@inproceedings{DBLP:conf/ih/PereiraVMMP01,
+ editor = {Ira S. Moskowitz},
author = {Shelby Pereira and
Sviatoslav Voloshynovskiy and
Maribel Madueno and
St{\'e}phane Marchand-Maillet and
Thierry Pun},
+ booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
+ Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
title = {Second Generation Benchmarking and Application Oriented
Evaluation},
- booktitle = {Information Hiding},
year = {2001},
pages = {340-353},
- ee = {http://dx.doi.org/10.1007/3-540-45496-9_25},
- crossref = {DBLP:conf/ih/2001},
- bibsource = {DBLP, http://dblp.uni-trier.de}
+ series = {Lecture Notes in Computer Science},
+ publisher = {Springer},
+ volume = {2137},
}
-@proceedings{DBLP:conf/ih/2001,
- editor = {Ira S. Moskowitz},
- title = {Information Hiding, 4th International Workshop, IHW 2001,
+
+
+@inproceedings{DBLP:conf/ih/Westfeld01,
+ added-at = {2011-06-28T00:00:00.000+0200},
+ author = {Westfeld, Andreas},
+ booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
- booktitle = {Information Hiding},
+ editor = {Ira S. Moskowitz},
+ pages = {289-302},
publisher = {Springer},
- series = {Lecture Notes in Computer Science},
- volume = {2137},
- year = {2001},
- isbn = {3-540-42733-3},
- bibsource = {DBLP, http://dblp.uni-trier.de}
+ series = {Lecture Notes in Computer Science},
+ title = {F5-A Steganographic Algorithm.},
+ volume = 2137,
+ year = 2001
}
+
+
+
+
@article{Chang20101286,
title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
journal = "Digital Signal Processing",
address = {New York, NY, USA},
keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
}
+
+
@inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
- author = {Dumitrescu, Sorina and Wu, Xiaolin},
- title = {LSB steganalysis based on high-order statistics},
- booktitle = {Proceedings of the 7th workshop on Multimedia and security},
- series = {MMSec '05},
- year = {2005},
- isbn = {1-59593-032-9},
- location = {New York, NY, USA},
- pages = {25--32},
- numpages = {8},
- url = {http://doi.acm.org/10.1145/1073170.1073176},
- doi = {10.1145/1073170.1073176},
- acmid = {1073176},
- publisher = {ACM},
- address = {New York, NY, USA},
- keywords = {LSB steganography, digital media, steganalysis},
-}
+ author = {Sorina Dumitrescu and
+ Xiaolin Wu},
+ editor = {Ahmet M. Eskicioglu and
+ Jessica J. Fridrich and
+ Jana Dittmann},
+ title = {LSB steganalysis based on high-order statistics},
+ booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
+ MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
+ year = {2005},
+ publisher = {ACM},
+ pages = {25-32},
+ ee = {http://doi.acm.org/10.1145/1073170.1073176},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
@inproceedings{DBLP:conf/ih/Ker05,
author = {Andrew D. Ker},
title = {A General Framework for Structural Steganalysis of LSB Replacement},
- booktitle = {Information Hiding},
- year = {2005},
- pages = {296-311},
- ee = {http://dx.doi.org/10.1007/11558859_22},
- crossref = {DBLP:conf/ih/2005},
- bibsource = {DBLP, http://dblp.uni-trier.de}
-}
-@proceedings{DBLP:conf/ih/2005,
editor = {Mauro Barni and
Jordi Herrera-Joancomart\'{\i} and
Stefan Katzenbeisser and
Fernando P{\'e}rez-Gonz{\'a}lez},
- title = {Information Hiding, 7th International Workshop, IH 2005,
+ booktitle = {Information Hiding, 7th International Workshop, IH 2005,
Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
- booktitle = {Information Hiding},
+ year = {2005},
+ pages = {296-311},
+ ee = {http://dx.doi.org/10.1007/11558859_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {3727},
- year = {2005},
- isbn = {3-540-29039-7},
- bibsource = {DBLP, http://dblp.uni-trier.de}
}
+
@inproceedings{FK12,
-author = {Jessica J. Fridrich and
+ editor = {Matthias Kirchner and
+ Dipak Ghosal},
+ booktitle = {Information Hiding - 14th International Conference, IH 2012,
+ Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
+ author = {Jessica J. Fridrich and
