1 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
2 author = {Dumitrescu, Sorina and Wu, Xiaolin},
3 title = {LSB steganalysis based on high-order statistics},
4 booktitle = {Proceedings of the 7th workshop on Multimedia and security},
7 isbn = {1-59593-032-9},
8 location = {New York, NY, USA},
11 url = {http://doi.acm.org/10.1145/1073170.1073176},
12 doi = {10.1145/1073170.1073176},
15 address = {New York, NY, USA},
16 keywords = {LSB steganography, digital media, steganalysis},
19 @inproceedings{DBLP:conf/ih/Ker05,
20 author = {Andrew D. Ker},
21 title = {A General Framework for Structural Steganalysis of LSB Replacement},
22 booktitle = {Information Hiding},
25 ee = {http://dx.doi.org/10.1007/11558859_22},
26 crossref = {DBLP:conf/ih/2005},
27 bibsource = {DBLP, http://dblp.uni-trier.de}
29 @proceedings{DBLP:conf/ih/2005,
30 editor = {Mauro Barni and
31 Jordi Herrera-Joancomart\'{\i} and
32 Stefan Katzenbeisser and
33 Fernando P{\'e}rez-Gonz{\'a}lez},
34 title = {Information Hiding, 7th International Workshop, IH 2005,
35 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
36 booktitle = {Information Hiding},
37 publisher = {Springer},
38 series = {Lecture Notes in Computer Science},
41 isbn = {3-540-29039-7},
42 bibsource = {DBLP, http://dblp.uni-trier.de}
46 author = {Jessica J. Fridrich and
48 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
49 booktitle = {14th Information Hiding Conference},
52 publisher = {Springer},
53 address = {Berkeley, CA},
57 @article{DBLP:journals/tsp/DumitrescuWW03,
58 added-at = {2012-02-06T00:00:00.000+0100},
59 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
60 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
61 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
62 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
63 intrahash = {556caad9b61980d3458885153a52321c},
64 journal = {IEEE Transactions on Signal Processing},
68 timestamp = {2012-02-06T00:00:00.000+0100},
69 title = {Detection of LSB steganography via sample pair analysis.},
70 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
75 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
76 added-at = {2007-10-26T00:00:00.000+0200},
77 author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
78 biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
80 crossref = {DBLP:conf/mmsec/2001},
83 editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
84 ee = {http://doi.acm.org/10.1145/1232454.1232466},
85 interhash = {de49b3b9958119616eee66f14060f47f},
86 intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
87 isbn = {1-58113-393-6},
91 timestamp = {2007-10-26T00:00:00.000+0200},
92 title = {Reliable detection of LSB steganography in color and grayscale images.},
93 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
98 @proceedings{DBLP:conf/mmsec/2001,
99 editor = {Nicolas D. Georganas and
100 Radu Popescu-Zeletin},
101 title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
102 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
104 booktitle = {MM{\&}Sec},
107 isbn = {1-58113-393-6},
108 bibsource = {DBLP, http://dblp.uni-trier.de}
111 @inproceedings{DBLP:conf/ih/PevnyFB10,
112 added-at = {2010-10-08T00:00:00.000+0200},
113 author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick},
114 biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
115 booktitle = {Information Hiding},
116 crossref = {DBLP:conf/ih/2010},
117 editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
118 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
119 interhash = {b30869c1bb39a2c15b33e05e5139e58b},
120 intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
121 isbn = {978-3-642-16434-7},
124 publisher = {Springer},
125 series = {Lecture Notes in Computer Science},
126 timestamp = {2010-10-08T00:00:00.000+0200},
127 title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
128 url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
133 @proceedings{DBLP:conf/ih/2010,
134 editor = {Rainer B{\"o}hme and
135 Philip W. L. Fong and
136 Reihaneh Safavi-Naini},
137 title = {Information Hiding - 12th International Conference, IH 2010,
138 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
140 booktitle = {Information Hiding},
141 publisher = {Springer},
142 series = {Lecture Notes in Computer Science},
145 isbn = {978-3-642-16434-7},
146 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
147 bibsource = {DBLP, http://dblp.uni-trier.de}
151 @article{DBLP:journals/eswa/ChenCL10,
152 added-at = {2010-07-21T15:44:10.000+0200},
153 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
154 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
156 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
157 interhash = {bc34a5f04661fee24ee62c39e76361be},
158 intrahash = {28889a4ab329da28559f0910469f054b},
159 journal = {Expert Syst. Appl.},
163 timestamp = {2010-07-21T15:44:10.000+0200},
164 title = {High payload steganography mechanism using hybrid edge detector.},
165 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
170 @article{DBLP:journals/tifs/FillerJF11,
171 added-at = {2011-09-29T00:00:00.000+0200},
172 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
173 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
174 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
175 interhash = {b27d23ed0c9936d568e16c51378abccd},
176 intrahash = {50e43c05a74eec17524b3df8db442da5},
177 journal = {IEEE Transactions on Information Forensics and Security},
181 timestamp = {2011-09-29T00:00:00.000+0200},
182 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
183 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
190 @inproceedings{DBLP:conf/ih/Westfeld01,
191 added-at = {2011-06-28T00:00:00.000+0200},
192 author = {Westfeld, Andreas},
193 biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
194 booktitle = {Information Hiding},
195 crossref = {DBLP:conf/ih/2001},
196 editor = {Moskowitz, Ira S.},
197 ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
198 interhash = {e7eaa917e995dc9373f10304d3e79255},
199 intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
200 isbn = {3-540-42733-3},
203 publisher = {Springer},
204 series = {Lecture Notes in Computer Science},
