![]() Steganalysis using color wavelet statistics and one-class support vector machines. Support vector machines for classification in nonstandard situations. In Proceedings of the International Workshop on Digital Watermarking, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, volume 4283 of Lecture Notes in Computer Science, pages 35-48. Category attack for LSB embedding of JPEG images. In Information Hiding, 9th International Workshop, Saint Malo, France, June 11-13, 2007, Lecture Notes in Computer Science. Generalized category attack - improving histogram-based attack on JPEG LSB embedding. Camenisch, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science. Modified matrix encoding technique for minimal distortion steganography. Pérez-González, editors, Proceedings, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 296-311. A general framework for structural analysis of LSB replacement. 9th IFIP TC-6 TC-11 International Conference, CMS 2005 volume 3677 of Lecture Notes in Computer Science, pages 119-128, Salzburg, Austria, September 19-21 2005. Dittmann et al., editor, Communications and Multimedia Security. A graph-theoretic approach to steganography. Steganalytic features for JPEG compression-based perturbed quantization. IEEE Transactions on Information Security and Forensics, 1(1):102-110, 2006. Wet paper codes with improved embedding efficiency. Fridrich, editors, Proceedings ACM Multimedia and Security Workshop, Magdeburg, Germany, September 20-21, 2004, pages 4-15. Perturbed quantization steganography using wet paper codes. Wong, editors, Proceedings SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, volume 6505, pages 02-03, January 29-February 1 2007. Practical methods for minimizing embedding impact in steganography. Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67-81. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Fridrich, editors, Proceedings ACM Multimedia and Security Workshop, Geneva, Switzerland, September 26-27, 2006, pages 2-10. Minimizing the embedding impact in steganography. Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 340-354, 2002. Detecting hidden messages using higher-order statistics and support vector machines. IEEE Transactions on Information Forensics and Security, 1(1):111-119, 2006. Steganalysis using higher-order image statistics. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, and Watermarking of Multimedia Contents IV, San Jose, CA, January 21-24, 2002, volume 4675, pages 26-37. A communications approach to steganography. Cox, editors, Digital Watermarking, 2nd International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, volume 2939 of Lecture Notes in Computer Science, pages 35-49. Image steganography and steganalysis: Concepts and practice. Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 306-318. An information-theoretic model for steganography. A tutorial on support vector machines for pattern recognition. Personal communication available from, 1998. In Proceedings of International Conference on Image Processing, volume 3, pages 645-648, 2002. Image steganalysis with binary similarity measures. Wong, editors, Proceeedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, pages 523-531, 2001. Steganalysis using image quality metrics. EURASIP Journal on Applied Signal Processing, 17:2749-2757, 2005.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |