3 @String{elsevier={Elsevier Science Publishers B. V.}}
5 @String{springer={Springer-Verlag}}
6 @String{springer_loc={Berlin}}
7 @String{lncs={Lecture Notes in Computer Science}}
9 @String{ieecs={IEEE Computer Society}}
10 @String{ieecs_loc={Washington, DC}}
12 @String{isoc={The Internet Society}}
13 @String{isoc_loc={Washington DC/Reston}}
15 @String{westpress={Westview Press}}
16 @String{westpress_loc={Boulder, CO}}
18 @String{spie={Society of Photo-Optical Instrumentation Engineers}}
19 @String{spie_loc={Bellingham, WA}}
23 @String{NC = {Neural Computation}}
24 @String{TNN= {IEEE Transactions on Neural Networks}}
25 @String{STTT= {International Journal on Software Tools for Technology Transfer}}
26 @string{JACM={Journal of ACM}}
27 @String{JCAM={Journal of Computational and Applied Mathematics}}
29 @String{tcs={Theoretical Computer Science}}
30 @String{jtb={Journal of Theoretical Biology}}
31 @string{prenticeHall={Prentice-Hall, Inc.}}
32 @string{discreteapplMath={Discrete Applied Mathematics}}
33 @string{advapplMath={Advances in Applied Mathematics}}
34 @string{ijma= {International Journal of Mathematical Algorithms}}
35 @string{cs= {Cognitive Science}}
36 @string{siam={SIAM Journal on Computing}}
39 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
40 editor = {Ira S. Moskowitz},
41 author = {Shelby Pereira and
42 Sviatoslav Voloshynovskiy and
44 St{\'e}phane Marchand-Maillet and
46 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
47 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
48 title = {Second Generation Benchmarking and Application Oriented
54 address = springer_loc,
60 @inproceedings{DBLP:conf/ih/Westfeld01,
61 added-at = {2011-06-28T00:00:00.000+0200},
62 author = {Westfeld, Andreas},
63 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
64 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
65 editor = {Ira S. Moskowitz},
68 address = springer_loc,
71 title = {F5-A Steganographic Algorithm.},
80 @article{Chang20101286,
81 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
82 journal = "Digital Signal Processing",
85 pages = "1286 - 1307",
89 doi = "10.1016/j.dsp.2009.11.005",
90 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
91 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
92 keywords = "Security",
93 keywords = "Wet paper coding",
94 keywords = "Steganography",
95 keywords = "Indicator",
96 keywords = "Fuzzy edge detector"
101 @article{Hu:2007:HPE:1282866.1282944,
102 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
103 title = {A high performance edge detector based on fuzzy inference rules},
104 journal = {Inf. Sci.},
105 issue_date = {November, 2007},
111 pages = {4768--4784},
113 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
114 doi = {10.1016/j.ins.2007.04.001},
116 publisher = {Elsevier Science Inc.},
117 address = {New York, NY, USA},
118 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
122 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
123 author = {Sorina Dumitrescu and
125 editor = {Ahmet M. Eskicioglu and
126 Jessica J. Fridrich and
128 title = {LSB steganalysis based on high-order statistics},
129 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
130 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
133 address = {New York, NY, USA},
136 ee = {http://doi.acm.org/10.1145/1073170.1073176},
137 bibsource = {DBLP, http://dblp.uni-trier.de}
140 @inproceedings{DBLP:conf/ih/Ker05,
141 author = {Andrew D. Ker},
142 title = {A General Framework for Structural Steganalysis of LSB Replacement},
143 editor = {Mauro Barni and
144 Jordi Herrera-Joancomart\'{\i} and
145 Stefan Katzenbeisser and
146 Fernando P{\'e}rez-Gonz{\'a}lez},
147 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
148 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
151 ee = {http://dx.doi.org/10.1007/11558859_22},
152 publisher = springer,
153 address = springer_loc,
161 editor = {Matthias Kirchner and
163 booktitle = {Information Hiding - 14th International Conference, IH 2012,
164 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
165 author = {Jessica J. Fridrich and
167 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
171 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
173 publisher = springer,
174 address = springer_loc,
176 bibsource = {DBLP, http://dblp.uni-trier.de}
