-
1
-
-
80051709471
-
Minimizing additive distortion in steganography using syndrome-trellis codes
-
Sep
-
T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 920-935, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 920-935
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
2
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Jun
-
T. Pevný, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” in Proc. 12th Int. Conf. Inf. Hiding, Jun. 2010, pp. 161-177.
-
(2010)
Proc. 12th Int. Conf. Inf. Hiding
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
3
-
-
84874034720
-
Designing steganographic distortion using directional filters
-
Tenerife, Spain, Dec
-
V. Holub and J. Fridrich, “Designing steganographic distortion using directional filters,” in Proc. IEEE WIFS, Tenerife, Spain, Dec. 2012, pp. 234-239.
-
(2012)
Proc. IEEE WIFS
, pp. 234-239
-
-
Holub, V.1
Fridrich, J.2
-
4
-
-
84894039003
-
Universal distortion function for steganography in an arbitrary domain
-
Dec
-
V. Holub, J. Fridrich, and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,” EURASIP J. Inf. Secur., vol. 2014, p. 1, Dec. 2014.
-
(2014)
EURASIP J. Inf. Secur.
, vol.2014
, pp. 1
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
5
-
-
84983146156
-
A new cost function for spatial image steganography
-
Paris, France, Oct
-
B. Li, M. Wang, J. Huang, and X. Li, “A new cost function for spatial image steganography,” in Proc. IEEE ICIP, Paris, France, Oct. 2014, pp. 4206-4210.
-
(2014)
Proc. IEEE ICIP
, pp. 4206-4210
-
-
Li, B.1
Wang, M.2
Huang, J.3
Li, X.4
-
6
-
-
84904685564
-
Investigation on cost assignment in spatial image steganography
-
Aug
-
B. Li, S. Tan, M. Wang, and J. Huang, “Investigation on cost assignment in spatial image steganography,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1264-1277, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.8
, pp. 1264-1277
-
-
Li, B.1
Tan, S.2
Wang, M.3
Huang, J.4
-
8
-
-
84880060316
-
Moving steganography and steganalysis from the laboratory into the real world
-
Montpellier, France, Jun
-
A. D. Ker et al., “Moving steganography and steganalysis from the laboratory into the real world,” in Proc. 1st ACM Workshop IH&MMSec, Montpellier, France, Jun. 2013, pp. 45-58.
-
(2013)
Proc. 1st ACM Workshop IH&MMSec
, pp. 45-58
-
-
Ker, A.D.1
-
9
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Jun
-
T. Pevný, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
10
-
-
79954457569
-
Design of adaptive steganographic schemes for digital images
-
Feb
-
T. Filler and J. Fridrich, “Design of adaptive steganographic schemes for digital images,” Proc. SPIE, vol. 7880, p. 78800F, Feb. 2011.
-
(2011)
Proc. SPIE
, vol.7880
, pp. 78800F
-
-
Filler, T.1
Fridrich, J.2
-
11
-
-
80054777166
-
On dangers of overtrain-ing steganography to incomplete cover model
-
Niagara Falls, NY, USA, Sep
-
J. Kodovský, J. Fridrich, and V. Holub, “On dangers of overtrain-ing steganography to incomplete cover model,” in Proc. 13th ACM Multimedia Secur. Workshop, Niagara Falls, NY, USA, Sep. 2011, pp. 69-76.
-
(2011)
Proc. 13th ACM Multimedia Secur. Workshop
, pp. 69-76
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
12
-
-
84889632364
-
Multivariate Gaussian model for designing additive distortion for steganography
-
Vancouver, BC, Canada, May
-
J. Fridrich and J. Kodovský, “Multivariate Gaussian model for designing additive distortion for steganography,” in Proc. IEEE ICASSP, Vancouver, BC, Canada, May 2013, pp. 2949-2953.
-
(2013)
Proc. IEEE ICASSP
, pp. 2949-2953
-
-
Fridrich, J.1
Kodovský, J.2
-
13
-
-
84932126015
-
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model
-
Mar
-
V. Sedighi, J. Fridrich, and R. Cogranne, “Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model,” Proc. SPIE, vol. 9409, p. 94090H, Mar. 2015.
-
(2015)
Proc. SPIE
, vol.9409
, pp. 94090H
-
-
Sedighi, V.1
Fridrich, J.2
Cogranne, R.3
-
15
-
-
52649143252
-
Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data
-
Oct
-
A. Foi, M. Trimeche, V. Katkovnik, and K. Egiazarian, “Practical Poissonian-Gaussian noise modeling and fitting for single-image raw-data,” IEEE Trans. Image Process., vol. 17, no. 10, pp. 1737-1754, Oct. 2008.
