-@inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
- author = {Dumitrescu, Sorina and Wu, Xiaolin},
- title = {LSB steganalysis based on high-order statistics},
- booktitle = {Proceedings of the 7th workshop on Multimedia and security},
- series = {MMSec '05},
- year = {2005},
- isbn = {1-59593-032-9},
- location = {New York, NY, USA},
- pages = {25--32},
- numpages = {8},
- url = {http://doi.acm.org/10.1145/1073170.1073176},
- doi = {10.1145/1073170.1073176},
- acmid = {1073176},
- publisher = {ACM},
+@inproceedings{DBLP:conf/ih/PereiraVMMP01,
+ editor = {Ira S. Moskowitz},
+ author = {Shelby Pereira and
+ Sviatoslav Voloshynovskiy and
+ Maribel Madueno and
+ St{\'e}phane Marchand-Maillet and
+ Thierry Pun},
+ booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
+ Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
+ title = {Second Generation Benchmarking and Application Oriented
+ Evaluation},
+ year = {2001},
+ pages = {340-353},
+ series = {Lecture Notes in Computer Science},
+ publisher = {Springer},
+ volume = {2137},
+}
+
+
+@inproceedings{DBLP:conf/ih/Westfeld01,
+ added-at = {2011-06-28T00:00:00.000+0200},
+ author = {Westfeld, Andreas},
+ booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
+ Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
+ editor = {Ira S. Moskowitz},
+ pages = {289-302},
+ publisher = {Springer},
+ series = {Lecture Notes in Computer Science},
+ title = {F5-A Steganographic Algorithm.},
+ volume = 2137,
+ year = 2001
+}
+
+
+
+
+
+@article{Chang20101286,
+title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
+journal = "Digital Signal Processing",
+volume = "20",
+number = "4",
+pages = "1286 - 1307",
+year = "2010",
+note = "",
+issn = "1051-2004",
+doi = "10.1016/j.dsp.2009.11.005",
+url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
+author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
+keywords = "Security",
+keywords = "Wet paper coding",
+keywords = "Steganography",
+keywords = "Indicator",
+keywords = "Fuzzy edge detector"
+}
+
+
+
+@article{Hu:2007:HPE:1282866.1282944,
+ author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
+ title = {A high performance edge detector based on fuzzy inference rules},
+ journal = {Inf. Sci.},
+ issue_date = {November, 2007},
+ volume = {177},
+ number = {21},
+ month = nov,
+ year = {2007},
+ issn = {0020-0255},
+ pages = {4768--4784},
+ numpages = {17},
+ url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
+ doi = {10.1016/j.ins.2007.04.001},
+ acmid = {1282944},
+ publisher = {Elsevier Science Inc.},
address = {New York, NY, USA},
- keywords = {LSB steganography, digital media, steganalysis},
+ keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
}
-@inproceedings{DBLP:conf/ih/Ker05,
- author = {Andrew D. Ker},
- title = {A General Framework for Structural Steganalysis of LSB Replacement},
- booktitle = {Information Hiding},
+
+@inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
+ author = {Sorina Dumitrescu and
+ Xiaolin Wu},
+ editor = {Ahmet M. Eskicioglu and
+ Jessica J. Fridrich and
+ Jana Dittmann},
+ title = {LSB steganalysis based on high-order statistics},
+ booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
+ MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
year = {2005},
- pages = {296-311},
- ee = {http://dx.doi.org/10.1007/11558859_22},
- crossref = {DBLP:conf/ih/2005},
+ publisher = {ACM},
+ pages = {25-32},
+ ee = {http://doi.acm.org/10.1145/1073170.1073176},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
-@proceedings{DBLP:conf/ih/2005,
+
+@inproceedings{DBLP:conf/ih/Ker05,
+ author = {Andrew D. Ker},
+ title = {A General Framework for Structural Steganalysis of LSB Replacement},
editor = {Mauro Barni and
Jordi Herrera-Joancomart\'{\i} and
Stefan Katzenbeisser and
Fernando P{\'e}rez-Gonz{\'a}lez},
- title = {Information Hiding, 7th International Workshop, IH 2005,
+ booktitle = {Information Hiding, 7th International Workshop, IH 2005,
Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