180 @article{DBLP:journals/tsp/DumitrescuWW03,
181 added-at = {2012-02-06T00:00:00.000+0100},
182 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
183 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
184 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
185 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
186 intrahash = {556caad9b61980d3458885153a52321c},
187 journal = {IEEE Transactions on Signal Processing},
191 timestamp = {2012-02-06T00:00:00.000+0100},
192 title = {Detection of LSB steganography via sample pair analysis.},
193 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
201 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
202 editor = {Nicolas D. Georganas and
203 Radu Popescu-Zeletin},
204 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
205 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
207 author = {Jessica J. Fridrich and
210 title = {Reliable detection of LSB steganography in color and grayscale
214 ee = {http://doi.acm.org/10.1145/1232454.1232466},
216 address = {New York, NY, USA},
218 bibsource = {DBLP, http://dblp.uni-trier.de}
225 @inproceedings{DBLP:conf/ih/PevnyFB10,
226 author = {Tom{\'a}s Pevn{\'y} and
229 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
231 editor = {Rainer B{\"o}hme and
232 Philip W. L. Fong and
233 Reihaneh Safavi-Naini},
234 booktitle = {Information Hiding - 12th International Conference, IH 2010,
235 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
240 publisher = springer,
241 address = springer_loc,
244 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
245 bibsource = {DBLP, http://dblp.uni-trier.de}
254 author = {Tom{\'a}s Pevn{\'y} and
258 title = {Break Our Steganographic System},
259 OPThowpublished = {},
262 note = {Available at \url{http://www.agents.cz/boss/}},
266 @proceedings{DBLP:conf/ih/2010,
267 editor = {Rainer B{\"o}hme and
268 Philip W. L. Fong and
269 Reihaneh Safavi-Naini},
270 title = {Information Hiding - 12th International Conference, IH 2010,
271 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
273 booktitle = {Information Hiding},
274 publisher = springer,
275 address = springer_loc,
279 isbn = {978-3-642-16434-7},
280 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
281 bibsource = {DBLP, http://dblp.uni-trier.de}
285 @article{DBLP:journals/eswa/ChenCL10,
286 added-at = {2010-07-21T15:44:10.000+0200},
287 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
288 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
290 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
291 interhash = {bc34a5f04661fee24ee62c39e76361be},
292 intrahash = {28889a4ab329da28559f0910469f054b},
293 journal = {Expert Systems with Applications},
297 timestamp = {2010-07-21T15:44:10.000+0200},
298 title = {High payload steganography mechanism using hybrid edge detector.},
299 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
304 @article{DBLP:journals/tifs/FillerJF11,
305 added-at = {2011-09-29T00:00:00.000+0200},
306 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
307 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
308 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
309 interhash = {b27d23ed0c9936d568e16c51378abccd},
310 intrahash = {50e43c05a74eec17524b3df8db442da5},
311 journal = {IEEE Transactions on Information Forensics and Security},
315 timestamp = {2011-09-29T00:00:00.000+0200},
316 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
317 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
325 @inproceedings{DBLP:conf/ih/KimDR06,
326 added-at = {2007-09-20T00:00:00.000+0200},
327 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
328 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
329 booktitle = {Information Hiding},
330 crossref = {DBLP:conf/ih/2006},
332 description = {dblp},
333 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
334 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
335 interhash = {399aab122b39cfd6f6e951a1b276c786},
336 intrahash = {f0324f70d62d9dfba568e393920aaa16},
337 isbn = {978-3-540-74123-7},
341 publisher = springer,
342 address = springer_loc,
344 timestamp = {2007-09-20T00:00:00.000+0200},
345 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
346 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
352 @proceedings{DBLP:conf/ih/2006,
353 editor = {Jan Camenisch and
