1 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
2 author = {Shelby Pereira and
3 Sviatoslav Voloshynovskiy and
5 St{\'e}phane Marchand-Maillet and
7 title = {Second Generation Benchmarking and Application Oriented
9 booktitle = {Information Hiding},
12 ee = {http://dx.doi.org/10.1007/3-540-45496-9_25},
13 crossref = {DBLP:conf/ih/2001},
14 bibsource = {DBLP, http://dblp.uni-trier.de}
16 @proceedings{DBLP:conf/ih/2001,
17 editor = {Ira S. Moskowitz},
18 title = {Information Hiding, 4th International Workshop, IHW 2001,
19 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
20 booktitle = {Information Hiding},
21 publisher = {Springer},
22 series = {Lecture Notes in Computer Science},
25 isbn = {3-540-42733-3},
26 bibsource = {DBLP, http://dblp.uni-trier.de}
29 @article{Chang20101286,
30 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
31 journal = "Digital Signal Processing",
34 pages = "1286 - 1307",
38 doi = "10.1016/j.dsp.2009.11.005",
39 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
40 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
41 keywords = "Security",
42 keywords = "Wet paper coding",
43 keywords = "Steganography",
44 keywords = "Indicator",
45 keywords = "Fuzzy edge detector"
50 @article{Hu:2007:HPE:1282866.1282944,
51 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
52 title = {A high performance edge detector based on fuzzy inference rules},
53 journal = {Inf. Sci.},
54 issue_date = {November, 2007},
62 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
63 doi = {10.1016/j.ins.2007.04.001},
65 publisher = {Elsevier Science Inc.},
66 address = {New York, NY, USA},
67 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
69 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
70 author = {Dumitrescu, Sorina and Wu, Xiaolin},
71 title = {LSB steganalysis based on high-order statistics},
72 booktitle = {Proceedings of the 7th workshop on Multimedia and security},
75 isbn = {1-59593-032-9},
76 location = {New York, NY, USA},
79 url = {http://doi.acm.org/10.1145/1073170.1073176},
80 doi = {10.1145/1073170.1073176},
83 address = {New York, NY, USA},
84 keywords = {LSB steganography, digital media, steganalysis},
87 @inproceedings{DBLP:conf/ih/Ker05,
88 author = {Andrew D. Ker},
89 title = {A General Framework for Structural Steganalysis of LSB Replacement},
90 booktitle = {Information Hiding},
93 ee = {http://dx.doi.org/10.1007/11558859_22},
94 crossref = {DBLP:conf/ih/2005},
95 bibsource = {DBLP, http://dblp.uni-trier.de}
97 @proceedings{DBLP:conf/ih/2005,
98 editor = {Mauro Barni and
99 Jordi Herrera-Joancomart\'{\i} and
100 Stefan Katzenbeisser and
101 Fernando P{\'e}rez-Gonz{\'a}lez},
102 title = {Information Hiding, 7th International Workshop, IH 2005,
103 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
104 booktitle = {Information Hiding},
105 publisher = {Springer},
106 series = {Lecture Notes in Computer Science},
109 isbn = {3-540-29039-7},
110 bibsource = {DBLP, http://dblp.uni-trier.de}
114 author = {Jessica J. Fridrich and
116 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
117 booktitle = {14th Information Hiding Conference},
120 publisher = {Springer},
121 address = {Berkeley, CA},
125 @article{DBLP:journals/tsp/DumitrescuWW03,
126 added-at = {2012-02-06T00:00:00.000+0100},
127 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
128 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
129 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
130 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
131 intrahash = {556caad9b61980d3458885153a52321c},
132 journal = {IEEE Transactions on Signal Processing},
136 timestamp = {2012-02-06T00:00:00.000+0100},
137 title = {Detection of LSB steganography via sample pair analysis.},
138 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
143 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
144 added-at = {2007-10-26T00:00:00.000+0200},
145 author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
146 biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
148 crossref = {DBLP:conf/mmsec/2001},
150 description = {dblp},
151 editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
152 ee = {http://doi.acm.org/10.1145/1232454.1232466},
153 interhash = {de49b3b9958119616eee66f14060f47f},
154 intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
155 isbn = {1-58113-393-6},
159 timestamp = {2007-10-26T00:00:00.000+0200},
160 title = {Reliable detection of LSB steganography in color and grayscale images.},
161 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
166 @proceedings{DBLP:conf/mmsec/2001,
167 editor = {Nicolas D. Georganas and
168 Radu Popescu-Zeletin},
169 title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