- booktitle = {Information Hiding},
+ year = {2005},
+ pages = {296-311},
+ ee = {http://dx.doi.org/10.1007/11558859_22},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {3727},
- year = {2005},
- isbn = {3-540-29039-7},
- bibsource = {DBLP, http://dblp.uni-trier.de}
}
+
@inproceedings{FK12,
-author = {Jessica J. Fridrich and
+ editor = {Matthias Kirchner and
+ Dipak Ghosal},
+ booktitle = {Information Hiding - 14th International Conference, IH 2012,
+ Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
+ author = {Jessica J. Fridrich and
Jan Kodovsk{\'y}},
- title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
- booktitle = {14th Information Hiding Conference},
- year = {2012},
- month=may,
- publisher = {Springer},
- address = {Berkeley, CA},
- note = {to appear}
+ title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
+ year = {2012},
+ pages = {31-45},
+ ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
+ volume = {7692},
+ publisher = {Springer},
+ series = {Lecture Notes in Computer Science},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
}
+
@article{DBLP:journals/tsp/DumitrescuWW03,
added-at = {2012-02-06T00:00:00.000+0100},
author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
year = 2003
}
-@inproceedings{DBLP:conf/mmsec/FridrichGD01,
- added-at = {2007-10-26T00:00:00.000+0200},
- author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui},
- biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp},
- booktitle = {MMSec},
- crossref = {DBLP:conf/mmsec/2001},
- date = {2007-10-26},
- description = {dblp},
- editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu},
- ee = {http://doi.acm.org/10.1145/1232454.1232466},
- interhash = {de49b3b9958119616eee66f14060f47f},
- intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b},
- isbn = {1-58113-393-6},
- keywords = {dblp},
- pages = {27-30},
- publisher = {ACM},
- timestamp = {2007-10-26T00:00:00.000+0200},
- title = {Reliable detection of LSB steganography in color and grayscale images.},
- url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01},
- year = 2001
-}
-@proceedings{DBLP:conf/mmsec/2001,
+
+@inproceedings{DBLP:conf/mmsec/FridrichGD01,
editor = {Nicolas D. Georganas and
Radu Popescu-Zeletin},
- title = {Proceedings of the 4th workshop on Multimedia {\&} Security:
+ booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
October 5, 2001},
- booktitle = {MM{\&}Sec},
- publisher = {ACM},
+ author = {Jessica J. Fridrich and
+ Miroslav Goljan and
+ Rui Du},
+ title = {Reliable detection of LSB steganography in color and grayscale
+ images},
year = {2001},
- isbn = {1-58113-393-6},
+ pages = {27-30},
+ ee = {http://doi.acm.org/10.1145/1232454.1232466},
+ publisher = {ACM},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
+
+
+
+
@inproceedings{DBLP:conf/ih/PevnyFB10,
- added-at = {2010-10-08T00:00:00.000+0200},
- author = {Pevný, Tomás and Filler, Tomás and Bas, Patrick},
- biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp},
- booktitle = {Information Hiding},
- crossref = {DBLP:conf/ih/2010},
- editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh},
- ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
- interhash = {b30869c1bb39a2c15b33e05e5139e58b},
- intrahash = {8d83b7eac2c22ed5e7e072fd43a34248},
- isbn = {978-3-642-16434-7},
- keywords = {dblp},
- pages = {161-177},
+ author = {Tom{\'a}s Pevn{\'y} and
+ Tom{\'a}s Filler and
+ Patrick Bas},
+ title = {Using High-Dimensional Image Models to Perform Highly Undetectable
+ Steganography},
+ editor = {Rainer B{\"o}hme and
+ Philip W. L. Fong and
+ Reihaneh Safavi-Naini},
+ booktitle = {Information Hiding - 12th International Conference, IH 2010,
+ Calgary, AB, Canada, June 28-30, 2010, Revised Selected
+ Papers},
+ year = {2010},
+ pages = {161-177},
publisher = {Springer},
- series = {Lecture Notes in Computer Science},
- timestamp = {2010-10-08T00:00:00.000+0200},
- title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.},
