-
1
-
-
80053005547
-
Ąś break our steganographic systemĄś: The ins and outs of organizing boss
-
Springer
-
P. Bas, T. Filler, and T. Pevnỳ. Ąś break our steganographic systemĄś: The ins and outs of organizing boss. In Information Hiding, pages 59-70. Springer, 2011.
-
(2011)
Information Hiding
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevnỳ, T.3
-
2
-
-
0022098435
-
Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters
-
J. G. Daugman. Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. JOSA A, 2(7):1160-1169, 1985.
-
(1985)
JOSA A
, vol.2
, Issue.7
, pp. 1160-1169
-
-
Daugman, J.G.1
-
3
-
-
84929231486
-
Selection-channel-aware rich model for steganalysis of digital images
-
T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich. Selection-channel-aware rich model for steganalysis of digital images. In IEEE Workshop on Information Forensic and Security, Atlanta, GA, 2014.
-
(2014)
IEEE Workshop on Information Forensic and Security, Atlanta, GA
-
-
Denemark, T.1
Sedighi, V.2
Holub, V.3
Cogranne, R.4
Fridrich, J.5
-
4
-
-
79954457569
-
Design of adaptive steganographic schemes for digital images
-
International Society for Optics and Photonics
-
T. Filler and J. Fridrich. Design of adaptive steganographic schemes for digital images. In IS&T/SPIE Electronic Imaging, pages 78800F-78800F. International Society for Optics and Photonics, 2011.
-
(2011)
IS&T/SPIE Electronic Imaging
, pp. 78800F-78800F
-
-
Filler, T.1
Fridrich, J.2
-
5
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. Information Forensics and Security, IEEE Transactions on, 6(3):920-935, 2011.
-
(2011)
Information Forensics and Security, IEEE Transactions on
, vol.6
, Issue.3
, pp. 920-935
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
6
-
-
21844470700
-
Writing on wet paper
-
J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal. Writing on wet paper. Signal Processing, IEEE Transactions on, 53(10):3923-3935, 2005.
-
(2005)
Signal Processing, IEEE Transactions on
, vol.53
, Issue.10
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
7
-
-
30744445178
-
Perturbed quantization steganography
-
J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography. Multimedia Systems, 11(2):98-107, 2005.
-
(2005)
Multimedia Systems
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
9
-
-
38849102269
-
Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities
-
ACM
-
J. Fridrich, T. Pevnỳ, and J. Kodovskỳ. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In Proceedings of the 9th workshop on Multimedia & security, pages 3-14. ACM, 2007.
-
(2007)
Proceedings of the 9th Workshop on Multimedia & Security
, pp. 3-14
-
-
Fridrich, J.1
Pevnỳ, T.2
Kodovskỳ, J.3
-
10
-
-
0036811755
-
Comparison of texture features based on gabor filters
-
S. E. Grigorescu, N. Petkov, and P. Kruizinga. Comparison of texture features based on gabor filters. Image Processing, IEEE Transactions on, 11(10):1160-1167, 2002.
-
(2002)
Image Processing, IEEE Transactions on
, vol.11
, Issue.10
, pp. 1160-1167
-
-
Grigorescu, S.E.1
Petkov, N.2
Kruizinga, P.3
-
11
-
-
84874023671
-
An efficient jpeg steganographic scheme using uniform embedding
-
L. Guo, J. Ni, and Y.-Q. Shi. An efficient jpeg steganographic scheme using uniform embedding. In WIFS, pages 169-174, 2012.
-
(2012)
WIFS
, pp. 169-174
-
-
Guo, L.1
Ni, J.2
Shi, Y.-Q.3
-
15
-
-
84932150127
-
Phase-aware projection model for steganalysis of jpeg images
-
V. Holub and J. Fridrich. Phase-aware projection model for steganalysis of jpeg images. Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XVII, to appear, San Francisco, CA, 2015.
-
(2015)
Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XVII, to Appear, San Francisco, CA
-
-
Holub, V.1
Fridrich, J.2
-
16
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Springer
-
Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In Information hiding, pages 314-327. Springer, 2007.
-
(2007)
Information Hiding
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
17
-
-
84858246718
-
Steganalysis of jpeg images using rich models
-
International Society for Optics and Photonics
-
J. Kodovský and J. Fridrich. Steganalysis of jpeg images using rich models. In IS&T/SPIE Electronic Imaging, pages 83030A-83030A. International Society for Optics and Photonics, 2012.
-
(2012)
IS&T/SPIE Electronic Imaging
, pp. 83030A-83030A
-
-
Kodovský, J.1
Fridrich, J.2
-
19
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
J. Kodovsky, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. Information Forensics and Security, IEEE Transactions on, 7(2):432-444, 2012.
-
(2012)
Information Forensics and Security, IEEE Transactions on
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovsky, J.1
Fridrich, J.2
Holub, V.3
-
20
-
-
34548232251
-
Merging markov and dct features for multi-class jpeg steganalysis
-
International Society for Optics and Photonics
-
T. Pevny and J. Fridrich. Merging markov and dct features for multi-class jpeg steganalysis. In Electronic Imaging 2007, pages 650503-650503. International Society for Optics and Photonics, 2007.
-
(2007)
Electronic Imaging 2007
, pp. 650503
-
-
Pevny, T.1
Fridrich, J.2
-
21
-
-
85084160704
-
Defending against statistical steganalysis
-
N. Provos. Defending against statistical steganalysis. In Usenix Security Symposium, volume 10, pages 323-336, 2001.
-
(2001)
Usenix Security Symposium
, vol.10
, pp. 323-336
-
-
Provos, N.1
-
22
-
-
35048819204
-
Model-based steganography
-
Springer
-
P. Sallee. Model-based steganography. In Digital watermarking, pages 154-167. Springer, 2004.
-
(2004)
Digital Watermarking
, pp. 154-167
-
-
Sallee, P.1
-
23
-
-
84962781570
-
Steganalysis of perturbed quantization steganography based on the enhanced histogram features
-
X. Song, F. Liu, X. Luo, J. Lu, and Y. Zhang. Steganalysis of perturbed quantization steganography based on the enhanced histogram features. Multimedia Tools and Applications, pages 1-27, 2014.
-
(2014)
Multimedia Tools and Applications
, pp. 1-27
-
-
Song, X.1
Liu, F.2
Luo, X.3
Lu, J.4
Zhang, Y.5
-
25
-
-
0005105932
-
F5Ąła steganographic algorithm
-
Springer
-
A. Westfeld. F5Ąła steganographic algorithm. In Information hiding, pages 289-302. Springer, 2001.
-
(2001)
Information Hiding
, pp. 289-302
-
-
Westfeld, A.1
|