170 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
172 booktitle = {MM{\&}Sec},
175 isbn = {1-58113-393-6},
176 bibsource = {DBLP, http://dblp.uni-trier.de}
179 @inproceedings{DBLP:conf/ih/PevnyFB10,
180 added-at = {2010-10-08T00:00:00.000+0200},
181 author = {Pevn{\'y}, Tom{\'a}s and Filler, Tom{\'a}s and Bas, Patrick},
182 biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
183 booktitle = {Information Hiding},
184 crossref = {DBLP:conf/ih/2010},
185 editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
186 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
187 interhash = {b30869c1bb39a2c15b33e05e5139e58b},
188 intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
189 isbn = {978-3-642-16434-7},
192 publisher = {Springer},
193 series = {Lecture Notes in Computer Science},
194 timestamp = {2010-10-08T00:00:00.000+0200},
195 title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
196 url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
204 author = {Pevný, Tomáš and Filler, Tomáš and Bas, Patrick},
205 title = {Break Our Steganographic System},
206 OPThowpublished = {},
209 note = { available at \url{http://www.agents.cz/boss/}},
213 @proceedings{DBLP:conf/ih/2010,
214 editor = {Rainer B{\"o}hme and
215 Philip W. L. Fong and
216 Reihaneh Safavi-Naini},
217 title = {Information Hiding - 12th International Conference, IH 2010,
218 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
220 booktitle = {Information Hiding},
221 publisher = {Springer},
222 series = {Lecture Notes in Computer Science},
225 isbn = {978-3-642-16434-7},
226 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
227 bibsource = {DBLP, http://dblp.uni-trier.de}
231 @article{DBLP:journals/eswa/ChenCL10,
232 added-at = {2010-07-21T15:44:10.000+0200},
233 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
234 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
236 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
237 interhash = {bc34a5f04661fee24ee62c39e76361be},
238 intrahash = {28889a4ab329da28559f0910469f054b},
239 journal = {Expert Syst. Appl.},
243 timestamp = {2010-07-21T15:44:10.000+0200},
244 title = {High payload steganography mechanism using hybrid edge detector.},
245 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
250 @article{DBLP:journals/tifs/FillerJF11,
251 added-at = {2011-09-29T00:00:00.000+0200},
252 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
253 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
254 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
255 interhash = {b27d23ed0c9936d568e16c51378abccd},
256 intrahash = {50e43c05a74eec17524b3df8db442da5},
257 journal = {IEEE Transactions on Information Forensics and Security},
261 timestamp = {2011-09-29T00:00:00.000+0200},
262 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
263 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
270 @inproceedings{DBLP:conf/ih/Westfeld01,
271 added-at = {2011-06-28T00:00:00.000+0200},
272 author = {Westfeld, Andreas},
273 biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
274 booktitle = {Information Hiding},
275 crossref = {DBLP:conf/ih/2001},
276 editor = {Moskowitz, Ira S.},
277 ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
278 interhash = {e7eaa917e995dc9373f10304d3e79255},
279 intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
280 isbn = {3-540-42733-3},
283 publisher = {Springer},
284 series = {Lecture Notes in Computer Science},
285 timestamp = {2011-06-28T00:00:00.000+0200},
286 title = {F5-A Steganographic Algorithm.},
287 url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
293 @inproceedings{DBLP:conf/ih/KimDR06,
294 added-at = {2007-09-20T00:00:00.000+0200},
295 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
296 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
297 booktitle = {Information Hiding},
298 crossref = {DBLP:conf/ih/2006},
300 description = {dblp},
301 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
302 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
303 interhash = {399aab122b39cfd6f6e951a1b276c786},
304 intrahash = {f0324f70d62d9dfba568e393920aaa16},
305 isbn = {978-3-540-74123-7},
308 publisher = {Springer},
309 series = {Lecture Notes in Computer Science},
310 timestamp = {2007-09-20T00:00:00.000+0200},
311 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
312 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
318 @proceedings{DBLP:conf/ih/2006,
319 editor = {Jan Camenisch and
320 Christian S. Collberg and
323 title = {Information Hiding, 8th International Workshop, IH 2006,
324 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
325 booktitle = {Information Hiding},
326 publisher = {Springer},
327 series = {Lecture Notes in Computer Science},
