-
1
-
-
80053005547
-
Break our steganographic system - The ins and outs of organizing BOSS
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors Prague, Czech Republic, May 18-20
-
P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, Volume 6958 of Lecture Notes in Computer Science, pages 59-70, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Information Hiding, 13th International Conference, Volume 6958 of Lecture Notes in Computer Science
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevný, T.3
-
2
-
-
84883172225
-
A novel mapping scheme for steganalysis
-
Y.Q. Shi, H.-J. Kim, and F. Perez-Gonzalez, editors Springer Berlin Heidelberg
-
L. Chen, Y.Q. Shi, P. Sutthiwan, and X. Niu. A novel mapping scheme for steganalysis. In Y.Q. Shi, H.-J. Kim, and F. Perez-Gonzalez, editors, International Workshop on Digital Forensics and Watermaking, Volume 7809 of LNCS, pages 19-33. Springer Berlin Heidelberg, 2013.
-
(2013)
International Workshop on Digital Forensics and Watermaking, Volume 7809 of LNCS
, pp. 19-33
-
-
Chen, L.1
Shi, Y.Q.2
Sutthiwan, P.3
Niu, X.4
-
5
-
-
84858225018
-
Optimizing pixel predictors for steganalysis
-
A. Alattar, N. D. Memon, and E. J. Delp, editors San Francisco, CA, January 23-26
-
V. Holub and J. Fridrich. Optimizing pixel predictors for steganalysis. In A. Alattar, N. D. Memon, and E. J. Delp, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012, volume 8303, pages 09-1-09-13, San Francisco, CA, January 23-26, 2012.
-
(2012)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012
, vol.8303
, pp. 091-0913
-
-
Holub, V.1
Fridrich, J.2
-
7
-
-
84932150127
-
Phase-aware projection model for steganalysis of JPEG images
-
A. Alattar, N. D. Memon, and C. Heitzenrater, editors San Francisco, CA, February 8-12
-
V. Holub and J. Fridrich. Phase-aware projection model for steganalysis of JPEG images. In A. Alattar, N. D. Memon, and C. Heitzenrater, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, volume 9409, San Francisco, CA, February 8-12, 2015.
-
(2015)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015
, vol.9409
-
-
Holub, V.1
Fridrich, J.2
-
8
-
-
84894039003
-
Universal distortion design for steganography in an arbitrary domain
-
V. Holub, J. Fridrich, and T. Denemark. Universal distortion design for steganography in an arbitrary domain. EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, 2014:1 2014.
-
(2014)
EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop
, vol.2014
, pp. 1
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
9
-
-
84949870156
-
Caffe: Convolutional architecture for fast feature embedding
-
Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross B. Girshick, Sergio Guadarrama, and Trevor Darrell. Caffe: Convolutional architecture for fast feature embedding. CoRR, abs/1408.5093, 2014.
-
(2014)
CoRR, Abs/1408.5093
-
-
Jia, Y.1
Shelhamer, E.2
Donahue, J.3
Karayev, S.4
Long, J.5
Girshick, R.B.6
Guadarrama, S.7
Darrell, T.8
-
10
-
-
84900434217
-
Implementing the projected spatial rich features on a GPU
-
A. Alattar, N. D. Memon, and C. Heitzenrater, editors San Francisco, CA, February 3-5
-
A. D. Ker. Implementing the projected spatial rich features on a GPU. In A. Alattar, N. D. Memon, and C. Heitzenrater, editors, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, volume 9028, pages 1801-1810, San Francisco, CA, February 3-5, 2014.
-
(2014)
Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014
, vol.9028
, pp. 1801-1810
-
-
Ker, A.D.1
-
11
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
J. Kodovský, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 7(2):432-444, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovský, J.1
Fridrich, J.2
Holub, V.3
-
12
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
June
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2):215-224, June 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
13
-
-
85041778755
-
Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
-
San Fransisco, United States, February SPIE.
-
Lionel Pibre, Pasquet Jérôme, Dino Ienco, and Marc Chaumont. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch. In Electronic Imaging, Media Watermarking, Security, and Forensics, San Fransisco, United States, February 2016. SPIE.
-
(2016)
Electronic Imaging, Media Watermarking, Security, and Forensics
-
-
Pibre, L.1
Jérôme, P.2
Ienco, D.3
Chaumont, M.4
-
15
-
-
84962894302
-
Steganalysis of adaptive JPEG steganography using 2D gabor filters
-
P. Comesana, J. Fridrich, and A. Alattar, editors Portland, Oregon, June 17-19
-
X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang. Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In P. Comesana, J. Fridrich, and A. Alattar, editors, 3rd ACM IH&MMSec. Workshop, Portland, Oregon, June 17-19, 2015.
-
(2015)
3rd ACM IH&MMSec. Workshop
-
-
Song, X.1
Liu, F.2
Yang, C.3
Luo, X.4
Zhang, Y.5
-
17
-
-
84964992861
-
Structural design of convolutional neural networks for steganalysis
-
May
-
G. Xu, H. Z. Wu, and Y. Q. Shi. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters, 23(5):708-712, May 2016.
-
(2016)
IEEE Signal Processing Letters
, vol.23
, Issue.5
, pp. 708-712
-
-
Xu, G.1
Wu, H.Z.2
Shi, Y.Q.3
-
18
-
-
85014811835
-
Ensemble of cnns for steganalysis: An empirical study
-
IH&MMSec '16 New York, NY, USA ACM.
-
Guanshuo Xu, Han-Zhou Wu, and Yun Q. Shi. Ensemble of cnns for steganalysis: An empirical study. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '16, pages 103-107, New York, NY, USA, 2016. ACM.
-
(2016)
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
, pp. 103-107
-
-
Xu, G.1
Wu, H.-Z.2
Shi, Y.Q.3
-
19
-
-
34247562352
-
Steganalysis based on Markov model of thresholded prediction-error image
-
Toronto, Canada, July 9-12
-
D. Zou, Y. Q. Shi, W. Su, and G. Xuan. Steganalysis based on Markov model of thresholded prediction-error image. In Proceedings IEEE, International Conference on Multimedia and Expo, pages 1365-1368, Toronto, Canada, July 9-12, 2006.
-
(2006)
Proceedings IEEE, International Conference on Multimedia and Expo
, pp. 1365-1368
-
-
Zou, D.1
Shi, Y.Q.2
Su, W.3
Xuan, G.4
|