1 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
2 author = {Shelby Pereira and
3 Sviatoslav Voloshynovskiy and
5 St{\'e}phane Marchand-Maillet and
7 title = {Second Generation Benchmarking and Application Oriented
9 booktitle = {Information Hiding},
12 ee = {http://dx.doi.org/10.1007/3-540-45496-9_25},
13 crossref = {DBLP:conf/ih/2001},
14 bibsource = {DBLP, http://dblp.uni-trier.de}
16 @proceedings{DBLP:conf/ih/2001,
17 editor = {Ira S. Moskowitz},
18 title = {Information Hiding, 4th International Workshop, IHW 2001,
19 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
20 booktitle = {Information Hiding},
21 publisher = {Springer},
22 series = {Lecture Notes in Computer Science},
25 isbn = {3-540-42733-3},
26 bibsource = {DBLP, http://dblp.uni-trier.de}
29 @article{Chang20101286,
30 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
31 journal = "Digital Signal Processing",
34 pages = "1286 - 1307",
38 doi = "10.1016/j.dsp.2009.11.005",
39 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
40 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
41 keywords = "Security",
42 keywords = "Wet paper coding",
43 keywords = "Steganography",
44 keywords = "Indicator",
45 keywords = "Fuzzy edge detector"
50 @article{Hu:2007:HPE:1282866.1282944,
51 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
52 title = {A high performance edge detector based on fuzzy inference rules},
53 journal = {Inf. Sci.},
54 issue_date = {November, 2007},
62 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
63 doi = {10.1016/j.ins.2007.04.001},
65 publisher = {Elsevier Science Inc.},
66 address = {New York, NY, USA},
67 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
69 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
70 author = {Dumitrescu, Sorina and Wu, Xiaolin},
71 title = {LSB steganalysis based on high-order statistics},
72 booktitle = {Proceedings of the 7th workshop on Multimedia and security},
75 isbn = {1-59593-032-9},
76 location = {New York, NY, USA},
79 url = {http://doi.acm.org/10.1145/1073170.1073176},
80 doi = {10.1145/1073170.1073176},
83 address = {New York, NY, USA},
84 keywords = {LSB steganography, digital media, steganalysis},
87 @inproceedings{DBLP:conf/ih/Ker05,
88 author = {Andrew D. Ker},
89 title = {A General Framework for Structural Steganalysis of LSB Replacement},
90 booktitle = {Information Hiding},
93 ee = {http://dx.doi.org/10.1007/11558859_22},
94 crossref = {DBLP:conf/ih/2005},
95 bibsource = {DBLP, http://dblp.uni-trier.de}
97 @proceedings{DBLP:conf/ih/2005,
98 editor = {Mauro Barni and
99 Jordi Herrera-Joancomart\'{\i} and
100 Stefan Katzenbeisser and
101 Fernando P{\'e}rez-Gonz{\'a}lez},
102 title = {Information Hiding, 7th International Workshop, IH 2005,
103 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
104 booktitle = {Information Hiding},
105 publisher = {Springer},
106 series = {Lecture Notes in Computer Science},
109 isbn = {3-540-29039-7},
110 bibsource = {DBLP, http://dblp.uni-trier.de}
114 author = {Jessica J. Fridrich and
116 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
117 booktitle = {14th Information Hiding Conference},
120 publisher = {Springer},
121 address = {Berkeley, CA},
125 @article{DBLP:journals/tsp/DumitrescuWW03,
126 added-at = {2012-02-06T00:00:00.000+0100},
127 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
128 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
129 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
130 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
131 intrahash = {556caad9b61980d3458885153a52321c},
132 journal = {IEEE Transactions on Signal Processing},
136 timestamp = {2012-02-06T00:00:00.000+0100},
137 title = {Detection of LSB steganography via sample pair analysis.},
138 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
143 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
144 added-at = {2007-10-26T00:00:00.000+0200},
145 author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
146 biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
148 crossref = {DBLP:conf/mmsec/2001},
150 description = {dblp},
151 editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
152 ee = {http://doi.acm.org/10.1145/1232454.1232466},
153 interhash = {de49b3b9958119616eee66f14060f47f},
154 intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
155 isbn = {1-58113-393-6},
159 timestamp = {2007-10-26T00:00:00.000+0200},
160 title = {Reliable detection of LSB steganography in color and grayscale images.},
161 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
166 @proceedings{DBLP:conf/mmsec/2001,
167 editor = {Nicolas D. Georganas and
168 Radu Popescu-Zeletin},
