1 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
2 editor = {Ira S. Moskowitz},
3 author = {Shelby Pereira and
4 Sviatoslav Voloshynovskiy and
6 St{\'e}phane Marchand-Maillet and
8 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
9 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
10 title = {Second Generation Benchmarking and Application Oriented
14 series = {Lecture Notes in Computer Science},
15 publisher = {Springer},
20 @inproceedings{DBLP:conf/ih/Westfeld01,
21 added-at = {2011-06-28T00:00:00.000+0200},
22 author = {Westfeld, Andreas},
23 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
24 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
25 editor = {Ira S. Moskowitz},
27 publisher = {Springer},
28 series = {Lecture Notes in Computer Science},
29 title = {F5-A Steganographic Algorithm.},
38 @article{Chang20101286,
39 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
40 journal = "Digital Signal Processing",
43 pages = "1286 - 1307",
47 doi = "10.1016/j.dsp.2009.11.005",
48 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
49 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
50 keywords = "Security",
51 keywords = "Wet paper coding",
52 keywords = "Steganography",
53 keywords = "Indicator",
54 keywords = "Fuzzy edge detector"
59 @article{Hu:2007:HPE:1282866.1282944,
60 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
61 title = {A high performance edge detector based on fuzzy inference rules},
62 journal = {Inf. Sci.},
63 issue_date = {November, 2007},
71 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
72 doi = {10.1016/j.ins.2007.04.001},
74 publisher = {Elsevier Science Inc.},
75 address = {New York, NY, USA},
76 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
80 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
81 author = {Sorina Dumitrescu and
83 editor = {Ahmet M. Eskicioglu and
84 Jessica J. Fridrich and
86 title = {LSB steganalysis based on high-order statistics},
87 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
88 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
92 ee = {http://doi.acm.org/10.1145/1073170.1073176},
93 bibsource = {DBLP, http://dblp.uni-trier.de}
96 @inproceedings{DBLP:conf/ih/Ker05,
97 author = {Andrew D. Ker},
98 title = {A General Framework for Structural Steganalysis of LSB Replacement},
99 editor = {Mauro Barni and
100 Jordi Herrera-Joancomart\'{\i} and
101 Stefan Katzenbeisser and
102 Fernando P{\'e}rez-Gonz{\'a}lez},
103 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
104 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
107 ee = {http://dx.doi.org/10.1007/11558859_22},
108 publisher = {Springer},
109 series = {Lecture Notes in Computer Science},
115 editor = {Matthias Kirchner and
117 booktitle = {Information Hiding - 14th International Conference, IH 2012,
118 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
119 author = {Jessica J. Fridrich and
121 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
124 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
126 publisher = {Springer},
127 series = {Lecture Notes in Computer Science},
128 bibsource = {DBLP, http://dblp.uni-trier.de}
132 @article{DBLP:journals/tsp/DumitrescuWW03,
133 added-at = {2012-02-06T00:00:00.000+0100},
134 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
135 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
136 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
137 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
138 intrahash = {556caad9b61980d3458885153a52321c},
139 journal = {IEEE Transactions on Signal Processing},
143 timestamp = {2012-02-06T00:00:00.000+0100},
144 title = {Detection of LSB steganography via sample pair analysis.},
145 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
153 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
154 editor = {Nicolas D. Georganas and
155 Radu Popescu-Zeletin},
156 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
157 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
159 author = {Jessica J. Fridrich and
162 title = {Reliable detection of LSB steganography in color and grayscale
166 ee = {http://doi.acm.org/10.1145/1232454.1232466},
168 bibsource = {DBLP, http://dblp.uni-trier.de}
175 @inproceedings{DBLP:conf/ih/PevnyFB10,
176 author = {Tom{\'a}s Pevn{\'y} and
179 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
181 editor = {Rainer B{\"o}hme and
182 Philip W. L. Fong and
183 Reihaneh Safavi-Naini},
184 booktitle = {Information Hiding - 12th International Conference, IH 2010,
185 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
189 publisher = {Springer},
190 series = {Lecture Notes in Computer Science},
192 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
193 bibsource = {DBLP, http://dblp.uni-trier.de}
202 author = {Tom{\'a}s Pevn{\'y} and
206 title = {Break Our Steganographic System},
207 OPThowpublished = {},
210 note = {Available at \url{http://www.agents.cz/boss/}},
214 @proceedings{DBLP:conf/ih/2010,
215 editor = {Rainer B{\"o}hme and
216 Philip W. L. Fong and
217 Reihaneh Safavi-Naini},
218 title = {Information Hiding - 12th International Conference, IH 2010,
219 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
221 booktitle = {Information Hiding},
222 publisher = {Springer},
223 series = {Lecture Notes in Computer Science},
226 isbn = {978-3-642-16434-7},
227 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
228 bibsource = {DBLP, http://dblp.uni-trier.de}
232 @article{DBLP:journals/eswa/ChenCL10,
