1 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
2 author = {Shelby Pereira and
3 Sviatoslav Voloshynovskiy and
5 St{\'e}phane Marchand-Maillet and
7 title = {Second Generation Benchmarking and Application Oriented
9 booktitle = {Information Hiding},
12 ee = {http://dx.doi.org/10.1007/3-540-45496-9_25},
13 crossref = {DBLP:conf/ih/2001},
14 bibsource = {DBLP, http://dblp.uni-trier.de}
16 @proceedings{DBLP:conf/ih/2001,
17 editor = {Ira S. Moskowitz},
18 title = {Information Hiding, 4th International Workshop, IHW 2001,
19 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
20 booktitle = {Information Hiding},
21 publisher = {Springer},
22 series = {Lecture Notes in Computer Science},
25 isbn = {3-540-42733-3},
26 bibsource = {DBLP, http://dblp.uni-trier.de}
28 @article{Hu:2007:HPE:1282866.1282944,
29 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
30 title = {A high performance edge detector based on fuzzy inference rules},
31 journal = {Inf. Sci.},
32 issue_date = {November, 2007},
40 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
41 doi = {10.1016/j.ins.2007.04.001},
43 publisher = {Elsevier Science Inc.},
44 address = {New York, NY, USA},
45 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
47 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
48 author = {Dumitrescu, Sorina and Wu, Xiaolin},
49 title = {LSB steganalysis based on high-order statistics},
50 booktitle = {Proceedings of the 7th workshop on Multimedia and security},
53 isbn = {1-59593-032-9},
54 location = {New York, NY, USA},
57 url = {http://doi.acm.org/10.1145/1073170.1073176},
58 doi = {10.1145/1073170.1073176},
61 address = {New York, NY, USA},
62 keywords = {LSB steganography, digital media, steganalysis},
65 @inproceedings{DBLP:conf/ih/Ker05,
66 author = {Andrew D. Ker},
67 title = {A General Framework for Structural Steganalysis of LSB Replacement},
68 booktitle = {Information Hiding},
71 ee = {http://dx.doi.org/10.1007/11558859_22},
72 crossref = {DBLP:conf/ih/2005},
73 bibsource = {DBLP, http://dblp.uni-trier.de}
75 @proceedings{DBLP:conf/ih/2005,
76 editor = {Mauro Barni and
77 Jordi Herrera-Joancomart\'{\i} and
78 Stefan Katzenbeisser and
79 Fernando P{\'e}rez-Gonz{\'a}lez},
80 title = {Information Hiding, 7th International Workshop, IH 2005,
81 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
82 booktitle = {Information Hiding},
83 publisher = {Springer},
84 series = {Lecture Notes in Computer Science},
87 isbn = {3-540-29039-7},
88 bibsource = {DBLP, http://dblp.uni-trier.de}
92 author = {Jessica J. Fridrich and
94 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
95 booktitle = {14th Information Hiding Conference},
98 publisher = {Springer},
99 address = {Berkeley, CA},
103 @article{DBLP:journals/tsp/DumitrescuWW03,
104 added-at = {2012-02-06T00:00:00.000+0100},
105 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
106 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
107 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
108 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
109 intrahash = {556caad9b61980d3458885153a52321c},
110 journal = {IEEE Transactions on Signal Processing},
114 timestamp = {2012-02-06T00:00:00.000+0100},
115 title = {Detection of LSB steganography via sample pair analysis.},
116 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
121 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
122 added-at = {2007-10-26T00:00:00.000+0200},
123 author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
124 biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
126 crossref = {DBLP:conf/mmsec/2001},
128 description = {dblp},
129 editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
130 ee = {http://doi.acm.org/10.1145/1232454.1232466},
131 interhash = {de49b3b9958119616eee66f14060f47f},
132 intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
133 isbn = {1-58113-393-6},
137 timestamp = {2007-10-26T00:00:00.000+0200},
138 title = {Reliable detection of LSB steganography in color and grayscale images.},
139 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
144 @proceedings{DBLP:conf/mmsec/2001,
145 editor = {Nicolas D. Georganas and
146 Radu Popescu-Zeletin},
147 title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
148 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
150 booktitle = {MM{\&}Sec},
153 isbn = {1-58113-393-6},
154 bibsource = {DBLP, http://dblp.uni-trier.de}
157 @inproceedings{DBLP:conf/ih/PevnyFB10,
158 added-at = {2010-10-08T00:00:00.000+0200},
159 author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick},
160 biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
161 booktitle = {Information Hiding},