169 title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
170 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
172 booktitle = {MM{\&}Sec},
175 isbn = {1-58113-393-6},
176 bibsource = {DBLP, http://dblp.uni-trier.de}
179 @inproceedings{DBLP:conf/ih/PevnyFB10,
180 added-at = {2010-10-08T00:00:00.000+0200},
181 author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick},
182 biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
183 booktitle = {Information Hiding},
184 crossref = {DBLP:conf/ih/2010},
185 editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
186 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
187 interhash = {b30869c1bb39a2c15b33e05e5139e58b},
188 intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
189 isbn = {978-3-642-16434-7},
192 publisher = {Springer},
193 series = {Lecture Notes in Computer Science},
194 timestamp = {2010-10-08T00:00:00.000+0200},
195 title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
196 url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
201 @proceedings{DBLP:conf/ih/2010,
202 editor = {Rainer B{\"o}hme and
203 Philip W. L. Fong and
204 Reihaneh Safavi-Naini},
205 title = {Information Hiding - 12th International Conference, IH 2010,
206 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
208 booktitle = {Information Hiding},
209 publisher = {Springer},
210 series = {Lecture Notes in Computer Science},
213 isbn = {978-3-642-16434-7},
214 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
215 bibsource = {DBLP, http://dblp.uni-trier.de}
219 @article{DBLP:journals/eswa/ChenCL10,
220 added-at = {2010-07-21T15:44:10.000+0200},
221 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
222 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
224 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
225 interhash = {bc34a5f04661fee24ee62c39e76361be},
226 intrahash = {28889a4ab329da28559f0910469f054b},
227 journal = {Expert Syst. Appl.},
231 timestamp = {2010-07-21T15:44:10.000+0200},
232 title = {High payload steganography mechanism using hybrid edge detector.},
233 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
238 @article{DBLP:journals/tifs/FillerJF11,
239 added-at = {2011-09-29T00:00:00.000+0200},
240 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
241 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
242 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
243 interhash = {b27d23ed0c9936d568e16c51378abccd},
244 intrahash = {50e43c05a74eec17524b3df8db442da5},
245 journal = {IEEE Transactions on Information Forensics and Security},
249 timestamp = {2011-09-29T00:00:00.000+0200},
250 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
251 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
258 @inproceedings{DBLP:conf/ih/Westfeld01,
259 added-at = {2011-06-28T00:00:00.000+0200},
260 author = {Westfeld, Andreas},
261 biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
262 booktitle = {Information Hiding},
263 crossref = {DBLP:conf/ih/2001},
264 editor = {Moskowitz, Ira S.},
265 ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
266 interhash = {e7eaa917e995dc9373f10304d3e79255},
267 intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
268 isbn = {3-540-42733-3},
271 publisher = {Springer},
272 series = {Lecture Notes in Computer Science},
273 timestamp = {2011-06-28T00:00:00.000+0200},
274 title = {F5-A Steganographic Algorithm.},
275 url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
281 @inproceedings{DBLP:conf/ih/KimDR06,
282 added-at = {2007-09-20T00:00:00.000+0200},
283 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
284 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
285 booktitle = {Information Hiding},
286 crossref = {DBLP:conf/ih/2006},
288 description = {dblp},
289 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
290 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
291 interhash = {399aab122b39cfd6f6e951a1b276c786},
292 intrahash = {f0324f70d62d9dfba568e393920aaa16},
293 isbn = {978-3-540-74123-7},
296 publisher = {Springer},
297 series = {Lecture Notes in Computer Science},
298 timestamp = {2007-09-20T00:00:00.000+0200},
299 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
300 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
306 @proceedings{DBLP:conf/ih/2006,
307 editor = {Jan Camenisch and
308 Christian S. Collberg and
311 title = {Information Hiding, 8th International Workshop, IH 2006,
312 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
313 booktitle = {Information Hiding},
314 publisher = {Springer},
315 series = {Lecture Notes in Computer Science},
318 isbn = {978-3-540-74123-7},
319 bibsource = {DBLP, http://dblp.uni-trier.de}