233 added-at = {2010-07-21T15:44:10.000+0200},
234 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
235 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
237 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
238 interhash = {bc34a5f04661fee24ee62c39e76361be},
239 intrahash = {28889a4ab329da28559f0910469f054b},
240 journal = {Expert Systems with Applications},
244 timestamp = {2010-07-21T15:44:10.000+0200},
245 title = {High payload steganography mechanism using hybrid edge detector.},
246 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
251 @article{DBLP:journals/tifs/FillerJF11,
252 added-at = {2011-09-29T00:00:00.000+0200},
253 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
254 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
255 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
256 interhash = {b27d23ed0c9936d568e16c51378abccd},
257 intrahash = {50e43c05a74eec17524b3df8db442da5},
258 journal = {IEEE Transactions on Information Forensics and Security},
262 timestamp = {2011-09-29T00:00:00.000+0200},
263 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
264 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
272 @inproceedings{DBLP:conf/ih/KimDR06,
273 added-at = {2007-09-20T00:00:00.000+0200},
274 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
275 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
276 booktitle = {Information Hiding},
277 crossref = {DBLP:conf/ih/2006},
279 description = {dblp},
280 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
281 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
282 interhash = {399aab122b39cfd6f6e951a1b276c786},
283 intrahash = {f0324f70d62d9dfba568e393920aaa16},
284 isbn = {978-3-540-74123-7},
287 publisher = {Springer},
288 series = {Lecture Notes in Computer Science},
289 timestamp = {2007-09-20T00:00:00.000+0200},
290 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
291 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
297 @proceedings{DBLP:conf/ih/2006,
298 editor = {Jan Camenisch and
299 Christian S. Collberg and
302 title = {Information Hiding, 8th International Workshop, IH 2006,
303 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
304 booktitle = {Information Hiding},
305 publisher = {Springer},
306 series = {Lecture Notes in Computer Science},
309 isbn = {978-3-540-74123-7},
310 bibsource = {DBLP, http://dblp.uni-trier.de}
315 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
316 author = {Jessica J. Fridrich and
317 Tom{\'a}s Pevn{\'y} and
319 title = {Statistically undetectable jpeg steganography: dead ends
320 challenges, and opportunities},
322 ee = {http://doi.acm.org/10.1145/1288869.1288872},
323 crossref = {DBLP:conf/mmsec/2007},
324 editor = {Deepa Kundur and
325 Balakrishnan Prabhakaran and
327 Jessica J. Fridrich},
328 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
329 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
332 isbn = {978-1-59593-857-2},
333 bibsource = {DBLP, http://dblp.uni-trier.de}
335 @proceedings{DBLP:conf/mmsec/2007,
342 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
343 editor = {Nasir D. Memon and
347 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
348 Electronic Imaging Symposium, San Jose, CA, USA, January
349 18-20, 2010, Proceedings},
350 author = {Tom{\'a}s Filler and
352 Jessica J. Fridrich},
353 title = {Minimizing embedding impact in steganography using trellis-coded
357 ee = {http://dx.doi.org/10.1117/12.838002},
358 bibsource = {DBLP, http://dblp.uni-trier.de},
360 series = {SPIE Proceedings},
371 @proceedings{DBLP:conf/mediaforensics/2010,
372 editor = {Nasir D. Memon and
376 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
377 Electronic Imaging Symposium, San Jose, CA, USA, January
378 18-20, 2010, Proceedings},
379 booktitle = {Media Forensics and Security},
381 series = {SPIE Proceedings},
384 isbn = {978-0-8194-7934-1},
385 bibsource = {DBLP, http://dblp.uni-trier.de}
388 @article{DBLP:journals/corr/abs-1112-5239,
389 author = {Jacques M. Bahi and
390 Rapha{\"e}l Couturier and
391 Christophe Guyeux and
392 Pierre-Cyrille H{\'e}am},
393 title = {Efficient and Cryptographically Secure Generation of Chaotic
394 Pseudorandom Numbers on GPU},
396 volume = {abs/1112.5239},
398 ee = {http://arxiv.org/abs/1112.5239},
399 bibsource = {DBLP, http://dblp.uni-trier.de}
403 author = {Ponomarenko, Nikolay},
404 title = {PSNR-HVS-M page},
405 OPThowpublished = {},
408 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
414 author = {Bovik, Alan C.},
416 OPThowpublished = {},
419 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
424 @InProceedings{PSECAL07,
425 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
426 title = {On between-coefficient contrast masking of DCT basis functions},
427 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
430 editor = {Li,Baoxin},
436 OPTorganization = {},
444 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
445 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
446 journal = {IEEE Signal Processing Letters},
457 @inproceedings{DBLP:conf/crypto/ShubBB82,
458 author = {Lenore Blum and
461 title = {Comparison of Two Pseudo-Random Number Generators},
462 booktitle = {CRYPTO},
465 crossref = {DBLP:conf/crypto/1982},
466 bibsource = {DBLP, http://dblp.uni-trier.de}
468 @proceedings{DBLP:conf/crypto/1982,
469 editor = {David Chaum and
472 title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
473 Barbara, California, USA, August 23-25, 1982},