-
(2008)
IEEE Trans. Image Process.
, vol.17
, Issue.10
, pp. 1737-1754
-
-
Foi, A.1
Trimeche, M.2
Katkovnik, V.3
Egiazarian, K.4
-
16
-
-
0028391852
-
Radiometric CCD camera calibration and noise estimation
-
Mar
-
G. E. Healey and R. Kondepudy, “Radiometric CCD camera calibration and noise estimation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 3, pp. 267-276, Mar. 1994.
-
(1994)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.16
, Issue.3
, pp. 267-276
-
-
Healey, G.E.1
Kondepudy, R.2
-
17
-
-
84891296342
-
Camera model identification based on the heteroscedastic noise model
-
Jan
-
T. H. Thai, R. Cogranne, and F. Retraint, “Camera model identification based on the heteroscedastic noise model,” IEEE Trans. Image Process., vol. 23, no. 1, pp. 250-263, Jan. 2014.
-
(2014)
IEEE Trans. Image Process.
, vol.23
, Issue.1
, pp. 250-263
-
-
Thai, T.H.1
Cogranne, R.2
Retraint, F.3
-
18
-
-
80052987721
-
A cover image model for reliable steganalysis
-
Prague, Czech Republic, May
-
R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, and P. Cornu, “A cover image model for reliable steganalysis,” in Proc. 13th Int. Conf. Inf. Hiding, Prague, Czech Republic, May 2011, pp. 178-192.
-
(2011)
Proc. 13th Int. Conf. Inf. Hiding
, pp. 178-192
-
-
Cogranne, R.1
Zitzmann, C.2
Fillatre, L.3
Retraint, F.4
Nikiforov, I.5
Cornu, P.6
-
19
-
-
80053026542
-
Statistical decision methods in hidden information detection
-
Prague, Czech Republic, May
-
C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, “Statistical decision methods in hidden information detection,” in Proc. 13th Int. Conf. Inf. Hiding, Prague, Czech Republic, May 2011, pp. 163-177.
-
(2011)
Proc. 13th Int. Conf. Inf. Hiding
, pp. 163-177
-
-
Zitzmann, C.1
Cogranne, R.2
Retraint, F.3
Nikiforov, I.4
Fillatre, L.5
Cornu, P.6
-
20
-
-
84873683899
-
An asymptotically uniformly most powerful test for LSB matching detection
-
Mar
-
R. Cogranne and F. Retraint, “An asymptotically uniformly most powerful test for LSB matching detection,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 464-476, Mar. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.3
, pp. 464-476
-
-
Cogranne, R.1
Retraint, F.2
-
21
-
-
84874590883
-
Application of hypothesis testing theory for optimal detection of LSB matching data hiding
-
Jul
-
R. Cogranne and F. Retraint, “Application of hypothesis testing theory for optimal detection of LSB matching data hiding,” Signal Process., vol. 93, no. 7, pp. 1724-1737, Jul. 2013.
-
(2013)
Signal Process
, vol.93
, Issue.7
, pp. 1724-1737
-
-
Cogranne, R.1
Retraint, F.2
-
22
-
-
84860434682
-
Rich models for steganalysis of digital images
-
Jun
-
J. Fridrich and J. Kodovský, “Rich models for steganalysis of digital images,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovský, J.2
-
24
-
-
84883172225
-
A novel mapping scheme for steganalysis
-
L. Chen, Y. Q. Shi, P. Sutthiwan, and X. Niu, “A novel mapping scheme for steganalysis,” in Proc. 11th IWDW, 2013, pp. 19-33.
-
(2013)
Proc. 11th IWDW
, pp. 19-33
-
-
Chen, L.1
Shi, Y.Q.2
Sutthiwan, P.3
Niu, X.4
-
25
-
-
84927741168
-
Adaptive steganalysis against WOW embedding algorithm
-
Salzburg, Austria, Jun
-
W. Tang, H. Li, W. Luo, and J. Huang, “Adaptive steganalysis against WOW embedding algorithm,” in Proc. 2nd ACM Workshop IH&MMSec, Salzburg, Austria, Jun. 2014, pp. 91-96.