205 timestamp = {2011-06-28T00:00:00.000+0200},
206 title = {F5-A Steganographic Algorithm.},
207 url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
212 @proceedings{DBLP:conf/ih/2001,
213 editor = {Ira S. Moskowitz},
214 title = {Information Hiding, 4th International Workshop, IHW 2001,
215 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
216 booktitle = {Information Hiding},
217 publisher = {Springer},
218 series = {Lecture Notes in Computer Science},
221 isbn = {3-540-42733-3},
222 bibsource = {DBLP, http://dblp.uni-trier.de}
225 @inproceedings{DBLP:conf/ih/KimDR06,
226 added-at = {2007-09-20T00:00:00.000+0200},
227 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
228 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
229 booktitle = {Information Hiding},
230 crossref = {DBLP:conf/ih/2006},
232 description = {dblp},
233 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
234 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
235 interhash = {399aab122b39cfd6f6e951a1b276c786},
236 intrahash = {f0324f70d62d9dfba568e393920aaa16},
237 isbn = {978-3-540-74123-7},
240 publisher = {Springer},
241 series = {Lecture Notes in Computer Science},
242 timestamp = {2007-09-20T00:00:00.000+0200},
243 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
244 url = {http://dblp.uni-trier.de/db/conf/ih/ih2006.html#KimDR06},
250 @proceedings{DBLP:conf/ih/2006,
251 editor = {Jan Camenisch and
252 Christian S. Collberg and
255 title = {Information Hiding, 8th International Workshop, IH 2006,
256 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
257 booktitle = {Information Hiding},
258 publisher = {Springer},
259 series = {Lecture Notes in Computer Science},
262 isbn = {978-3-540-74123-7},
263 bibsource = {DBLP, http://dblp.uni-trier.de}
266 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
267 added-at = {2007-10-26T00:00:00.000+0200},
268 author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan},
269 biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
271 crossref = {DBLP:conf/mmsec/2007},
273 description = {dblp},
274 editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
275 ee = {http://doi.acm.org/10.1145/1288869.1288872},
276 interhash = {35c4a20b41b7861bcb09c9ff335ac601},
277 intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
278 isbn = {978-1-59593-857-2},
282 timestamp = {2007-10-26T00:00:00.000+0200},
283 title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
284 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
288 @proceedings{DBLP:conf/mmsec/2007,
289 editor = {Deepa Kundur and
290 Balakrishnan Prabhakaran and
292 Jessica J. Fridrich},
293 title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
294 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
295 booktitle = {MM{\&}Sec},
298 isbn = {978-1-59593-857-2},
299 bibsource = {DBLP, http://dblp.uni-trier.de}
302 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
303 added-at = {2010-08-21T00:00:00.000+0200},
304 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
305 biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
306 booktitle = {Media Forensics and Security},
307 crossref = {DBLP:conf/mediaforensics/2010},
308 editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
309 ee = {http://dx.doi.org/10.1117/12.838002},
310 interhash = {a3d2215b959361a30f0b48f15c012bc9},
311 intrahash = {3405985533dce431b5013941a2c2c2cc},
312 isbn = {978-0-8194-7934-1},
316 series = {SPIE Proceedings},
317 timestamp = {2010-08-21T00:00:00.000+0200},
318 title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
319 url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
325 @proceedings{DBLP:conf/mediaforensics/2010,
326 editor = {Nasir D. Memon and
330 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
331 Electronic Imaging Symposium, San Jose, CA, USA, January
332 18-20, 2010, Proceedings},
333 booktitle = {Media Forensics and Security},
335 series = {SPIE Proceedings},
338 isbn = {978-0-8194-7934-1},
339 bibsource = {DBLP, http://dblp.uni-trier.de}
343 @article{Luo:2010:EAI:1824719.1824720,
344 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
345 title = {Edge adaptive image steganography based on LSB matching revisited},
346 journal = {Trans. Info. For. Sec.},
347 issue_date = {June 2010},
355 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
356 doi = {10.1109/TIFS.2010.2041812},
358 publisher = {IEEE Press},
359 address = {Piscataway, NJ, USA},
360 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
363 @article{Mielikainen06,
364 author = {Mielikainen, J.},
365 title = {LSB Matching Revisited},
366 journal = {Signal Processing Letters},
381 @article{Liu:2008:FMP:1284917.1285196,
382 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
383 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
384 journal = {Pattern Recogn.},
385 issue_date = {January, 2008},
393 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
394 doi = {10.1016/j.patcog.2007.06.005},
396 publisher = {Elsevier Science Inc.},
397 address = {New York, NY, USA},
398 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
403 @InProceedings{LHS08,
404 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
405 title = {Textural features based universal steganalysis},
408 booktitle = {Proc. SPIE 6819},
417 OPTorganization = {},
425 author = {Jan Kodovský and Jessica Fridrich},
426 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
429 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
438 OPTorganization = {},
444 @article{DBLP:journals/tifs/KodovskyFH12,
445 author = {Jan Kodovsk{\'y} and
446 Jessica J. Fridrich and
448 title = {Ensemble Classifiers for Steganalysis of Digital Media},
449 journal = {IEEE Transactions on Information Forensics and Security},
454 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
455 bibsource = {DBLP, http://dblp.uni-trier.de}
460 @article{Fillatre:2012:ASL:2333143.2333587,
461 author = {Fillatre, Lionel},
462 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
463 journal = {Trans. Sig. Proc.},
464 issue_date = {February 2012},
472 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
473 doi = {10.1109/TSP.2011.2174231},
475 publisher = {IEEE Press},
476 address = {Piscataway, NJ, USA},