474 booktitle = {CRYPTO},
475 publisher = {Plenum Press, New York},
477 bibsource = {DBLP, http://dblp.uni-trier.de}
481 @inproceedings{Blum:1985:EPP:19478.19501,
482 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
483 Barbara, California, USA, August 19-22, 1984, Proceedings},
484 author = {Manuel Blum and
486 title = {An Efficient Probabilistic Public-Key Encryption Scheme
487 Which Hides All Partial Information},
490 editor = {G. R. Blakley and
492 publisher = {Springer},
493 series = {Lecture Notes in Computer Science},
499 @article{DBLP:journals/ejisec/FontaineG07,
500 author = {Caroline Fontaine and
502 title = {A Survey of Homomorphic Encryption for Nonspecialists},
503 journal = {EURASIP Journal on Information Security},
508 ee = {http://dx.doi.org/10.1155/2007/13801},
509 bibsource = {DBLP, http://dblp.uni-trier.de}
513 @article{Luo:2010:EAI:1824719.1824720,
514 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
515 title = {Edge adaptive image steganography based on LSB matching revisited},
516 journal = {IEEE Transactions on Information Forensics and Security},
524 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
525 doi = {10.1109/TIFS.2010.2041812},
527 publisher = {IEEE Press},
528 address = {Piscataway, NJ, USA},
529 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
532 @article{Mielikainen06,
533 author = {Mielikainen, J.},
534 title = {LSB Matching Revisited},
535 journal = {IEEE Signal Processing Letters},
550 @article{Liu:2008:FMP:1284917.1285196,
551 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
552 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
553 journal = {Pattern Recogn.},
554 issue_date = {January, 2008},
562 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
563 doi = {10.1016/j.patcog.2007.06.005},
565 publisher = {Elsevier Science Inc.},
566 address = {New York, NY, USA},
567 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
572 @InProceedings{LHS08,
573 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
574 title = {Textural features based universal steganalysis},
577 booktitle = {Proc. SPIE 6819},
586 OPTorganization = {},
594 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
595 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
598 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
607 OPTorganization = {},
613 @article{DBLP:journals/tifs/KodovskyFH12,
614 author = {Jan Kodovsk{\'y} and
615 Jessica J. Fridrich and
617 title = {Ensemble Classifiers for Steganalysis of Digital Media},
618 journal = {IEEE Transactions on Information Forensics and Security},
623 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
624 bibsource = {DBLP, http://dblp.uni-trier.de}
629 @article{Fillatre:2012:ASL:2333143.2333587,
630 author = {Fillatre, Lionel},
631 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
632 journal = {IEEE Transactions on Signal Processing},
640 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
641 doi = {10.1109/TSP.2011.2174231},
643 publisher = {IEEE Press},
644 address = {Piscataway, NJ, USA},
648 @inproceedings{Tyan1993,
649 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
650 address = {{San Francisco, CA, USA}},
651 author = {Tyan, C. Y. and Wang, P. P.},
652 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
653 citeulike-article-id = {7936501},
654 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
656 posted-at = {2010-10-01 17:27:48},
658 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
664 @article{Canny:1986:CAE:11274.11275,
666 title = {A Computational Approach to Edge Detection},
667 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
668 issue_date = {June 1986},
676 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
677 doi = {10.1109/TPAMI.1986.4767851},
679 publisher = {IEEE Computer Society},
680 address = {Washington, DC, USA},
681 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
685 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
686 author = {Jessica J. Fridrich and
690 title = {Steganalysis of Content-Adaptive Steganography in Spatial
692 booktitle = {Information Hiding},
695 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
696 crossref = {DBLP:conf/ih/2011},
697 bibsource = {DBLP, http://dblp.uni-trier.de}
699 @proceedings{DBLP:conf/ih/2011,
700 editor = {Tom{\'a}s Filler and
701 Tom{\'a}s Pevn{\'y} and
704 title = {Information Hiding - 13th International Conference, IH 2011,
705 Prague, Czech Republic, May 18-20, 2011, Revised Selected
707 booktitle = {Information Hiding},
708 publisher = {Springer},
709 series = {Lecture Notes in Computer Science},
712 isbn = {978-3-642-24177-2},
713 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
714 bibsource = {DBLP, http://dblp.uni-trier.de}
717 @inproceedings{DBLP:conf/iwdw/Fridrich11,
718 author = {Jessica J. Fridrich},
719 title = {Modern Trends in Steganography and Steganalysis},
723 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
724 crossref = {DBLP:conf/iwdw/2011},
725 bibsource = {DBLP, http://dblp.uni-trier.de}
727 @proceedings{DBLP:conf/iwdw/2011,
728 editor = {Yun-Qing Shi and
730 Fernando P{\'e}rez-Gonz{\'a}lez},
731 title = {Digital Forensics and Watermarking - 10th International
732 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
733 2011, Revised Selected Papers},
735 publisher = {Springer},
736 series = {Lecture Notes in Computer Science},
739 isbn = {978-3-642-32204-4},
740 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
741 bibsource = {DBLP, http://dblp.uni-trier.de}