330 isbn = {978-3-540-74123-7},
331 bibsource = {DBLP, http://dblp.uni-trier.de}
334 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
335 added-at = {2007-10-26T00:00:00.000+0200},
336 author = {Fridrich, Jessica J. and Pevn{\'y}, Tom{\'a}s and Kodovsk{\'y}, Jan},
337 biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
339 crossref = {DBLP:conf/mmsec/2007},
341 description = {dblp},
342 editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
343 ee = {http://doi.acm.org/10.1145/1288869.1288872},
344 interhash = {35c4a20b41b7861bcb09c9ff335ac601},
345 intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
346 isbn = {978-1-59593-857-2},
350 timestamp = {2007-10-26T00:00:00.000+0200},
351 title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
352 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
356 @proceedings{DBLP:conf/mmsec/2007,
357 editor = {Deepa Kundur and
358 Balakrishnan Prabhakaran and
360 Jessica J. Fridrich},
361 title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
362 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
363 booktitle = {MM{\&}Sec},
366 isbn = {978-1-59593-857-2},
367 bibsource = {DBLP, http://dblp.uni-trier.de}
370 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
371 added-at = {2010-08-21T00:00:00.000+0200},
372 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
373 biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
374 booktitle = {Media Forensics and Security},
375 crossref = {DBLP:conf/mediaforensics/2010},
376 editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
377 ee = {http://dx.doi.org/10.1117/12.838002},
378 interhash = {a3d2215b959361a30f0b48f15c012bc9},
379 intrahash = {3405985533dce431b5013941a2c2c2cc},
380 isbn = {978-0-8194-7934-1},
384 series = {SPIE Proceedings},
385 timestamp = {2010-08-21T00:00:00.000+0200},
386 title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
387 url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
393 @proceedings{DBLP:conf/mediaforensics/2010,
394 editor = {Nasir D. Memon and
398 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
399 Electronic Imaging Symposium, San Jose, CA, USA, January
400 18-20, 2010, Proceedings},
401 booktitle = {Media Forensics and Security},
403 series = {SPIE Proceedings},
406 isbn = {978-0-8194-7934-1},
407 bibsource = {DBLP, http://dblp.uni-trier.de}
410 @article{DBLP:journals/corr/abs-1112-5239,
411 author = {Jacques M. Bahi and
412 Rapha{\"e}l Couturier and
413 Christophe Guyeux and
414 Pierre-Cyrille H{\'e}am},
415 title = {Efficient and Cryptographically Secure Generation of Chaotic
416 Pseudorandom Numbers on GPU},
418 volume = {abs/1112.5239},
420 ee = {http://arxiv.org/abs/1112.5239},
421 bibsource = {DBLP, http://dblp.uni-trier.de}
425 author = {Ponomarenko, Nikolay},
426 title = {PSNR-HVS-M page},
427 OPThowpublished = {},
430 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
436 author = {Bovik, Alan C.},
438 OPThowpublished = {},
441 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
446 @InProceedings{PSECAL07,
447 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
448 title = {On between-coefficient contrast masking of DCT basis functions},
449 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
452 editor = {Li,Baoxin},
458 OPTorganization = {},
466 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
467 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
468 journal = {IEEE Signal Processing Letters},
479 @inproceedings{DBLP:conf/crypto/ShubBB82,
480 author = {Lenore Blum and
483 title = {Comparison of Two Pseudo-Random Number Generators},
484 booktitle = {CRYPTO},
487 crossref = {DBLP:conf/crypto/1982},
488 bibsource = {DBLP, http://dblp.uni-trier.de}
490 @proceedings{DBLP:conf/crypto/1982,
491 editor = {David Chaum and
494 title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
495 Barbara, California, USA, August 23-25, 1982},
496 booktitle = {CRYPTO},
497 publisher = {Plenum Press, New York},
499 bibsource = {DBLP, http://dblp.uni-trier.de}
502 @inproceedings{Blum:1985:EPP:19478.19501,
503 author = {Blum, Manuel and Goldwasser, Shafi},
504 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
505 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
507 isbn = {0-387-15658-5},
508 location = {Santa Barbara, California, United States},
511 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
513 publisher = {Springer-Verlag New York, Inc.},
514 address = {New York, NY, USA},
515 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
518 @article{DBLP:journals/ejisec/FontaineG07,
519 author = {Caroline Fontaine and
521 title = {A Survey of Homomorphic Encryption for Nonspecialists},
522 journal = {EURASIP J. Information Security},
525 ee = {http://dx.doi.org/10.1155/2007/13801},
