1 |
J. Fridrich, M. Goljan and D. Hogea, 'New Methodology for Breaking Steganographic Techniques for JPEGs,' Proc. SPIE Electronic Imaging, SantaClara, CA, USA, pp.143-155, Jan 2003
|
2 |
M. Chen, R. Zhang, X. Niu and Y. Yang, 'Analysis of Current Steganography Tools: Classification & Features,' Proc. of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena. CA, USA, December 2006
|
3 |
Bret Dunber, 'A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.', SANS Institute, January 2002
|
4 |
Andreas Westfeld, 'F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis,' 4th Information Hiding International Workshop, Pittsburgh, USA, April 2001
|
5 |
Derek Upham: Jeteg, 1997, e.g. http://www.tiac.net/users/korejwa/jsteg.htm
|
6 |
J. Fridrich, M. Goljan and D. Hogea, 'Attacking the OutGuess,' Proc. Of the ACM Workshop on Multimedia and Security. 2002, Juan-les- Pins,France, December 6, 2002
|
7 |
J. Fridrich and D. Soukal, 'Matrix Embedding for Large Payload,' IEEE Tran on Information Forensics and Security. Vol 1, pp.390-295, September 2006
DOI
ScienceOn
|
8 |
Andreas Westfeld: The Steganographic Algorithm F5, 1999, http://www.wwwrn.inf.tu-dresden.de/-westfeld/f5.html
|
9 |
The USC-SIPI Image Database, http://sipi.usc.edu/database/
|