detecting messages of unknown length, " Proc. SPIE, vol. 7880, pp. 78800T-1-78800T-12, Feb. 2011.
-
(2011)
Proc. SPIE
, vol.7880
, pp. 78800T1-78800T12
-
-
Pevny, T.1
-
26
-
-
84878455879
-
Random projections of residuals as an alternative to co-occurrences in steganalysis
-
Mar.
-
V. Holub, J. Fridrich, and T. Denemark, "Random projections of residuals as an alternative to co-occurrences in steganalysis, " Proc. SPIE, vol. 8665, pp. 86650L-1-86650L-11, Mar. 2013.
-
(2013)
Proc. SPIE
, vol.8665
, pp. 86650L1-86650L11
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
27
-
-
77952620028
-
Edge adaptive image steganography based on LSB matching revisited
-
Jun.
-
W. Luo, F. Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited, " IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 201-214, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 201-214
-
-
Luo, W.1
Huang, F.2
Huang, J.3
-
28
-
-
84927741168
-
Adaptive steganalysis against WOW embedding algorithm
-
Salzburg, Austria, Jun.
-
W. Tang, H. Li, W. Luo, and J. Huang, "Adaptive steganalysis against WOW embedding algorithm, " in Proc. 2nd ACM Workshop IH&MMSec, Salzburg, Austria, Jun. 2014, pp. 91-96.
-
(2014)
Proc. 2nd ACM Workshop IH&MMSec
, pp. 91-96
-
-
Tang, W.1
Li, H.2
Luo, W.3
Huang, J.4
-
29
-
-
84874405772
-
Textural features for steganalysis
-
Berkeley, CA, USA, May
-
Y. Q. Shi, P. Sutthiwan, and L. Chen, "Textural features for steganalysis, " in Proc. 14th Int. Workshop Inf. Hiding, vol. 7692. Berkeley, CA, USA, May 2012, pp. 63-77.
-
(2012)
Proc. 14th Int. Workshop Inf. Hiding
, vol.7692
, pp. 63-77
-
-
Shi, Y.Q.1
Sutthiwan, P.2
Chen, L.3
|