-
1
-
-
0038343416
-
Steganalysis using image quality metrics
-
Avcibas, I., Memon, N. and Sankur, B. (2003), “Steganalysis using image quality metrics”, IEEE Transactions on Image Processing, Vol. 12 No. 2, pp. 221-9.
-
(2003)
IEEE Transactions on Image Processing
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
3
-
-
84986082157
-
Adaptive learning by a target-tracking system
-
Daniel, L. and Peters, J.F. (2008), “Adaptive learning by a target-tracking system”, International Journal of Intelligent Computing and Cybernetics, Vol. 11, pp. 46-68.
-
(2008)
International Journal of Intelligent Computing and Cybernetics
, vol.11
, pp. 46-68
-
-
Daniel, L.1
Peters, J.F.2
-
4
-
-
0036452586
-
Detecting hidden messages using higher-order statistical models
-
Farid, H. (2002), “Detecting hidden messages using higher-order statistical models”, Proc. IEEE Int. Conf. Image Processing, Rochester, NY, USA, Vol. 2, pp. 905-8.
-
(2002)
Proc. IEEE Int. Conf. Image Processing, Rochester, NY, USA
, vol.2
, pp. 905-908
-
-
Farid, H.1
-
5
-
-
0036034444
-
Practical steganalysis of digital images – state of the art
-
Fridrich, J. and Goljan, M. (2002), “Practical steganalysis of digital images – state of the art”, Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, pp. 1-13.
-
(2002)
Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
6
-
-
0034787093
-
Reliable detection of LSB steganography in color and grayscale images
-
Fridrich, J., Goljan, M. and Du, R. (2001), “Reliable detection of LSB steganography in color and grayscale images”, Proc. ACM Workshop on Multimedia and Security, Ottawa, Canada, pp. 27-30.
-
(2001)
Proc. ACM Workshop on Multimedia and Security, Ottawa, Canada
, pp. 27-30
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
7
-
-
2642549992
-
Attacking the OutGuess
-
Fridrich, J., Goljan, M. and Hogea, D. (2002b), “Attacking the OutGuess”, Proc. ACM Workshop on Multimedia and Security, Juan-les-Pins, France.
-
(2002)
Proc. ACM Workshop on Multimedia and Security, Juan-les-Pins, France
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
8
-
-
35248884299
-
Steganalysis of JPEG images: breaking the F5 algorithm
-
Fridrich, J., Goljan, M. and Hogea, D. (2002c), “Steganalysis of JPEG images: breaking the F5 algorithm”, Proc. 5th Information Hiding Workshop, Noordwijkerhout, the Netherlands, pp. 310-23.
-
(2002)
Proc. 5th Information Hiding Workshop, Noordwijkerhout, the Netherlands
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
9
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Ker, A.D. (2005), “Steganalysis of LSB matching in grayscale images”, IEEE Signal Processing Letters, Vol. 12 No. 6, pp. 441-4.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
10
-
-
0035365392
-
Color and texture descriptors
-
Manjunath, B.S., Ohm, J-R., Vasudevan, V.V. and Yamada, A. (2001), “Color and texture descriptors”, IEEE Trans. Circuits and Systems for Video Technology, Vol. 11 No. 6, pp. 703-15.
-
(2001)
IEEE Trans. Circuits and Systems for Video Technology
, vol.11
, Issue.6
, pp. 703-715
-
-
Manjunath, B.S.1
Ohm, J.-R.2
Vasudevan, V.V.3
Yamada, A.4
-
11
-
-
33744753200
-
Model-based methods for steganography and steganalysis
-
Sallee, P. (2005), “Model-based methods for steganography and steganalysis”, International Journal of Image and Graphics, Vol. 5 No. 1, pp. 167-89.
-
(2005)
International Journal of Image and Graphics
, vol.5
, Issue.1
, pp. 167-189
-
-
Sallee, P.1
-
12
-
-
0029721670
-
Study of DCT coefficient distributions
-
Smoot, S. and Rowe, L. (1996), “Study of DCT coefficient distributions”, Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, USA, Vol. 2657.
-
(1996)
Proc. SPIE Symposium on Electronic Imaging, San Jose, CA, USA
, vol.2657
-
-
Smoot, S.1
Rowe, L.2
-
13
-
-
3042742327
-
Hide and seek: an introduction to steganography
-
Provos, N. and Honeyman, P. (2003), “Hide and seek: an introduction to steganography”, IEEE Security and Privacy, Vol. 1 No. 3, pp. 32-44.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
|