1 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
2 editor = {Ira S. Moskowitz},
3 author = {Shelby Pereira and
4 Sviatoslav Voloshynovskiy and
6 St{\'e}phane Marchand-Maillet and
8 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
9 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
10 title = {Second Generation Benchmarking and Application Oriented
14 series = {Lecture Notes in Computer Science},
15 publisher = {Springer},
20 @inproceedings{DBLP:conf/ih/Westfeld01,
21 added-at = {2011-06-28T00:00:00.000+0200},
22 author = {Westfeld, Andreas},
23 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
24 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
25 editor = {Ira S. Moskowitz},
27 publisher = {Springer},
28 series = {Lecture Notes in Computer Science},
29 title = {F5-A Steganographic Algorithm.},
38 @article{Chang20101286,
39 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
40 journal = "Digital Signal Processing",
43 pages = "1286 - 1307",
47 doi = "10.1016/j.dsp.2009.11.005",
48 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
49 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
50 keywords = "Security",
51 keywords = "Wet paper coding",
52 keywords = "Steganography",
53 keywords = "Indicator",
54 keywords = "Fuzzy edge detector"
59 @article{Hu:2007:HPE:1282866.1282944,
60 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
61 title = {A high performance edge detector based on fuzzy inference rules},
62 journal = {Inf. Sci.},
63 issue_date = {November, 2007},
71 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
72 doi = {10.1016/j.ins.2007.04.001},
74 publisher = {Elsevier Science Inc.},
75 address = {New York, NY, USA},
76 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
80 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
81 author = {Sorina Dumitrescu and
83 editor = {Ahmet M. Eskicioglu and
84 Jessica J. Fridrich and
86 title = {LSB steganalysis based on high-order statistics},
87 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
88 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
92 ee = {http://doi.acm.org/10.1145/1073170.1073176},
93 bibsource = {DBLP, http://dblp.uni-trier.de}
96 @inproceedings{DBLP:conf/ih/Ker05,
97 author = {Andrew D. Ker},
98 title = {A General Framework for Structural Steganalysis of LSB Replacement},
99 editor = {Mauro Barni and
100 Jordi Herrera-Joancomart\'{\i} and
101 Stefan Katzenbeisser and
102 Fernando P{\'e}rez-Gonz{\'a}lez},
103 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
104 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
107 ee = {http://dx.doi.org/10.1007/11558859_22},
108 publisher = {Springer},
109 series = {Lecture Notes in Computer Science},
115 editor = {Matthias Kirchner and
117 booktitle = {Information Hiding - 14th International Conference, IH 2012,
118 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
119 author = {Jessica J. Fridrich and
121 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
124 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
126 publisher = {Springer},
127 series = {Lecture Notes in Computer Science},
128 bibsource = {DBLP, http://dblp.uni-trier.de}
132 @article{DBLP:journals/tsp/DumitrescuWW03,
133 added-at = {2012-02-06T00:00:00.000+0100},
134 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
135 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
136 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
137 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
138 intrahash = {556caad9b61980d3458885153a52321c},
139 journal = {IEEE Transactions on Signal Processing},
143 timestamp = {2012-02-06T00:00:00.000+0100},
144 title = {Detection of LSB steganography via sample pair analysis.},
145 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
153 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
154 editor = {Nicolas D. Georganas and
155 Radu Popescu-Zeletin},
156 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
157 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
159 author = {Jessica J. Fridrich and
162 title = {Reliable detection of LSB steganography in color and grayscale
166 ee = {http://doi.acm.org/10.1145/1232454.1232466},
168 bibsource = {DBLP, http://dblp.uni-trier.de}
175 @inproceedings{DBLP:conf/ih/PevnyFB10,
176 author = {Tom{\'a}s Pevn{\'y} and
179 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
181 editor = {Rainer B{\"o}hme and
182 Philip W. L. Fong and
183 Reihaneh Safavi-Naini},
184 booktitle = {Information Hiding - 12th International Conference, IH 2010,
185 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
189 publisher = {Springer},
190 series = {Lecture Notes in Computer Science},
192 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
193 bibsource = {DBLP, http://dblp.uni-trier.de}
202 author = {Tom{\'a}s Pevn{\'y} and
206 title = {Break Our Steganographic System},
207 OPThowpublished = {},
210 note = {Available at \url{http://www.agents.cz/boss/}},
214 @proceedings{DBLP:conf/ih/2010,
215 editor = {Rainer B{\"o}hme and
216 Philip W. L. Fong and
217 Reihaneh Safavi-Naini},
218 title = {Information Hiding - 12th International Conference, IH 2010,
219 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
221 booktitle = {Information Hiding},
222 publisher = {Springer},
223 series = {Lecture Notes in Computer Science},
226 isbn = {978-3-642-16434-7},
227 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
228 bibsource = {DBLP, http://dblp.uni-trier.de}