162 crossref = {DBLP:conf/ih/2010},
163 editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
164 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
165 interhash = {b30869c1bb39a2c15b33e05e5139e58b},
166 intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
167 isbn = {978-3-642-16434-7},
170 publisher = {Springer},
171 series = {Lecture Notes in Computer Science},
172 timestamp = {2010-10-08T00:00:00.000+0200},
173 title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
174 url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
179 @proceedings{DBLP:conf/ih/2010,
180 editor = {Rainer B{\"o}hme and
181 Philip W. L. Fong and
182 Reihaneh Safavi-Naini},
183 title = {Information Hiding - 12th International Conference, IH 2010,
184 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
186 booktitle = {Information Hiding},
187 publisher = {Springer},
188 series = {Lecture Notes in Computer Science},
191 isbn = {978-3-642-16434-7},
192 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
193 bibsource = {DBLP, http://dblp.uni-trier.de}
197 @article{DBLP:journals/eswa/ChenCL10,
198 added-at = {2010-07-21T15:44:10.000+0200},
199 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
200 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
202 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
203 interhash = {bc34a5f04661fee24ee62c39e76361be},
204 intrahash = {28889a4ab329da28559f0910469f054b},
205 journal = {Expert Syst. Appl.},
209 timestamp = {2010-07-21T15:44:10.000+0200},
210 title = {High payload steganography mechanism using hybrid edge detector.},
211 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
216 @article{DBLP:journals/tifs/FillerJF11,
217 added-at = {2011-09-29T00:00:00.000+0200},
218 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
219 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
220 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
221 interhash = {b27d23ed0c9936d568e16c51378abccd},
222 intrahash = {50e43c05a74eec17524b3df8db442da5},
223 journal = {IEEE Transactions on Information Forensics and Security},
227 timestamp = {2011-09-29T00:00:00.000+0200},
228 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
229 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
236 @inproceedings{DBLP:conf/ih/Westfeld01,
237 added-at = {2011-06-28T00:00:00.000+0200},
238 author = {Westfeld, Andreas},
239 biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
240 booktitle = {Information Hiding},
241 crossref = {DBLP:conf/ih/2001},
242 editor = {Moskowitz, Ira S.},
243 ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
244 interhash = {e7eaa917e995dc9373f10304d3e79255},
245 intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
246 isbn = {3-540-42733-3},
249 publisher = {Springer},
250 series = {Lecture Notes in Computer Science},
251 timestamp = {2011-06-28T00:00:00.000+0200},
252 title = {F5-A Steganographic Algorithm.},
253 url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
258 @proceedings{DBLP:conf/ih/2001,
259 editor = {Ira S. Moskowitz},
260 title = {Information Hiding, 4th International Workshop, IHW 2001,
261 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
262 booktitle = {Information Hiding},
263 publisher = {Springer},
264 series = {Lecture Notes in Computer Science},
267 isbn = {3-540-42733-3},
268 bibsource = {DBLP, http://dblp.uni-trier.de}
271 @inproceedings{DBLP:conf/ih/KimDR06,
272 added-at = {2007-09-20T00:00:00.000+0200},
273 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
274 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
275 booktitle = {Information Hiding},
276 crossref = {DBLP:conf/ih/2006},
278 description = {dblp},
279 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
280 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
281 interhash = {399aab122b39cfd6f6e951a1b276c786},
282 intrahash = {f0324f70d62d9dfba568e393920aaa16},
283 isbn = {978-3-540-74123-7},
286 publisher = {Springer},
287 series = {Lecture Notes in Computer Science},
288 timestamp = {2007-09-20T00:00:00.000+0200},
289 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
290 url = {http://dblp.uni-trier.de/db/conf/ih/ih2006.html#KimDR06},
296 @proceedings{DBLP:conf/ih/2006,
297 editor = {Jan Camenisch and
298 Christian S. Collberg and
301 title = {Information Hiding, 8th International Workshop, IH 2006,
302 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
303 booktitle = {Information Hiding},
304 publisher = {Springer},
305 series = {Lecture Notes in Computer Science},
308 isbn = {978-3-540-74123-7},
309 bibsource = {DBLP, http://dblp.uni-trier.de}
312 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