354 Christian S. Collberg and
357 title = {Information Hiding, 8th International Workshop, IH 2006,
358 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
359 booktitle = {Information Hiding},
360 publisher = springer,
361 address = springer_loc,
365 isbn = {978-3-540-74123-7},
366 bibsource = {DBLP, http://dblp.uni-trier.de}
371 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
372 author = {Jessica J. Fridrich and
373 Tom{\'a}s Pevn{\'y} and
375 title = {Statistically undetectable jpeg steganography: dead ends
376 challenges, and opportunities},
378 ee = {http://doi.acm.org/10.1145/1288869.1288872},
379 editor = {Deepa Kundur and
380 Balakrishnan Prabhakaran and
382 Jessica J. Fridrich},
383 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
384 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
386 address = {New York, NY, USA},
389 isbn = {978-1-59593-857-2},
390 bibsource = {DBLP, http://dblp.uni-trier.de}
396 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
397 editor = {Nasir D. Memon and
401 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
402 Electronic Imaging Symposium, San Jose, CA, USA, January
403 18-20, 2010, Proceedings},
404 author = {Tom{\'a}s Filler and
406 Jessica J. Fridrich},
407 title = {Minimizing embedding impact in steganography using trellis-coded
411 ee = {http://dx.doi.org/10.1117/12.838002},
412 bibsource = {DBLP, http://dblp.uni-trier.de},
416 series = {SPIE Proceedings},
427 @proceedings{DBLP:conf/mediaforensics/2010,
428 editor = {Nasir D. Memon and
432 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
433 Electronic Imaging Symposium, San Jose, CA, USA, January
434 18-20, 2010, Proceedings},
435 booktitle = {Media Forensics and Security},
438 series = {SPIE Proceedings},
441 isbn = {978-0-8194-7934-1},
442 bibsource = {DBLP, http://dblp.uni-trier.de}
445 @article{DBLP:journals/corr/abs-1112-5239,
446 author = {Jacques M. Bahi and
447 Rapha{\"e}l Couturier and
448 Christophe Guyeux and
449 Pierre-Cyrille H{\'e}am},
450 title = {Efficient and Cryptographically Secure Generation of Chaotic
451 Pseudorandom Numbers on GPU},
453 volume = {abs/1112.5239},
455 ee = {http://arxiv.org/abs/1112.5239},
456 bibsource = {DBLP, http://dblp.uni-trier.de}
460 author = {Ponomarenko, Nikolay},
461 title = {PSNR-HVS-M page},
462 OPThowpublished = {},
465 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
471 author = {Bovik, Alan C.},
473 OPThowpublished = {},
476 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
481 @InProceedings{PSECAL07,
482 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
483 title = {On between-coefficient contrast masking of DCT basis functions},
484 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
487 editor = {Li,Baoxin},
493 OPTorganization = {},
501 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
502 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
503 journal = {IEEE Signal Processing Letters},
514 @inproceedings{DBLP:conf/crypto/ShubBB82,
515 author = {Lenore Blum and
518 title = {Comparison of Two Pseudo-Random Number Generators},
519 editor = {David Chaum and
522 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
523 Barbara, California, USA, August 23-25, 1982},
525 bibsource = {DBLP, http://dblp.uni-trier.de},
526 publisher = {Plenum Press},
527 address={New York, NY, USA},
530 bibsource = {DBLP, http://dblp.uni-trier.de}
534 @inproceedings{Blum:1985:EPP:19478.19501,
535 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
536 Barbara, California, USA, August 19-22, 1984, Proceedings},
537 author = {Manuel Blum and
539 title = {An Efficient Probabilistic Public-Key Encryption Scheme
540 Which Hides All Partial Information},
544 editor = {G. R. Blakley and
546 publisher = springer,
547 address = springer_loc,
554 @article{DBLP:journals/ejisec/FontaineG07,
555 author = {Caroline Fontaine and
557 title = {A Survey of Homomorphic Encryption for Nonspecialists},
558 journal = {EURASIP Journal on Information Security},
563 ee = {http://dx.doi.org/10.1155/2007/13801},
564 bibsource = {DBLP, http://dblp.uni-trier.de}
568 @article{Luo:2010:EAI:1824719.1824720,
569 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
570 title = {Edge adaptive image steganography based on LSB matching revisited},
571 journal = {IEEE Transactions on Information Forensics and Security},