322 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
323 added-at = {2007-10-26T00:00:00.000+0200},
324 author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan},
325 biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
327 crossref = {DBLP:conf/mmsec/2007},
329 description = {dblp},
330 editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
331 ee = {http://doi.acm.org/10.1145/1288869.1288872},
332 interhash = {35c4a20b41b7861bcb09c9ff335ac601},
333 intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
334 isbn = {978-1-59593-857-2},
338 timestamp = {2007-10-26T00:00:00.000+0200},
339 title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
340 url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
344 @proceedings{DBLP:conf/mmsec/2007,
345 editor = {Deepa Kundur and
346 Balakrishnan Prabhakaran and
348 Jessica J. Fridrich},
349 title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
350 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
351 booktitle = {MM{\&}Sec},
354 isbn = {978-1-59593-857-2},
355 bibsource = {DBLP, http://dblp.uni-trier.de}
358 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
359 added-at = {2010-08-21T00:00:00.000+0200},
360 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
361 biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
362 booktitle = {Media Forensics and Security},
363 crossref = {DBLP:conf/mediaforensics/2010},
364 editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
365 ee = {http://dx.doi.org/10.1117/12.838002},
366 interhash = {a3d2215b959361a30f0b48f15c012bc9},
367 intrahash = {3405985533dce431b5013941a2c2c2cc},
368 isbn = {978-0-8194-7934-1},
372 series = {SPIE Proceedings},
373 timestamp = {2010-08-21T00:00:00.000+0200},
374 title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
375 url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
381 @proceedings{DBLP:conf/mediaforensics/2010,
382 editor = {Nasir D. Memon and
386 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
387 Electronic Imaging Symposium, San Jose, CA, USA, January
388 18-20, 2010, Proceedings},
389 booktitle = {Media Forensics and Security},
391 series = {SPIE Proceedings},
394 isbn = {978-0-8194-7934-1},
395 bibsource = {DBLP, http://dblp.uni-trier.de}
398 @article{DBLP:journals/corr/abs-1112-5239,
399 author = {Jacques M. Bahi and
400 Rapha{\"e}l Couturier and
401 Christophe Guyeux and
402 Pierre-Cyrille H{\'e}am},
403 title = {Efficient and Cryptographically Secure Generation of Chaotic
404 Pseudorandom Numbers on GPU},
406 volume = {abs/1112.5239},
408 ee = {http://arxiv.org/abs/1112.5239},
409 bibsource = {DBLP, http://dblp.uni-trier.de}
413 author = {Ponomarenko, Nikolay},
414 title = {PSNR-HVS-M page},
415 OPThowpublished = {},
418 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
424 author = {Bovik, Alan C.},
426 OPThowpublished = {},
429 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
434 @InProceedings{PSECAL07,
435 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
436 title = {On between-coefficient contrast masking of DCT basis functions},
437 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
440 editor = {Li,Baoxin},
446 OPTorganization = {},
454 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
455 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
456 journal = {IEEE Signal Processing Letters},
467 @inproceedings{DBLP:conf/crypto/ShubBB82,
468 author = {Lenore Blum and
471 title = {Comparison of Two Pseudo-Random Number Generators},
472 booktitle = {CRYPTO},
475 crossref = {DBLP:conf/crypto/1982},
476 bibsource = {DBLP, http://dblp.uni-trier.de}
478 @proceedings{DBLP:conf/crypto/1982,
479 editor = {David Chaum and
482 title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
483 Barbara, California, USA, August 23-25, 1982},
484 booktitle = {CRYPTO},
485 publisher = {Plenum Press, New York},
487 bibsource = {DBLP, http://dblp.uni-trier.de}
490 @inproceedings{Blum:1985:EPP:19478.19501,
491 author = {Blum, Manuel and Goldwasser, Shafi},
492 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
493 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
495 isbn = {0-387-15658-5},
496 location = {Santa Barbara, California, United States},
499 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
501 publisher = {Springer-Verlag New York, Inc.},
502 address = {New York, NY, USA},
503 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
506 @article{DBLP:journals/ejisec/FontaineG07,
507 author = {Caroline Fontaine and
509 title = {A Survey of Homomorphic Encryption for Nonspecialists},
510 journal = {EURASIP J. Information Security},
513 ee = {http://dx.doi.org/10.1155/2007/13801},
514 bibsource = {DBLP, http://dblp.uni-trier.de}