232 @article{DBLP:journals/eswa/ChenCL10,
233 added-at = {2010-07-21T15:44:10.000+0200},
234 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
235 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
237 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
238 interhash = {bc34a5f04661fee24ee62c39e76361be},
239 intrahash = {28889a4ab329da28559f0910469f054b},
240 journal = {Expert Systems with Applications},
244 timestamp = {2010-07-21T15:44:10.000+0200},
245 title = {High payload steganography mechanism using hybrid edge detector.},
246 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
251 @article{DBLP:journals/tifs/FillerJF11,
252 added-at = {2011-09-29T00:00:00.000+0200},
253 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
254 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
255 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
256 interhash = {b27d23ed0c9936d568e16c51378abccd},
257 intrahash = {50e43c05a74eec17524b3df8db442da5},
258 journal = {IEEE Transactions on Information Forensics and Security},
262 timestamp = {2011-09-29T00:00:00.000+0200},
263 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
264 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
272 @inproceedings{DBLP:conf/ih/KimDR06,
273 added-at = {2007-09-20T00:00:00.000+0200},
274 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
275 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
276 booktitle = {Information Hiding},
277 crossref = {DBLP:conf/ih/2006},
279 description = {dblp},
280 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
281 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
282 interhash = {399aab122b39cfd6f6e951a1b276c786},
283 intrahash = {f0324f70d62d9dfba568e393920aaa16},
284 isbn = {978-3-540-74123-7},
287 publisher = {Springer},
288 series = {Lecture Notes in Computer Science},
289 timestamp = {2007-09-20T00:00:00.000+0200},
290 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
291 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
297 @proceedings{DBLP:conf/ih/2006,
298 editor = {Jan Camenisch and
299 Christian S. Collberg and
302 title = {Information Hiding, 8th International Workshop, IH 2006,
303 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
304 booktitle = {Information Hiding},
305 publisher = {Springer},
306 series = {Lecture Notes in Computer Science},
309 isbn = {978-3-540-74123-7},
310 bibsource = {DBLP, http://dblp.uni-trier.de}
315 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
316 author = {Jessica J. Fridrich and
317 Tom{\'a}s Pevn{\'y} and
319 title = {Statistically undetectable jpeg steganography: dead ends
320 challenges, and opportunities},
322 ee = {http://doi.acm.org/10.1145/1288869.1288872},
323 crossref = {DBLP:conf/mmsec/2007},
324 editor = {Deepa Kundur and
325 Balakrishnan Prabhakaran and
327 Jessica J. Fridrich},
328 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
329 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
332 isbn = {978-1-59593-857-2},
333 bibsource = {DBLP, http://dblp.uni-trier.de}
335 @proceedings{DBLP:conf/mmsec/2007,
342 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
343 editor = {Nasir D. Memon and
347 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
348 Electronic Imaging Symposium, San Jose, CA, USA, January
349 18-20, 2010, Proceedings},
350 author = {Tom{\'a}s Filler and
352 Jessica J. Fridrich},
353 title = {Minimizing embedding impact in steganography using trellis-coded
357 ee = {http://dx.doi.org/10.1117/12.838002},
358 bibsource = {DBLP, http://dblp.uni-trier.de},
360 series = {SPIE Proceedings},
371 @proceedings{DBLP:conf/mediaforensics/2010,
372 editor = {Nasir D. Memon and
376 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
377 Electronic Imaging Symposium, San Jose, CA, USA, January
378 18-20, 2010, Proceedings},
379 booktitle = {Media Forensics and Security},
381 series = {SPIE Proceedings},
384 isbn = {978-0-8194-7934-1},
385 bibsource = {DBLP, http://dblp.uni-trier.de}
388 @article{DBLP:journals/corr/abs-1112-5239,
389 author = {Jacques M. Bahi and
390 Rapha{\"e}l Couturier and
391 Christophe Guyeux and
392 Pierre-Cyrille H{\'e}am},
393 title = {Efficient and Cryptographically Secure Generation of Chaotic
394 Pseudorandom Numbers on GPU},
396 volume = {abs/1112.5239},
398 ee = {http://arxiv.org/abs/1112.5239},
399 bibsource = {DBLP, http://dblp.uni-trier.de}
403 author = {Ponomarenko, Nikolay},
404 title = {PSNR-HVS-M page},
405 OPThowpublished = {},
408 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
414 author = {Bovik, Alan C.},
416 OPThowpublished = {},
419 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
424 @InProceedings{PSECAL07,
425 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
426 title = {On between-coefficient contrast masking of DCT basis functions},
427 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
430 editor = {Li,Baoxin},
436 OPTorganization = {},
444 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
445 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
446 journal = {IEEE Signal Processing Letters},
457 @inproceedings{DBLP:conf/crypto/ShubBB82,
458 author = {Lenore Blum and
461 title = {Comparison of Two Pseudo-Random Number Generators},
462 editor = {David Chaum and
465 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
466 Barbara, California, USA, August 23-25, 1982},
468 bibsource = {DBLP, http://dblp.uni-trier.de},
469 publisher = {Plenum Press, New York},
