1 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
2 author = {Dumitrescu, Sorina and Wu, Xiaolin},
3 title = {LSB steganalysis based on high-order statistics},
4 booktitle = {Proceedings of the 7th workshop on Multimedia and security},
7 isbn = {1-59593-032-9},
8 location = {New York, NY, USA},
11 url = {http://doi.acm.org/10.1145/1073170.1073176},
12 doi = {10.1145/1073170.1073176},
15 address = {New York, NY, USA},
16 keywords = {LSB steganography, digital media, steganalysis},
19 @inproceedings{DBLP:conf/ih/Ker05,
20 author = {Andrew D. Ker},
21 title = {A General Framework for Structural Steganalysis of LSB Replacement},
22 booktitle = {Information Hiding},
25 ee = {http://dx.doi.org/10.1007/11558859_22},
26 crossref = {DBLP:conf/ih/2005},
27 bibsource = {DBLP, http://dblp.uni-trier.de}
29 @proceedings{DBLP:conf/ih/2005,
30 editor = {Mauro Barni and
31 Jordi Herrera-Joancomart\'{\i} and
32 Stefan Katzenbeisser and
33 Fernando P{\'e}rez-Gonz{\'a}lez},
34 title = {Information Hiding, 7th International Workshop, IH 2005,
35 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
36 booktitle = {Information Hiding},
37 publisher = {Springer},
38 series = {Lecture Notes in Computer Science},
41 isbn = {3-540-29039-7},
42 bibsource = {DBLP, http://dblp.uni-trier.de}
46 author = {Jessica J. Fridrich and
48 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
49 booktitle = {14th Information Hiding Conference},
52 publisher = {Springer},
53 address = {Berkeley, CA},
57 @article{DBLP:journals/tsp/DumitrescuWW03,
58 added-at = {2012-02-06T00:00:00.000+0100},
59 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
60 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
61 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
62 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
63 intrahash = {556caad9b61980d3458885153a52321c},
64 journal = {IEEE Transactions on Signal Processing},
68 timestamp = {2012-02-06T00:00:00.000+0100},
69 title = {Detection of LSB steganography via sample pair analysis.},
70 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
75 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
76 added-at = {2007-10-26T00:00:00.000+0200},
77 author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
78 biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
80 crossref = {DBLP:conf/mmsec/2001},
83 editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
84 ee = {http://doi.acm.org/10.1145/1232454.1232466},
85 interhash = {de49b3b9958119616eee66f14060f47f},
86 intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
87 isbn = {1-58113-393-6},
91 timestamp = {2007-10-26T00:00:00.000+0200},
92 title = {Reliable detection of LSB steganography in color and grayscale images.},
93 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
98 @proceedings{DBLP:conf/mmsec/2001,
99 editor = {Nicolas D. Georganas and
100 Radu Popescu-Zeletin},
101 title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
102 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
104 booktitle = {MM{\&}Sec},
107 isbn = {1-58113-393-6},
108 bibsource = {DBLP, http://dblp.uni-trier.de}
111 @inproceedings{DBLP:conf/ih/PevnyFB10,
112 added-at = {2010-10-08T00:00:00.000+0200},
113 author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick},
114 biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
115 booktitle = {Information Hiding},
116 crossref = {DBLP:conf/ih/2010},
117 editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
118 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
119 interhash = {b30869c1bb39a2c15b33e05e5139e58b},
120 intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
121 isbn = {978-3-642-16434-7},
124 publisher = {Springer},
125 series = {Lecture Notes in Computer Science},
126 timestamp = {2010-10-08T00:00:00.000+0200},
127 title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
128 url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
133 @proceedings{DBLP:conf/ih/2010,
134 editor = {Rainer B{\"o}hme and
135 Philip W. L. Fong and
136 Reihaneh Safavi-Naini},
137 title = {Information Hiding - 12th International Conference, IH 2010,
138 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
140 booktitle = {Information Hiding},
141 publisher = {Springer},
142 series = {Lecture Notes in Computer Science},
145 isbn = {978-3-642-16434-7},
146 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
147 bibsource = {DBLP, http://dblp.uni-trier.de}
151 @article{DBLP:journals/eswa/ChenCL10,
152 added-at = {2010-07-21T15:44:10.000+0200},
153 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
154 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
156 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
157 interhash = {bc34a5f04661fee24ee62c39e76361be},
158 intrahash = {28889a4ab329da28559f0910469f054b},
159 journal = {Expert Syst. Appl.},
163 timestamp = {2010-07-21T15:44:10.000+0200},
164 title = {High payload steganography mechanism using hybrid edge detector.},