Jan Kodovsk{\'y}},
- title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
- booktitle = {14th Information Hiding Conference},
- year = {2012},
- month=may,
- publisher = {Springer},
- address = {Berkeley, CA},
- note = {to appear}
+ title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
+ year = {2012},
+ pages = {31-45},
+ ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
+ volume = {7692},
+ publisher = {Springer},
+ series = {Lecture Notes in Computer Science},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
}
+
@article{DBLP:journals/tsp/DumitrescuWW03,
added-at = {2012-02-06T00:00:00.000+0100},
author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
year = 2003
}
-@inproceedings{DBLP:conf/mmsec/FridrichGD01,
- added-at = {2007-10-26T00:00:00.000+0200},
- author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
- biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
- booktitle = {MMSec},
- crossref = {DBLP:conf/mmsec/2001},
- date = {2007-10-26},
- description = {dblp},
- editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
- ee = {http://doi.acm.org/10.1145/1232454.1232466},
- interhash = {de49b3b9958119616eee66f14060f47f},
- intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
- isbn = {1-58113-393-6},
- keywords = {dblp},
- pages = {27-30},
- publisher = {ACM},
- timestamp = {2007-10-26T00:00:00.000+0200},
- title = {Reliable detection of LSB steganography in color and grayscale images.},
- url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
- year = 2001
-}
-@proceedings{DBLP:conf/mmsec/2001,
+
+@inproceedings{DBLP:conf/mmsec/FridrichGD01,
editor = {Nicolas D. Georganas and
Radu Popescu-Zeletin},
- title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
+ booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
October 5, 2001},
- booktitle = {MM{\&}Sec},
- publisher = {ACM},
+ author = {Jessica J. Fridrich and
+ Miroslav Goljan and
+ Rui Du},
+ title = {Reliable detection of LSB steganography in color and grayscale
+ images},
year = {2001},
- isbn = {1-58113-393-6},
+ pages = {27-30},
+ ee = {http://doi.acm.org/10.1145/1232454.1232466},
+ publisher = {ACM},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
+
+
+
+
@inproceedings{DBLP:conf/ih/PevnyFB10,
- added-at = {2010-10-08T00:00:00.000+0200},
- author = {Pevn{\'y}, Tom{\'a}s and Filler, Tom{\'a}s and Bas, Patrick},
- biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
- booktitle = {Information Hiding},
- crossref = {DBLP:conf/ih/2010},
- editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
- ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
- interhash = {b30869c1bb39a2c15b33e05e5139e58b},
- intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
- isbn = {978-3-642-16434-7},
- keywords = {dblp},
- pages = {161-177},
+ author = {Tom{\'a}s Pevn{\'y} and
+ Tom{\'a}s Filler and
+ Patrick Bas},
+ title = {Using High-Dimensional Image Models to Perform Highly Undetectable
+ Steganography},
+ editor = {Rainer B{\"o}hme and
+ Philip W. L. Fong and
+ Reihaneh Safavi-Naini},
+ booktitle = {Information Hiding - 12th International Conference, IH 2010,
+ Calgary, AB, Canada, June 28-30, 2010, Revised Selected
+ Papers},
+ year = {2010},
+ pages = {161-177},
publisher = {Springer},
- series = {Lecture Notes in Computer Science},
- timestamp = {2010-10-08T00:00:00.000+0200},
- title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
- url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
- volume = 6387,
- year = 2010
+ series = {Lecture Notes in Computer Science},
+ volume = {6387},
+ ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
}
+
+
+
@Misc{Boss10,
OPTkey = {},
- author = {Pevný, Tomáš and Filler, Tomáš and Bas, Patrick},
+ author = {Tom{\'a}s Pevn{\'y} and
+ Tom{\'a}s Filler and
+ Patrick Bas},
+
title = {Break Our Steganographic System},
OPThowpublished = {},
OPTmonth = {},
year = {2010},
- note = { available at \url{http://www.agents.cz/boss/}},