471 bibsource = {DBLP, http://dblp.uni-trier.de}
475 @inproceedings{Blum:1985:EPP:19478.19501,
476 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
477 Barbara, California, USA, August 19-22, 1984, Proceedings},
478 author = {Manuel Blum and
480 title = {An Efficient Probabilistic Public-Key Encryption Scheme
481 Which Hides All Partial Information},
484 editor = {G. R. Blakley and
486 publisher = {Springer},
487 series = {Lecture Notes in Computer Science},
493 @article{DBLP:journals/ejisec/FontaineG07,
494 author = {Caroline Fontaine and
496 title = {A Survey of Homomorphic Encryption for Nonspecialists},
497 journal = {EURASIP Journal on Information Security},
502 ee = {http://dx.doi.org/10.1155/2007/13801},
503 bibsource = {DBLP, http://dblp.uni-trier.de}
507 @article{Luo:2010:EAI:1824719.1824720,
508 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
509 title = {Edge adaptive image steganography based on LSB matching revisited},
510 journal = {IEEE Transactions on Information Forensics and Security},
518 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
519 doi = {10.1109/TIFS.2010.2041812},
521 publisher = {IEEE Press},
522 address = {Piscataway, NJ, USA},
523 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
526 @article{Mielikainen06,
527 author = {Mielikainen, J.},
528 title = {LSB Matching Revisited},
529 journal = {IEEE Signal Processing Letters},
544 @article{Liu:2008:FMP:1284917.1285196,
545 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
546 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
547 journal = {Pattern Recogn.},
548 issue_date = {January, 2008},
556 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
557 doi = {10.1016/j.patcog.2007.06.005},
559 publisher = {Elsevier Science Inc.},
560 address = {New York, NY, USA},
561 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
566 @InProceedings{LHS08,
567 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
568 title = {Textural features based universal steganalysis},
571 booktitle = {Proc. SPIE 6819},
580 OPTorganization = {},
588 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
589 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
592 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
601 OPTorganization = {},
607 @article{DBLP:journals/tifs/KodovskyFH12,
608 author = {Jan Kodovsk{\'y} and
609 Jessica J. Fridrich and
611 title = {Ensemble Classifiers for Steganalysis of Digital Media},
612 journal = {IEEE Transactions on Information Forensics and Security},
617 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
618 bibsource = {DBLP, http://dblp.uni-trier.de}
623 @article{Fillatre:2012:ASL:2333143.2333587,
624 author = {Fillatre, Lionel},
625 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
626 journal = {IEEE Transactions on Signal Processing},
634 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
635 doi = {10.1109/TSP.2011.2174231},
637 publisher = {IEEE Press},
638 address = {Piscataway, NJ, USA},
642 @inproceedings{Tyan1993,
643 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
644 address = {{San Francisco, CA, USA}},
645 author = {Tyan, C. Y. and Wang, P. P.},
646 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
647 citeulike-article-id = {7936501},
648 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
650 posted-at = {2010-10-01 17:27:48},
652 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
658 @article{Canny:1986:CAE:11274.11275,
660 title = {A Computational Approach to Edge Detection},
661 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
662 issue_date = {June 1986},
670 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
671 doi = {10.1109/TPAMI.1986.4767851},
673 publisher = {IEEE Computer Society},
674 address = {Washington, DC, USA},
675 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
679 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
680 author = {Jessica J. Fridrich and
684 title = {Steganalysis of Content-Adaptive Steganography in Spatial
686 booktitle = {Information Hiding},
689 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
690 crossref = {DBLP:conf/ih/2011},
691 bibsource = {DBLP, http://dblp.uni-trier.de}
693 @proceedings{DBLP:conf/ih/2011,
694 editor = {Tom{\'a}s Filler and
695 Tom{\'a}s Pevn{\'y} and
698 title = {Information Hiding - 13th International Conference, IH 2011,
699 Prague, Czech Republic, May 18-20, 2011, Revised Selected
701 booktitle = {Information Hiding},
702 publisher = {Springer},
703 series = {Lecture Notes in Computer Science},
706 isbn = {978-3-642-24177-2},
707 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
708 bibsource = {DBLP, http://dblp.uni-trier.de}
711 @inproceedings{DBLP:conf/iwdw/Fridrich11,
712 author = {Jessica J. Fridrich},
713 title = {Modern Trends in Steganography and Steganalysis},
717 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
718 crossref = {DBLP:conf/iwdw/2011},
719 bibsource = {DBLP, http://dblp.uni-trier.de}
721 @proceedings{DBLP:conf/iwdw/2011,
722 editor = {Yun-Qing Shi and
724 Fernando P{\'e}rez-Gonz{\'a}lez},
725 title = {Digital Forensics and Watermarking - 10th International
726 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
727 2011, Revised Selected Papers},
729 publisher = {Springer},
730 series = {Lecture Notes in Computer Science},
733 isbn = {978-3-642-32204-4},
734 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
735 bibsource = {DBLP, http://dblp.uni-trier.de}