313 added-at = {2007-10-26T00:00:00.000+0200},
314 author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan},
315 biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
317 crossref = {DBLP:conf/mmsec/2007},
319 description = {dblp},
320 editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
321 ee = {http://doi.acm.org/10.1145/1288869.1288872},
322 interhash = {35c4a20b41b7861bcb09c9ff335ac601},
323 intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
324 isbn = {978-1-59593-857-2},
328 timestamp = {2007-10-26T00:00:00.000+0200},
329 title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
330 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
334 @proceedings{DBLP:conf/mmsec/2007,
335 editor = {Deepa Kundur and
336 Balakrishnan Prabhakaran and
338 Jessica J. Fridrich},
339 title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
340 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
341 booktitle = {MM{\&}Sec},
344 isbn = {978-1-59593-857-2},
345 bibsource = {DBLP, http://dblp.uni-trier.de}
348 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
349 added-at = {2010-08-21T00:00:00.000+0200},
350 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
351 biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
352 booktitle = {Media Forensics and Security},
353 crossref = {DBLP:conf/mediaforensics/2010},
354 editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
355 ee = {http://dx.doi.org/10.1117/12.838002},
356 interhash = {a3d2215b959361a30f0b48f15c012bc9},
357 intrahash = {3405985533dce431b5013941a2c2c2cc},
358 isbn = {978-0-8194-7934-1},
362 series = {SPIE Proceedings},
363 timestamp = {2010-08-21T00:00:00.000+0200},
364 title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
365 url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
371 @proceedings{DBLP:conf/mediaforensics/2010,
372 editor = {Nasir D. Memon and
376 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
377 Electronic Imaging Symposium, San Jose, CA, USA, January
378 18-20, 2010, Proceedings},
379 booktitle = {Media Forensics and Security},
381 series = {SPIE Proceedings},
384 isbn = {978-0-8194-7934-1},
385 bibsource = {DBLP, http://dblp.uni-trier.de}
388 @article{DBLP:journals/corr/abs-1112-5239,
389 author = {Jacques M. Bahi and
390 Rapha{\"e}l Couturier and
391 Christophe Guyeux and
392 Pierre-Cyrille H{\'e}am},
393 title = {Efficient and Cryptographically Secure Generation of Chaotic
394 Pseudorandom Numbers on GPU},
396 volume = {abs/1112.5239},
398 ee = {http://arxiv.org/abs/1112.5239},
399 bibsource = {DBLP, http://dblp.uni-trier.de}
403 author = {Ponomarenko, Nikolay},
404 title = {PSNR-HVS-M page},
405 OPThowpublished = {},
408 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
414 author = {Bovik, Alan C.},
416 OPThowpublished = {},
419 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
424 @InProceedings{PSECAL07,
425 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
426 title = {On between-coefficient contrast masking of DCT basis functions},
427 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
430 editor = {Li,Baoxin},
436 OPTorganization = {},
444 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
445 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
446 journal = {IEEE Signal Processing Letters},
457 @inproceedings{DBLP:conf/crypto/ShubBB82,
458 author = {Lenore Blum and
461 title = {Comparison of Two Pseudo-Random Number Generators},
462 booktitle = {CRYPTO},
465 crossref = {DBLP:conf/crypto/1982},
466 bibsource = {DBLP, http://dblp.uni-trier.de}
468 @proceedings{DBLP:conf/crypto/1982,
469 editor = {David Chaum and
472 title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
473 Barbara, California, USA, August 23-25, 1982},
474 booktitle = {CRYPTO},
475 publisher = {Plenum Press, New York},
477 bibsource = {DBLP, http://dblp.uni-trier.de}
480 @inproceedings{Blum:1985:EPP:19478.19501,
481 author = {Blum, Manuel and Goldwasser, Shafi},
482 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
483 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
485 isbn = {0-387-15658-5},
486 location = {Santa Barbara, California, United States},
489 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
491 publisher = {Springer-Verlag New York, Inc.},
492 address = {New York, NY, USA},
493 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
496 @article{DBLP:journals/ejisec/FontaineG07,
497 author = {Caroline Fontaine and
499 title = {A Survey of Homomorphic Encryption for Nonspecialists},
500 journal = {EURASIP J. Information Security},
503 ee = {http://dx.doi.org/10.1155/2007/13801},
504 bibsource = {DBLP, http://dblp.uni-trier.de}