165 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
170 @article{DBLP:journals/tifs/FillerJF11,
171 added-at = {2011-09-29T00:00:00.000+0200},
172 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
173 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
174 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
175 interhash = {b27d23ed0c9936d568e16c51378abccd},
176 intrahash = {50e43c05a74eec17524b3df8db442da5},
177 journal = {IEEE Transactions on Information Forensics and Security},
181 timestamp = {2011-09-29T00:00:00.000+0200},
182 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
183 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
190 @inproceedings{DBLP:conf/ih/Westfeld01,
191 added-at = {2011-06-28T00:00:00.000+0200},
192 author = {Westfeld, Andreas},
193 biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
194 booktitle = {Information Hiding},
195 crossref = {DBLP:conf/ih/2001},
196 editor = {Moskowitz, Ira S.},
197 ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
198 interhash = {e7eaa917e995dc9373f10304d3e79255},
199 intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
200 isbn = {3-540-42733-3},
203 publisher = {Springer},
204 series = {Lecture Notes in Computer Science},
205 timestamp = {2011-06-28T00:00:00.000+0200},
206 title = {F5-A Steganographic Algorithm.},
207 url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
212 @proceedings{DBLP:conf/ih/2001,
213 editor = {Ira S. Moskowitz},
214 title = {Information Hiding, 4th International Workshop, IHW 2001,
215 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
216 booktitle = {Information Hiding},
217 publisher = {Springer},
218 series = {Lecture Notes in Computer Science},
221 isbn = {3-540-42733-3},
222 bibsource = {DBLP, http://dblp.uni-trier.de}
225 @inproceedings{DBLP:conf/ih/KimDR06,
226 added-at = {2007-09-20T00:00:00.000+0200},
227 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
228 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
229 booktitle = {Information Hiding},
230 crossref = {DBLP:conf/ih/2006},
232 description = {dblp},
233 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
234 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
235 interhash = {399aab122b39cfd6f6e951a1b276c786},
236 intrahash = {f0324f70d62d9dfba568e393920aaa16},
237 isbn = {978-3-540-74123-7},
240 publisher = {Springer},
241 series = {Lecture Notes in Computer Science},
242 timestamp = {2007-09-20T00:00:00.000+0200},
243 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
244 url = {http://dblp.uni-trier.de/db/conf/ih/ih2006.html#KimDR06},
250 @proceedings{DBLP:conf/ih/2006,
251 editor = {Jan Camenisch and
252 Christian S. Collberg and
255 title = {Information Hiding, 8th International Workshop, IH 2006,
256 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
257 booktitle = {Information Hiding},
258 publisher = {Springer},
259 series = {Lecture Notes in Computer Science},
262 isbn = {978-3-540-74123-7},
263 bibsource = {DBLP, http://dblp.uni-trier.de}
266 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
267 added-at = {2007-10-26T00:00:00.000+0200},
268 author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan},
269 biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
271 crossref = {DBLP:conf/mmsec/2007},
273 description = {dblp},
274 editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
275 ee = {http://doi.acm.org/10.1145/1288869.1288872},
276 interhash = {35c4a20b41b7861bcb09c9ff335ac601},
277 intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
278 isbn = {978-1-59593-857-2},
282 timestamp = {2007-10-26T00:00:00.000+0200},
283 title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
284 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
288 @proceedings{DBLP:conf/mmsec/2007,
289 editor = {Deepa Kundur and
290 Balakrishnan Prabhakaran and
292 Jessica J. Fridrich},
293 title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
294 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
295 booktitle = {MM{\&}Sec},
298 isbn = {978-1-59593-857-2},
299 bibsource = {DBLP, http://dblp.uni-trier.de}
302 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
303 added-at = {2010-08-21T00:00:00.000+0200},
304 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
305 biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
306 booktitle = {Media Forensics and Security},
307 crossref = {DBLP:conf/mediaforensics/2010},
308 editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
309 ee = {http://dx.doi.org/10.1117/12.838002},
310 interhash = {a3d2215b959361a30f0b48f15c012bc9},
311 intrahash = {3405985533dce431b5013941a2c2c2cc},
312 isbn = {978-0-8194-7934-1},
316 series = {SPIE Proceedings},
317 timestamp = {2010-08-21T00:00:00.000+0200},
318 title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
319 url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
325 @proceedings{DBLP:conf/mediaforensics/2010,
326 editor = {Nasir D. Memon and
