1 |
Andrew D. Ker, Patrick Bas, Rainer Bohme, Remi Cogranne, Scott Craver, Tomas Filler, Jessica Fridrich and Tomas Pevny, "Moving steganography and steganalysis from the laboratory into the real world," in Proc. of 1st ACM Workshop on Information Hiding and Multimedia Security, pp. 45-58, Jun. 17-19 2013.
|
2 |
Tomas Pevny and Jessica Fridrich, "Multiclass detector of current steganographic methods for JPEG format," IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 635-650, December, 2008.
DOI
ScienceOn
|
3 |
Ping Wang, Fenlin Liu, Guodong Wang, Yifeng Sun and Daofu Gong, "Multi-class steganalysis for JPEG stego algorithms," in Proc. of 15th IEEE Int. Conf. on Image Processing, pp. 2076-2079, October 12-15, 2008.
|
4 |
Jessica Fridrich, Miroslav Goljan, David Sorkal and Taras Holotyak, "Forensic steganalysis: determining the stego key in spatial domain steganography," in Proc. of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE 5681, pp. 631-642, January 17-21, 2005.
|
5 |
Jessica Fridrich, Tomas Pevny and Jan Kodovsky, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. of 9th ACM Workshop on Multimedia and Security, pp. 3-14, September 20-21, 2007.
|
6 |
Tomas Pevny and Jessica Fridrich, "Towards multi-class blind steganalyzer for JPEG Images," in Proc. of 4th Int. Workshop on Digital Watermarking, Spring Lecture Notes in Computer Science, vol. 3710, pp. 39-53, Sepetember 15-17, 2005.
|
7 |
Jan Kodovsky and Jessica Fridrich, "Calibration revisited," in Proc. of 11th ACM Workshop on Multimedia and Security, pp. 63-74, September 7-8, 2009.
|
8 |
Tomas Pevny, Jessica Fridrich and Andrew D. Ker, "From blind to quantitative steganalysis," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 445-454, November, 2011.
|
9 |
Abbas Cheddad, Joan Condell, Kevin Curran and Paul Mc Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, March, 2010.
DOI
ScienceOn
|
10 |
Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian and Daoshun Wang, "On F5 steganography in images," The Computer Journal, vol. 55, no. 4, pp. 447-456, April, 2012.
DOI
|
11 |
Chih-Chung Chang and Chih-Jen Lin, "LIBSVM: A library for support vector machines," ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, article 27, April, 2011.
|
12 |
Zhenyu Li, Zongyun Hu, Xiangyang Luo and Bin Lu, "Embedding change rate estimation based on ensemble learning," in Proc. of 1st ACM Workshop on Information Hiding Multimedia Security, pp. 77-83, June 17-19, 2013.
|
13 |
Xiangyang Luo, Fenlin Liu, Shiguo Lian, Chunfang Yang and Stefanos Gritzalis, "On the typical statistic features for image blind steganalysis," IEEE Journal on Selected Areas in Communications, vol. 29, no. 7, pp. 1404-1422, August, 2011.
DOI
ScienceOn
|
14 |
Ying Wang and Pierre Moulin, "Optimized feature extraction for learning-based image steganalysis," IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 31-45, March, 2007.
DOI
ScienceOn
|
15 |
Vojtech Holub, Jessica Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1996-2006, December, 2013.
DOI
ScienceOn
|
16 |
Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, "Information hiding-A survey," in Proc. of the IEEE, special issue on protection of multimedia content, vol. 87, no. 7, pp. 1062-1078, July, 1999.
|
17 |
Xiangyang Luo, Daoshun Wang, Ping Wang and Fenlin Liu, "A review on blind detection for image steganography," Signal Processing, vol. 88, no. 9, pp. 2138-2157, September, 2008.
DOI
ScienceOn
|
18 |
Jan Kodovsky and Jessica Fridrich, "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868-882, August, 2012.
DOI
ScienceOn
|
19 |
Jessica Fridrich, Miroslav Goljan and Dorin Hogea, "Steganalysis of JPEG Images: Breaking the F5 Algorithm," in Proc. of 5th Int. Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 2578, pp. 310-323, October 7-9, 2002.
|
20 |
Jessica Fridrich, Miroslav Goljan and Dorin Hogea, "Quantitative steganalysis of digital Images: Estimating the secret message length," Multimedia Systems, vol. 9, no. 3, pp. 288-302, November, 2003.
DOI
|
21 |
Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo and Daoshun Wang, "Weighted stego-image steganalysis of messages hidden into each bit plane," The Computer Journal, vol. 55, no. 6, pp. 717-727, June, 2012.
DOI
|
22 |
Andreas Westfeld, "F5-A steganographic algorithm-High capacity despite better steganalysis," in Proc. of 4th Int. Workshop on Information Hiding, Springer Lecture Notes in Computer Science, vol. 2137, pp. 289-302, April 25-27, 2001.
|
23 |
Jing Dong, Wei Wang and Tieniu Tan, "Multi-class blind steganalysis based on image run-length analysis," in Proc. of the 8th Int. Workshop on Digital Watermarking, Springer Lecture Notes in Computer Science, vol. 5703, pp. 199-210, August 24-26, 2009.
|