526 bibsource = {DBLP, http://dblp.uni-trier.de}
530 @article{Luo:2010:EAI:1824719.1824720,
531 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
532 title = {Edge adaptive image steganography based on LSB matching revisited},
533 journal = {Trans. Info. For. Sec.},
534 issue_date = {June 2010},
542 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
543 doi = {10.1109/TIFS.2010.2041812},
545 publisher = {IEEE Press},
546 address = {Piscataway, NJ, USA},
547 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
550 @article{Mielikainen06,
551 author = {Mielikainen, J.},
552 title = {LSB Matching Revisited},
553 journal = {Signal Processing Letters},
568 @article{Liu:2008:FMP:1284917.1285196,
569 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
570 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
571 journal = {Pattern Recogn.},
572 issue_date = {January, 2008},
580 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
581 doi = {10.1016/j.patcog.2007.06.005},
583 publisher = {Elsevier Science Inc.},
584 address = {New York, NY, USA},
585 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
590 @InProceedings{LHS08,
591 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
592 title = {Textural features based universal steganalysis},
595 booktitle = {Proc. SPIE 6819},
604 OPTorganization = {},
612 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
613 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
616 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
625 OPTorganization = {},
631 @article{DBLP:journals/tifs/KodovskyFH12,
632 author = {Jan Kodovsk{\'y} and
633 Jessica J. Fridrich and
635 title = {Ensemble Classifiers for Steganalysis of Digital Media},
636 journal = {IEEE Transactions on Information Forensics and Security},
641 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
642 bibsource = {DBLP, http://dblp.uni-trier.de}
647 @article{Fillatre:2012:ASL:2333143.2333587,
648 author = {Fillatre, Lionel},
649 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
650 journal = {Trans. Sig. Proc.},
651 issue_date = {February 2012},
659 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
660 doi = {10.1109/TSP.2011.2174231},
662 publisher = {IEEE Press},
663 address = {Piscataway, NJ, USA},
667 @inproceedings{Tyan1993,
668 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
669 address = {{San Francisco, CA, USA}},
670 author = {Tyan, C. Y. and Wang, P. P.},
671 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
672 citeulike-article-id = {7936501},
673 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
675 posted-at = {2010-10-01 17:27:48},
677 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
683 @article{Canny:1986:CAE:11274.11275,
685 title = {A Computational Approach to Edge Detection},
686 journal = {IEEE Trans. Pattern Anal. Mach. Intell.},
687 issue_date = {June 1986},
695 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
696 doi = {10.1109/TPAMI.1986.4767851},
698 publisher = {IEEE Computer Society},
699 address = {Washington, DC, USA},
700 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
704 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
705 author = {Jessica J. Fridrich and
709 title = {Steganalysis of Content-Adaptive Steganography in Spatial
711 booktitle = {Information Hiding},
714 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
715 crossref = {DBLP:conf/ih/2011},
716 bibsource = {DBLP, http://dblp.uni-trier.de}
718 @proceedings{DBLP:conf/ih/2011,
719 editor = {Tom{\'a}s Filler and
720 Tom{\'a}s Pevn{\'y} and
723 title = {Information Hiding - 13th International Conference, IH 2011,
724 Prague, Czech Republic, May 18-20, 2011, Revised Selected
726 booktitle = {Information Hiding},
727 publisher = {Springer},
728 series = {Lecture Notes in Computer Science},
731 isbn = {978-3-642-24177-2},
732 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
733 bibsource = {DBLP, http://dblp.uni-trier.de}
736 @inproceedings{DBLP:conf/iwdw/Fridrich11,
737 author = {Jessica J. Fridrich},
738 title = {Modern Trends in Steganography and Steganalysis},
742 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
743 crossref = {DBLP:conf/iwdw/2011},
744 bibsource = {DBLP, http://dblp.uni-trier.de}
746 @proceedings{DBLP:conf/iwdw/2011,
747 editor = {Yun-Qing Shi and
749 Fernando P{\'e}rez-Gonz{\'a}lez},
750 title = {Digital Forensics and Watermarking - 10th International
751 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
752 2011, Revised Selected Papers},
754 publisher = {Springer},
755 series = {Lecture Notes in Computer Science},
758 isbn = {978-3-642-32204-4},
759 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
760 bibsource = {DBLP, http://dblp.uni-trier.de}