330 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
331 Electronic Imaging Symposium, San Jose, CA, USA, January
332 18-20, 2010, Proceedings},
333 booktitle = {Media Forensics and Security},
335 series = {SPIE Proceedings},
338 isbn = {978-0-8194-7934-1},
339 bibsource = {DBLP, http://dblp.uni-trier.de}
343 @article{Luo:2010:EAI:1824719.1824720,
344 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
345 title = {Edge adaptive image steganography based on LSB matching revisited},
346 journal = {Trans. Info. For. Sec.},
347 issue_date = {June 2010},
355 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
356 doi = {10.1109/TIFS.2010.2041812},
358 publisher = {IEEE Press},
359 address = {Piscataway, NJ, USA},
360 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
363 @article{Mielikainen06,
364 author = {Mielikainen, J.},
365 title = {LSB Matching Revisited},
366 journal = {Signal Processing Letters},
381 @article{Liu:2008:FMP:1284917.1285196,
382 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
383 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
384 journal = {Pattern Recogn.},
385 issue_date = {January, 2008},
393 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
394 doi = {10.1016/j.patcog.2007.06.005},
396 publisher = {Elsevier Science Inc.},
397 address = {New York, NY, USA},
398 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
403 @InProceedings{LHS08,
404 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
405 title = {Textural features based universal steganalysis},
408 booktitle = {Proc. SPIE 6819},
417 OPTorganization = {},
425 author = {Jan Kodovský and Jessica Fridrich},
426 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
429 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
438 OPTorganization = {},
444 @article{DBLP:journals/tifs/KodovskyFH12,
445 author = {Jan Kodovsk{\'y} and
446 Jessica J. Fridrich and
448 title = {Ensemble Classifiers for Steganalysis of Digital Media},
449 journal = {IEEE Transactions on Information Forensics and Security},
454 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
455 bibsource = {DBLP, http://dblp.uni-trier.de}
460 @article{Fillatre:2012:ASL:2333143.2333587,
461 author = {Fillatre, Lionel},
462 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
463 journal = {Trans. Sig. Proc.},
464 issue_date = {February 2012},
472 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
473 doi = {10.1109/TSP.2011.2174231},
475 publisher = {IEEE Press},
476 address = {Piscataway, NJ, USA},
480 @inproceedings{Tyan1993,
481 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
482 address = {{San Francisco, CA, USA}},
483 author = {Tyan, C. Y. and Wang, P. P.},
484 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
485 citeulike-article-id = {7936501},
486 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
488 posted-at = {2010-10-01 17:27:48},
490 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
496 @article{Canny:1986:CAE:11274.11275,
498 title = {A Computational Approach to Edge Detection},
499 journal = {IEEE Trans. Pattern Anal. Mach. Intell.},
500 issue_date = {June 1986},
508 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
509 doi = {10.1109/TPAMI.1986.4767851},
511 publisher = {IEEE Computer Society},
512 address = {Washington, DC, USA},
513 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
517 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
518 author = {Jessica J. Fridrich and
522 title = {Steganalysis of Content-Adaptive Steganography in Spatial
524 booktitle = {Information Hiding},
527 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
528 crossref = {DBLP:conf/ih/2011},
529 bibsource = {DBLP, http://dblp.uni-trier.de}
531 @proceedings{DBLP:conf/ih/2011,
532 editor = {Tom{\'a}s Filler and
533 Tom{\'a}s Pevn{\'y} and
536 title = {Information Hiding - 13th International Conference, IH 2011,
537 Prague, Czech Republic, May 18-20, 2011, Revised Selected
539 booktitle = {Information Hiding},
540 publisher = {Springer},
541 series = {Lecture Notes in Computer Science},
544 isbn = {978-3-642-24177-2},
545 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
546 bibsource = {DBLP, http://dblp.uni-trier.de}
549 @inproceedings{DBLP:conf/iwdw/Fridrich11,
550 author = {Jessica J. Fridrich},
551 title = {Modern Trends in Steganography and Steganalysis},
555 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
556 crossref = {DBLP:conf/iwdw/2011},
557 bibsource = {DBLP, http://dblp.uni-trier.de}
559 @proceedings{DBLP:conf/iwdw/2011,
560 editor = {Yun-Qing Shi and
562 Fernando P{\'e}rez-Gonz{\'a}lez},
563 title = {Digital Forensics and Watermarking - 10th International
564 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
565 2011, Revised Selected Papers},
567 publisher = {Springer},
568 series = {Lecture Notes in Computer Science},
571 isbn = {978-3-642-32204-4},
572 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
573 bibsource = {DBLP, http://dblp.uni-trier.de}