579 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
580 doi = {10.1109/TIFS.2010.2041812},
582 publisher = {IEEE Press},
583 address = {Piscataway, NJ, USA},
584 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
587 @article{Mielikainen06,
588 author = {Mielikainen, J.},
589 title = {LSB Matching Revisited},
590 journal = {IEEE Signal Processing Letters},
605 @article{Liu:2008:FMP:1284917.1285196,
606 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
607 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
608 journal = {Pattern Recogn.},
609 issue_date = {January, 2008},
617 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
618 doi = {10.1016/j.patcog.2007.06.005},
620 publisher = {Elsevier Science Inc.},
621 address = {New York, NY, USA},
622 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
627 @InProceedings{LHS08,
628 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
629 title = {Textural features based universal steganalysis},
632 booktitle = {Proc. SPIE 6819},
643 OPTorganization = {},
651 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
652 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
655 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
659 pages = {78800L-78800L-13},
668 OPTorganization = {},
674 @article{DBLP:journals/tifs/KodovskyFH12,
675 author = {Jan Kodovsk{\'y} and
676 Jessica J. Fridrich and
678 title = {Ensemble Classifiers for Steganalysis of Digital Media},
679 journal = {IEEE Transactions on Information Forensics and Security},
684 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
685 bibsource = {DBLP, http://dblp.uni-trier.de}
690 @article{Fillatre:2012:ASL:2333143.2333587,
691 author = {Fillatre, Lionel},
692 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
693 journal = {IEEE Transactions on Signal Processing},
701 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
702 doi = {10.1109/TSP.2011.2174231},
704 publisher = {IEEE Press},
705 address = {Piscataway, NJ, USA},
709 @inproceedings{Tyan1993,
710 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
713 author = {Tyan, C. Y. and Wang, P. P.},
714 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
715 citeulike-article-id = {7936501},
716 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
718 posted-at = {2010-10-01 17:27:48},
721 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
727 @article{Canny:1986:CAE:11274.11275,
729 title = {A Computational Approach to Edge Detection},
730 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
731 issue_date = {June 1986},
739 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
740 doi = {10.1109/TPAMI.1986.4767851},
742 publisher = {IEEE Computer Society},
743 address = {Washington, DC, USA},
744 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
748 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
749 author = {Jessica J. Fridrich and
753 title = {Steganalysis of Content-Adaptive Steganography in Spatial
755 booktitle = {Information Hiding},
758 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
759 crossref = {DBLP:conf/ih/2011},
760 bibsource = {DBLP, http://dblp.uni-trier.de}
762 @proceedings{DBLP:conf/ih/2011,
763 editor = {Tom{\'a}s Filler and
764 Tom{\'a}s Pevn{\'y} and
767 title = {Information Hiding - 13th International Conference, IH 2011,
768 Prague, Czech Republic, May 18-20, 2011, Revised Selected
770 booktitle = {Information Hiding},
771 publisher = springer,
772 address = springer_loc,
776 isbn = {978-3-642-24177-2},
777 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
778 bibsource = {DBLP, http://dblp.uni-trier.de}
781 @inproceedings{DBLP:conf/iwdw/Fridrich11,
782 author = {Jessica J. Fridrich},
783 title = {Modern Trends in Steganography and Steganalysis},
787 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
788 crossref = {DBLP:conf/iwdw/2011},
789 bibsource = {DBLP, http://dblp.uni-trier.de}
791 @proceedings{DBLP:conf/iwdw/2011,
792 editor = {Yun-Qing Shi and
794 Fernando P{\'e}rez-Gonz{\'a}lez},
795 title = {Digital Forensics and Watermarking - 10th International
796 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
797 2011, Revised Selected Papers},
799 publisher = springer,
800 address = springer_loc,
804 isbn = {978-3-642-32204-4},
805 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
806 bibsource = {DBLP, http://dblp.uni-trier.de}