+ note = {Available at \url{http://www.agents.cz/boss/}},
OPTannote = {}
}
ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
interhash = {bc34a5f04661fee24ee62c39e76361be},
intrahash = {28889a4ab329da28559f0910469f054b},
- journal = {Expert Syst. Appl.},
+ journal = {Expert Systems with Applications},
keywords = {dblp},
number = 4,
pages = {3292-3301},
-@inproceedings{DBLP:conf/ih/Westfeld01,
- added-at = {2011-06-28T00:00:00.000+0200},
- author = {Westfeld, Andreas},
- biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
- booktitle = {Information Hiding},
- crossref = {DBLP:conf/ih/2001},
- editor = {Moskowitz, Ira S.},
- ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
- interhash = {e7eaa917e995dc9373f10304d3e79255},
- intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
- isbn = {3-540-42733-3},
- keywords = {dblp},
- pages = {289-302},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
- timestamp = {2011-06-28T00:00:00.000+0200},
- title = {F5-A Steganographic Algorithm.},
- url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
- volume = 2137,
- year = 2001
-}
-
@inproceedings{DBLP:conf/ih/KimDR06,
added-at = {2007-09-20T00:00:00.000+0200},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
-@inproceedings{DBLP:conf/mmsec/FridrichPK07,
- added-at = {2007-10-26T00:00:00.000+0200},
- author = {Fridrich, Jessica J. and Pevn{\'y}, Tom{\'a}s and Kodovsk{\'y}, Jan},
- biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
- booktitle = {MMSec},
- crossref = {DBLP:conf/mmsec/2007},
- date = {2007-10-26},
- description = {dblp},
- editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
- ee = {http://doi.acm.org/10.1145/1288869.1288872},
- interhash = {35c4a20b41b7861bcb09c9ff335ac601},
- intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
- isbn = {978-1-59593-857-2},
- keywords = {dblp},
- pages = {3-14},
- publisher = {ACM},
- timestamp = {2007-10-26T00:00:00.000+0200},
- title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
- url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
- year = 2007
-}
-@proceedings{DBLP:conf/mmsec/2007,
+
+@inproceedings{DBLP:conf/mmsec/FridrichPK07,
+ author = {Jessica J. Fridrich and
+ Tom{\'a}s Pevn{\'y} and
+ Jan Kodovsk{\'y}},
+ title = {Statistically undetectable jpeg steganography: dead ends
+ challenges, and opportunities},
+ pages = {3-14},
+ ee = {http://doi.acm.org/10.1145/1288869.1288872},
+ crossref = {DBLP:conf/mmsec/2007},
editor = {Deepa Kundur and
Balakrishnan Prabhakaran and
Jana Dittmann and
Jessica J. Fridrich},
- title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
+ booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
- booktitle = {MM{\&}Sec},
publisher = {ACM},
year = {2007},
isbn = {978-1-59593-857-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
+@proceedings{DBLP:conf/mmsec/2007,
+
+}
+
+
+
@inproceedings{DBLP:conf/mediaforensics/FillerJF10,
- added-at = {2010-08-21T00:00:00.000+0200},
- author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
- biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
- booktitle = {Media Forensics and Security},
- crossref = {DBLP:conf/mediaforensics/2010},
- editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
- ee = {http://dx.doi.org/10.1117/12.838002},
- interhash = {a3d2215b959361a30f0b48f15c012bc9},
- intrahash = {3405985533dce431b5013941a2c2c2cc},
- isbn = {978-0-8194-7934-1},
- keywords = {dblp},
- pages = 754105,
+ editor = {Nasir D. Memon and
+ Jana Dittmann and
+ Adnan M. Alattar and
+ Edward J. Delp},
+ booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
+ Electronic Imaging Symposium, San Jose, CA, USA, January
+ 18-20, 2010, Proceedings},
+ author = {Tom{\'a}s Filler and
+ Jan Judas and
+ Jessica J. Fridrich},
+ title = {Minimizing embedding impact in steganography using trellis-coded
+ quantization},
+ year = {2010},
+ pages = {754105},
+ ee = {http://dx.doi.org/10.1117/12.838002},