- url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10},
- volume = 6387,
- year = 2010
+ series = {Lecture Notes in Computer Science},
+ volume = {6387},
+ ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
+
+
+
+
+@Misc{Boss10,
+ OPTkey = {},
+ author = {Tom{\'a}s Pevn{\'y} and
+ Tom{\'a}s Filler and
+ Patrick Bas},
+
+ title = {Break Our Steganographic System},
+ OPThowpublished = {},
+ OPTmonth = {},
+ year = {2010},
+ note = {Available at \url{http://www.agents.cz/boss/}},
+ OPTannote = {}
}
@proceedings{DBLP:conf/ih/2010,
ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
interhash = {bc34a5f04661fee24ee62c39e76361be},
intrahash = {28889a4ab329da28559f0910469f054b},
- journal = {Expert Syst. Appl.},
- keywords = {dblp},
+ journal = {Expert Systems with Applications},
+ keywords = {dblp},
number = 4,
pages = {3292-3301},
timestamp = {2010-07-21T15:44:10.000+0200},
-@inproceedings{DBLP:conf/ih/Westfeld01,
- added-at = {2011-06-28T00:00:00.000+0200},
- author = {Westfeld, Andreas},
- biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp},
- booktitle = {Information Hiding},
- crossref = {DBLP:conf/ih/2001},
- editor = {Moskowitz, Ira S.},
- ee = {http://dx.doi.org/10.1007/3-540-45496-9_21},
- interhash = {e7eaa917e995dc9373f10304d3e79255},
- intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d},
- isbn = {3-540-42733-3},
- keywords = {dblp},
- pages = {289-302},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
- timestamp = {2011-06-28T00:00:00.000+0200},
- title = {F5-A Steganographic Algorithm.},
- url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01},
- volume = 2137,
- year = 2001
-}
-
-@proceedings{DBLP:conf/ih/2001,
- editor = {Ira S. Moskowitz},
- title = {Information Hiding, 4th International Workshop, IHW 2001,
- Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
- booktitle = {Information Hiding},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
- volume = {2137},
- year = {2001},
- isbn = {3-540-42733-3},
- bibsource = {DBLP, http://dblp.uni-trier.de}
-}
@inproceedings{DBLP:conf/ih/KimDR06,
added-at = {2007-09-20T00:00:00.000+0200},
series = {Lecture Notes in Computer Science},
timestamp = {2007-09-20T00:00:00.000+0200},
title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
- url = {http://dblp.uni-trier.de/db/conf/ih/ih2006.html#KimDR06},
+ url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
volume = 4437,
year = 2006
}
bibsource = {DBLP, http://dblp.uni-trier.de}
}
-@inproceedings{DBLP:conf/mmsec/FridrichPK07,
- added-at = {2007-10-26T00:00:00.000+0200},
- author = {Fridrich, Jessica J. and Pevný, Tomás and Kodovský, Jan},
- biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp},
- booktitle = {MMSec},
- crossref = {DBLP:conf/mmsec/2007},
- date = {2007-10-26},
- description = {dblp},
- editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.},
- ee = {http://doi.acm.org/10.1145/1288869.1288872},
- interhash = {35c4a20b41b7861bcb09c9ff335ac601},
- intrahash = {6123ac512b5e1fe72a44e73d101d8b95},
- isbn = {978-1-59593-857-2},
- keywords = {dblp},
- pages = {3-14},
- publisher = {ACM},
- timestamp = {2007-10-26T00:00:00.000+0200},
- title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.},
- url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07},
- year = 2007
-}
-@proceedings{DBLP:conf/mmsec/2007,
+
+@inproceedings{DBLP:conf/mmsec/FridrichPK07,
+ author = {Jessica J. Fridrich and
+ Tom{\'a}s Pevn{\'y} and
+ Jan Kodovsk{\'y}},
+ title = {Statistically undetectable jpeg steganography: dead ends
+ challenges, and opportunities},
+ pages = {3-14},
+ ee = {http://doi.acm.org/10.1145/1288869.1288872},
+ crossref = {DBLP:conf/mmsec/2007},
editor = {Deepa Kundur and
Balakrishnan Prabhakaran and
Jana Dittmann and
Jessica J. Fridrich},
- title = {Proceedings of the 9th workshop on Multimedia {\&} Security,
+ booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
- booktitle = {MM{\&}Sec},
publisher = {ACM},
year = {2007},