508 @article{Luo:2010:EAI:1824719.1824720,
509 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
510 title = {Edge adaptive image steganography based on LSB matching revisited},
511 journal = {Trans. Info. For. Sec.},
512 issue_date = {June 2010},
520 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
521 doi = {10.1109/TIFS.2010.2041812},
523 publisher = {IEEE Press},
524 address = {Piscataway, NJ, USA},
525 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
528 @article{Mielikainen06,
529 author = {Mielikainen, J.},
530 title = {LSB Matching Revisited},
531 journal = {Signal Processing Letters},
546 @article{Liu:2008:FMP:1284917.1285196,
547 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
548 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
549 journal = {Pattern Recogn.},
550 issue_date = {January, 2008},
558 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
559 doi = {10.1016/j.patcog.2007.06.005},
561 publisher = {Elsevier Science Inc.},
562 address = {New York, NY, USA},
563 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
568 @InProceedings{LHS08,
569 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
570 title = {Textural features based universal steganalysis},
573 booktitle = {Proc. SPIE 6819},
582 OPTorganization = {},
590 author = {Jan Kodovský and Jessica Fridrich},
591 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
594 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
603 OPTorganization = {},
609 @article{DBLP:journals/tifs/KodovskyFH12,
610 author = {Jan Kodovsk{\'y} and
611 Jessica J. Fridrich and
613 title = {Ensemble Classifiers for Steganalysis of Digital Media},
614 journal = {IEEE Transactions on Information Forensics and Security},
619 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
620 bibsource = {DBLP, http://dblp.uni-trier.de}
625 @article{Fillatre:2012:ASL:2333143.2333587,
626 author = {Fillatre, Lionel},
627 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
628 journal = {Trans. Sig. Proc.},
629 issue_date = {February 2012},
637 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
638 doi = {10.1109/TSP.2011.2174231},
640 publisher = {IEEE Press},
641 address = {Piscataway, NJ, USA},
645 @inproceedings{Tyan1993,
646 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
647 address = {{San Francisco, CA, USA}},
648 author = {Tyan, C. Y. and Wang, P. P.},
649 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
650 citeulike-article-id = {7936501},
651 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
653 posted-at = {2010-10-01 17:27:48},
655 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
661 @article{Canny:1986:CAE:11274.11275,
663 title = {A Computational Approach to Edge Detection},
664 journal = {IEEE Trans. Pattern Anal. Mach. Intell.},
665 issue_date = {June 1986},
673 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
674 doi = {10.1109/TPAMI.1986.4767851},
676 publisher = {IEEE Computer Society},
677 address = {Washington, DC, USA},
678 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
682 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
683 author = {Jessica J. Fridrich and
687 title = {Steganalysis of Content-Adaptive Steganography in Spatial
689 booktitle = {Information Hiding},
692 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
693 crossref = {DBLP:conf/ih/2011},
694 bibsource = {DBLP, http://dblp.uni-trier.de}
696 @proceedings{DBLP:conf/ih/2011,
697 editor = {Tom{\'a}s Filler and
698 Tom{\'a}s Pevn{\'y} and
701 title = {Information Hiding - 13th International Conference, IH 2011,
702 Prague, Czech Republic, May 18-20, 2011, Revised Selected
704 booktitle = {Information Hiding},
705 publisher = {Springer},
706 series = {Lecture Notes in Computer Science},
709 isbn = {978-3-642-24177-2},
710 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
711 bibsource = {DBLP, http://dblp.uni-trier.de}
714 @inproceedings{DBLP:conf/iwdw/Fridrich11,
715 author = {Jessica J. Fridrich},
716 title = {Modern Trends in Steganography and Steganalysis},
720 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
721 crossref = {DBLP:conf/iwdw/2011},
722 bibsource = {DBLP, http://dblp.uni-trier.de}
724 @proceedings{DBLP:conf/iwdw/2011,
725 editor = {Yun-Qing Shi and
727 Fernando P{\'e}rez-Gonz{\'a}lez},
728 title = {Digital Forensics and Watermarking - 10th International
729 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
730 2011, Revised Selected Papers},
732 publisher = {Springer},
733 series = {Lecture Notes in Computer Science},
736 isbn = {978-3-642-32204-4},
737 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
738 bibsource = {DBLP, http://dblp.uni-trier.de}