+ bibsource = {DBLP, http://dblp.uni-trier.de},
publisher = {SPIE},
- series = {SPIE Proceedings},
- timestamp = {2010-08-21T00:00:00.000+0200},
- title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
- url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
- volume = 7541,
- year = 2010
+ series = {SPIE Proceedings},
+ volume = {7541},
}
+
+
+
+
+
+
@proceedings{DBLP:conf/mediaforensics/2010,
editor = {Nasir D. Memon and
Jana Dittmann and
Manuel Blum and
Mike Shub},
title = {Comparison of Two Pseudo-Random Number Generators},
- booktitle = {CRYPTO},
- year = {1982},
- pages = {61-78},
- crossref = {DBLP:conf/crypto/1982},
- bibsource = {DBLP, http://dblp.uni-trier.de}
-}
-@proceedings{DBLP:conf/crypto/1982,
editor = {David Chaum and
Ronald L. Rivest and
Alan T. Sherman},
- title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
+ booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
Barbara, California, USA, August 23-25, 1982},
- booktitle = {CRYPTO},
+ pages = {61-78},
+ bibsource = {DBLP, http://dblp.uni-trier.de},
publisher = {Plenum Press, New York},
year = {1983},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
+
@inproceedings{Blum:1985:EPP:19478.19501,
- author = {Blum, Manuel and Goldwasser, Shafi},
- title = {An efficient probabilistic public key encryption scheme which hides all partial information},
- booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
- year = {1985},
- isbn = {0-387-15658-5},
- location = {Santa Barbara, California, United States},
- pages = {289--302},
- numpages = {14},
- url = {http://dl.acm.org/citation.cfm?id=19478.19501},
- acmid = {19501},
- publisher = {Springer-Verlag New York, Inc.},
- address = {New York, NY, USA},
- keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
-}
+ booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
+ Barbara, California, USA, August 19-22, 1984, Proceedings},
+ author = {Manuel Blum and
+ Shafi Goldwasser},
+ title = {An Efficient Probabilistic Public-Key Encryption Scheme
+ Which Hides All Partial Information},
+ year = {1985},
+ pages = {289-302},
+ editor = {G. R. Blakley and
+ David Chaum},
+ publisher = {Springer},
+ series = {Lecture Notes in Computer Science},
+ volume = {196}
+}
+
+
@article{DBLP:journals/ejisec/FontaineG07,
author = {Caroline Fontaine and
Fabien Galand},
title = {A Survey of Homomorphic Encryption for Nonspecialists},
- journal = {EURASIP J. Information Security},
+ journal = {EURASIP Journal on Information Security},
volume = {2007},
year = {2007},
+ NUMBER = {1},
+ PAGES = {013801},
ee = {http://dx.doi.org/10.1155/2007/13801},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Luo:2010:EAI:1824719.1824720,
author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
title = {Edge adaptive image steganography based on LSB matching revisited},
- journal = {Trans. Info. For. Sec.},
- issue_date = {June 2010},
+ journal = {IEEE Transactions on Information Forensics and Security},
volume = {5},
number = {2},
month = jun,
@article{Mielikainen06,
author = {Mielikainen, J.},
title = {LSB Matching Revisited},
- journal = {Signal Processing Letters},
+ journal = {IEEE Signal Processing Letters},
year = {2006},
OPTkey = {},
volume = {13},
@article{Fillatre:2012:ASL:2333143.2333587,
author = {Fillatre, Lionel},
title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
- journal = {Trans. Sig. Proc.},
- issue_date = {February 2012},
+ journal = {IEEE Transactions on Signal Processing},
+ year = {2012},
volume = {60},
number = {2},
month = feb,
- year = {2012},
issn = {1053-587X},
pages = {556--569},
numpages = {14},
@article{Canny:1986:CAE:11274.11275,
author = {Canny, J},
title = {A Computational Approach to Edge Detection},
- journal = {IEEE Trans. Pattern Anal. Mach. Intell.},
+ journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
issue_date = {June 1986},
- volume = {8},
+ volume = {PAMI-8},
number = {6},
month = jun,
year = {1986},