-
1
-
-
84880060316
-
Moving steganography and steganalysis from the laboratory into the real world
-
A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevný, "Moving steganography and steganalysis from the laboratory into the real world," in ACM Information hiding and multimedia security, IH&MMSec'13, 2013, pp. 45-58.
-
(2013)
ACM Information Hiding and Multimedia Security, IH&MMSec'13
, pp. 45-58
-
-
Ker, A.D.1
Bas, P.2
Böhme, R.3
Cogranne, R.4
Craver, S.5
Filler, T.6
Fridrich, J.7
Pevný, T.8
-
2
-
-
84894039003
-
Universal distortion function for steganography in an arbitrary domain
-
V. Holub, J. Fridrich, and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP Journal on Information Security, vol. 2014, no. 1, pp. 1-13, 2014.
-
(2014)
EURASIP Journal on Information Security
, vol.2014
, Issue.1
, pp. 1-13
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
3
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inform. Forensics and Security, vol. 5, no. 2, pp. 215-224, 2010.
-
(2010)
IEEE Trans. Inform. Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
4
-
-
84860434682
-
Rich models for steganalysis of digital images
-
june
-
J. Fridrich and J. Kodovskỳ, "Rich models for steganalysis of digital images," Information Forensics and Security, IEEE Transactions on, vol. 7, no. 3, pp. 868-882, june 2012.
-
(2012)
Information Forensics and Security, IEEE Transactions on
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovskỳ, J.2
-
5
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
030A-13
-
J. Kodovskỳ and J. Fridrich, "Steganalysis of JPEG images using rich models,"in IS&T/SPIE Electronic Imaging conf., vol. 8303, 2012, pp. 83 030A-13.
-
(2012)
IS&T/SPIE Electronic Imaging Conf.
, vol.8303
, pp. 83
-
-
Kodovskỳ, J.1
Fridrich, J.2
-
6
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
April
-
J. Kodovskỳ, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," Information Forensics and Security, IEEE Transactions on, vol. 7, no. 2, pp. 432-444, April 2012.
-
(2012)
Information Forensics and Security, IEEE Transactions on
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovskỳ, J.1
Fridrich, J.2
Holub, V.3
-
7
-
-
84929248903
-
Theoretical model of the FLD ensemble classifier based on hypothesis testing theory
-
R. Cogranne, T. Denemark, and J. Fridrich, "Theoretical model of the FLD ensemble classifier based on hypothesis testing theory," in IEEE International Workshop on Information Forensics and Security (WIFS), 2014, pp. 167-172.
-
(2014)
IEEE International Workshop on Information Forensics and Security (WIFS)
, pp. 167-172
-
-
Cogranne, R.1
Denemark, T.2
Fridrich, J.3
-
10
-
-
0003684449
-
-
2nd ed., Springer
-
T. Hastie, R. Tibshirani, J. Friedman, and J. Franklin, The elements of statistical learning: data mining, inference and prediction, 2nd ed., Springer, 2009.
-
(2009)
The Elements of Statistical Learning: Data Mining, Inference and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
Franklin, J.4
-
11
-
-
81555200713
-
LSMR: An iterative algorithm for sparse least-squares problems
-
D. C.-L. Fong and M. Saunders, "LSMR: An iterative algorithm for sparse least-squares problems," SIAM Journal on Scientific Computing, vol. 33, no. 5, pp. 2950-2971, 2011.
-
(2011)
SIAM Journal on Scientific Computing
, vol.33
, Issue.5
, pp. 2950-2971
-
-
Fong, D.C.-L.1
Saunders, M.2
-
12
-
-
80053005547
-
Break our steganographic system - The ins and outs of organizing boss
-
P. Bas, T. Filler, and T. Pevný, "Break our steganographic system - the ins and outs of organizing boss," in Information Hiding, ser. LNCS vol.6958, 2011, pp. 59-70.
-
(2011)
Information Hiding, Ser. LNCS
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
13
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
T. Pevnỳ, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Information Hiding, ser. LNCS vol. 6387, 2010, pp. 161-177.
-
(2010)
Information Hiding, Ser. LNCS
, vol.6387
, pp. 161-177
-
-
Pevnỳ, T.1
Filler, T.2
Bas, P.3
-
15
-
-
84932126015
-
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model
-
V. Sedighi, J. Fridrich, and R. Cogranne, "Content-adaptive pentary steganography using the multivariate generalized gaussian cover model," IS&T/SPIE Electronic Imaging conf., vol. 9409, 2015, pp. 94 090H.
-
(2015)
IS&T/SPIE Electronic Imaging Conf
, vol.9409
, pp. 94090H
-
-
Sedighi, V.1
Fridrich, J.2
Cogranne, R.3
-
16
-
-
84932088553
-
Towards dependable steganalysis
-
T. Pevnỳ, A. D. Ker', "Towards dependable steganalysis," IS&T/SPIE Electronic Imaging conf., vol. 9409, 2015, pp. 94 090I.
-
(2015)
IS&T/SPIE Electronic Imaging Conf.
, vol.9409
, pp. 94090I
-
-
Pevnỳ, T.1
Ker, A.D.2
-
18
-
-
84929231486
-
Selection-channel-aware rich model for steganalysis of digital images
-
T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, "Selection-channel-aware rich model for steganalysis of digital images," in IEEE International Workshop on Information Forensics and Security (WIFS), 2014, pp. 48-53.
-
(2014)
IEEE International Workshop on Information Forensics and Security (WIFS)
, pp. 48-53
-
-
Denemark, T.1
Sedighi, V.2
Holub, V.3
Cogranne, R.4
Fridrich, J.5
-
19
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in ACM 9th workshop on Multimedia & security, MMSec'07, 2007, pp. 3-14.
-
(2007)
ACM 9th Workshop on Multimedia & Security, MMSec'07
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
21
-
-
84874023671
-
An efficient JPEG steganographic scheme using uniform embedding
-
L. Guo, J. Ni, and Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in IEEE International Workshop on Information Forensics and Security (WIFS), 2012, pp. 169-174.
-
(2012)
IEEE International Workshop on Information Forensics and Security (WIFS)
, pp. 169-174
-
-
Guo, L.1
Ni, J.2
Shi, Y.Q.3
-
22
-
-
84920768177
-
Low-complexity features for JPEG steganalysis using undecimated DCT
-
Feb
-
V. Holub and J. Fridrich, "Low-complexity features for JPEG steganalysis using undecimated DCT," Information Forensics and Security, IEEE Transactions on, vol. 10, no. 2, pp. 219-228, Feb 2015.
-
(2015)
Information Forensics and Security, IEEE Transactions on
, vol.10
, Issue.2
, pp. 219-228
-
-
Holub, V.1
Fridrich, J.2
-
23
-
-
84932150127
-
Phase-aware projection model for steganalysis of JPEG images
-
-, "Phase-aware projection model for steganalysis of JPEG images," IS&T/SPIE Electronic Imaging conf., vol. 9409, 2015, pp. 94 090T.
-
(2015)
IS&T/SPIE Electronic Imaging Conf.
, vol.9409
, pp. 94090T
-
-
Holub, V.1
Fridrich, J.2
-
25
-
-
85194972808
-
Regression shrinkage and selection via the lasso
-
R. Tibshirani, " Regression shrinkage and selection via the lasso", Journal of the Royal Statistical Society, Series B, Vol 58, No. 1, pp. 267-288, 1996.
-
(1996)
Journal of the Royal Statistical Society, Series B
, vol.58
, Issue.1
, pp. 267-288
-
-
Tibshirani, R.1
|