-
(2014)
Proc. 2nd ACM Workshop IH&MMSec
, pp. 91-96
-
-
Tang, W.1
Li, H.2
Luo, W.3
Huang, J.4
-
26
-
-
84929231486
-
Selection-channel-aware rich model for steganalysis of digital images
-
Atlanta, GA, USA, Dec
-
T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, “Selection-channel-aware rich model for steganalysis of digital images,” in Proc. IEEE WIFS, Atlanta, GA, USA, Dec. 2014, pp. 48-53.
-
(2014)
Proc. IEEE WIFS
, pp. 48-53
-
-
Denemark, T.1
Sedighi, V.2
Holub, V.3
Cogranne, R.4
Fridrich, J.5
-
27
-
-
84887312389
-
Statistical detection of defects in radi-ographic images using an adaptive parametric model
-
Mar
-
R. Cogranne and F. Retraint, “Statistical detection of defects in radi-ographic images using an adaptive parametric model,” Signal Process., vol. 96, pp. 173-189, Mar. 2014.
-
(2014)
Signal Process
, vol.96
, pp. 173-189
-
-
Cogranne, R.1
Retraint, F.2
-
28
-
-
84961389381
-
-
Bellingham, WA, USA: SPIE
-
V. Katkovnik, K. Egiazarian, and J. Astola, Local Approximation Techniques in Signal and Image Processing. Bellingham, WA, USA: SPIE, 2006.
-
(2006)
Local Approximation Techniques in Signal and Image Processing
-
-
Katkovnik, V.1
Egiazarian, K.2
Astola, J.3
-
29
-
-
80053005547
-
Break our steganographic system': The ins and outs of organizing BOSS
-
Prague, Czech Republic, May
-
P. Bas, T. Filler, and T. Pevný, “'Break Our Steganographic System': The ins and outs of organizing BOSS,” in Proc. 13th Int. Conf. Inf. Hiding, Prague, Czech Republic, May 2011, pp. 59-70.
-
(2011)
Proc. 13th Int. Conf. Inf. Hiding
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
30
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
Apr
-
J. Kodovský, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
31
-
-
84929248903
-
Theoretical model of the FLD ensemble classifier based on hypothesis testing theory
-
Atlanta, GA, USA, Dec
-
R. Cogranne, T. Denemark, and J. Fridrich, “Theoretical model of the FLD ensemble classifier based on hypothesis testing theory,” in Proc. IEEE WIFS, Atlanta, GA, USA, Dec. 2014, pp. 167-172.
-
(2014)
Proc. IEEE WIFS
, pp. 167-172
-
-
Cogranne, R.1
Denemark, T.2
Fridrich, J.3
-
32
-
-
84943746941
-
Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory
-
Dec
-
R. Cogranne and J. Fridrich, “Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2627-2642, Dec. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.12
, pp. 2627-2642
-
-
Cogranne, R.1
Fridrich, J.2
-
33
-
-
78149255931
-
Gibbs construction in steganography
-
Dec
-
T. Filler and J. Fridrich, “Gibbs construction in steganography,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705-720, Dec. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.4
, pp. 705-720
-
-
Filler, T.1
Fridrich, J.2
-
34
-
-
78649838656
-
Batch steganography and pooled steganalysis
-
Alexandria, VA, USA, Jul
-
A. D. Ker, “Batch steganography and pooled steganalysis,” in Proc. 8th Int. Workshop Inf. Hiding, Alexandria, VA, USA, Jul. 2006, pp. 265-281.
-
(2006)
Proc. 8th Int. Workshop Inf. Hiding
, pp. 265-281
-
-
Ker, A.D.1
-
35
-
-
34547881527
-
A capacity result for batch steganography
-
Aug
-
A. D. Ker, “A capacity result for batch steganography,” IEEE Signal Process. Lett., vol. 14, no. 8, pp. 525-528, Aug. 2007.
-
(2007)
IEEE Signal Process. Lett.
, vol.14
, Issue.8
, pp. 525-528
-
-
Ker, A.D.1
-
36
-
-
84929251068
-
Rich model for steganalysis of color images
-
Atlanta, GA, USA, Dec
-
M. Goljan, R. Cogranne, and J. Fridrich, “Rich model for steganalysis of color images,” in Proc. IEEE WIFS, Atlanta, GA, USA, Dec. 2014, pp. 185-190.
-
(2014)
Proc. IEEE WIFS
, pp. 185-190
-
-
Goljan, M.1
Cogranne, R.2
Fridrich, J.3
|