518 @article{Luo:2010:EAI:1824719.1824720,
519 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
520 title = {Edge adaptive image steganography based on LSB matching revisited},
521 journal = {Trans. Info. For. Sec.},
522 issue_date = {June 2010},
530 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
531 doi = {10.1109/TIFS.2010.2041812},
533 publisher = {IEEE Press},
534 address = {Piscataway, NJ, USA},
535 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
538 @article{Mielikainen06,
539 author = {Mielikainen, J.},
540 title = {LSB Matching Revisited},
541 journal = {Signal Processing Letters},
556 @article{Liu:2008:FMP:1284917.1285196,
557 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
558 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
559 journal = {Pattern Recogn.},
560 issue_date = {January, 2008},
568 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
569 doi = {10.1016/j.patcog.2007.06.005},
571 publisher = {Elsevier Science Inc.},
572 address = {New York, NY, USA},
573 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
578 @InProceedings{LHS08,
579 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
580 title = {Textural features based universal steganalysis},
583 booktitle = {Proc. SPIE 6819},
592 OPTorganization = {},
600 author = {Jan Kodovský and Jessica Fridrich},
601 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
604 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
613 OPTorganization = {},
619 @article{DBLP:journals/tifs/KodovskyFH12,
620 author = {Jan Kodovsk{\'y} and
621 Jessica J. Fridrich and
623 title = {Ensemble Classifiers for Steganalysis of Digital Media},
624 journal = {IEEE Transactions on Information Forensics and Security},
629 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
630 bibsource = {DBLP, http://dblp.uni-trier.de}
635 @article{Fillatre:2012:ASL:2333143.2333587,
636 author = {Fillatre, Lionel},
637 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
638 journal = {Trans. Sig. Proc.},
639 issue_date = {February 2012},
647 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
648 doi = {10.1109/TSP.2011.2174231},
650 publisher = {IEEE Press},
651 address = {Piscataway, NJ, USA},
655 @inproceedings{Tyan1993,
656 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
657 address = {{San Francisco, CA, USA}},
658 author = {Tyan, C. Y. and Wang, P. P.},
659 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
660 citeulike-article-id = {7936501},
661 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
663 posted-at = {2010-10-01 17:27:48},
665 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
671 @article{Canny:1986:CAE:11274.11275,
673 title = {A Computational Approach to Edge Detection},
674 journal = {IEEE Trans. Pattern Anal. Mach. Intell.},
675 issue_date = {June 1986},
683 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
684 doi = {10.1109/TPAMI.1986.4767851},
686 publisher = {IEEE Computer Society},
687 address = {Washington, DC, USA},
688 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
692 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
693 author = {Jessica J. Fridrich and
697 title = {Steganalysis of Content-Adaptive Steganography in Spatial
699 booktitle = {Information Hiding},
702 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
703 crossref = {DBLP:conf/ih/2011},
704 bibsource = {DBLP, http://dblp.uni-trier.de}
706 @proceedings{DBLP:conf/ih/2011,
707 editor = {Tom{\'a}s Filler and
708 Tom{\'a}s Pevn{\'y} and
711 title = {Information Hiding - 13th International Conference, IH 2011,
712 Prague, Czech Republic, May 18-20, 2011, Revised Selected
714 booktitle = {Information Hiding},
715 publisher = {Springer},
716 series = {Lecture Notes in Computer Science},
719 isbn = {978-3-642-24177-2},
720 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
721 bibsource = {DBLP, http://dblp.uni-trier.de}
724 @inproceedings{DBLP:conf/iwdw/Fridrich11,
725 author = {Jessica J. Fridrich},
726 title = {Modern Trends in Steganography and Steganalysis},
730 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
731 crossref = {DBLP:conf/iwdw/2011},
732 bibsource = {DBLP, http://dblp.uni-trier.de}
734 @proceedings{DBLP:conf/iwdw/2011,
735 editor = {Yun-Qing Shi and
737 Fernando P{\'e}rez-Gonz{\'a}lez},
738 title = {Digital Forensics and Watermarking - 10th International
739 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
740 2011, Revised Selected Papers},
742 publisher = {Springer},
743 series = {Lecture Notes in Computer Science},
746 isbn = {978-3-642-32204-4},
747 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
748 bibsource = {DBLP, http://dblp.uni-trier.de}