isbn = {978-1-59593-857-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
+@proceedings{DBLP:conf/mmsec/2007,
+
+}
+
+
+
@inproceedings{DBLP:conf/mediaforensics/FillerJF10,
- added-at = {2010-08-21T00:00:00.000+0200},
- author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
- biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp},
- booktitle = {Media Forensics and Security},
- crossref = {DBLP:conf/mediaforensics/2010},
- editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.},
- ee = {http://dx.doi.org/10.1117/12.838002},
- interhash = {a3d2215b959361a30f0b48f15c012bc9},
- intrahash = {3405985533dce431b5013941a2c2c2cc},
- isbn = {978-0-8194-7934-1},
- keywords = {dblp},
- pages = 754105,
+ editor = {Nasir D. Memon and
+ Jana Dittmann and
+ Adnan M. Alattar and
+ Edward J. Delp},
+ booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
+ Electronic Imaging Symposium, San Jose, CA, USA, January
+ 18-20, 2010, Proceedings},
+ author = {Tom{\'a}s Filler and
+ Jan Judas and
+ Jessica J. Fridrich},
+ title = {Minimizing embedding impact in steganography using trellis-coded
+ quantization},
+ year = {2010},
+ pages = {754105},
+ ee = {http://dx.doi.org/10.1117/12.838002},
+ bibsource = {DBLP, http://dblp.uni-trier.de},
publisher = {SPIE},
- series = {SPIE Proceedings},
- timestamp = {2010-08-21T00:00:00.000+0200},
- title = {Minimizing embedding impact in steganography using trellis-coded quantization.},
- url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10},
- volume = 7541,
- year = 2010
+ series = {SPIE Proceedings},
+ volume = {7541},
}
+
+
+
+
+
+
@proceedings{DBLP:conf/mediaforensics/2010,
editor = {Nasir D. Memon and
Jana Dittmann and
bibsource = {DBLP, http://dblp.uni-trier.de}
}
+@article{DBLP:journals/corr/abs-1112-5239,
+ author = {Jacques M. Bahi and
+ Rapha{\"e}l Couturier and
+ Christophe Guyeux and
+ Pierre-Cyrille H{\'e}am},
+ title = {Efficient and Cryptographically Secure Generation of Chaotic
+ Pseudorandom Numbers on GPU},
+ journal = {CoRR},
+ volume = {abs/1112.5239},
+ year = {2011},
+ ee = {http://arxiv.org/abs/1112.5239},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
+@Misc{psnrhvsm11,
+ author = {Ponomarenko, Nikolay},
+ title = {PSNR-HVS-M page},
+ OPThowpublished = {},
+ OPTmonth = {},
+ year = {2011},
+ note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
+ OPTannote = {}
+}
+
+@Misc{biqi11,
+ OPTkey = {},
+ author = {Bovik, Alan C.},
+ title = {BIQI page},
+ OPThowpublished = {},
+ OPTmonth = {},
+ year = {2011},
+ note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
+ OPTannote = {}
+}
+
+
+@InProceedings{PSECAL07,
+ author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
+ title = {On between-coefficient contrast masking of DCT basis functions},
+ booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
+ OPTpages = {},
+ year = {2007},
+ editor = {Li,Baoxin},
+ OPTvolume = {},
+ OPTnumber = {},
+ OPTseries = {},
+ OPTaddress = {},
+ month = jan,
+ OPTorganization = {},
+ OPTpublisher = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+
+@Article{MB10,
+ author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
+ title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
+ journal = {IEEE Signal Processing Letters},
+ year = {2010},
+ volume = {17},
+ number = {5},
+ pages = {513--516},
+ month = may,
+}
+
+
+
+
+@inproceedings{DBLP:conf/crypto/ShubBB82,
+ author = {Lenore Blum and
+ Manuel Blum and
+ Mike Shub},
+ title = {Comparison of Two Pseudo-Random Number Generators},
+ editor = {David Chaum and
+ Ronald L. Rivest and
+ Alan T. Sherman},
+ booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
+ Barbara, California, USA, August 23-25, 1982},
+ pages = {61-78},
+ bibsource = {DBLP, http://dblp.uni-trier.de},
+ publisher = {Plenum Press, New York},
+ year = {1983},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
+
+@inproceedings{Blum:1985:EPP:19478.19501,
+ booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
+ Barbara, California, USA, August 19-22, 1984, Proceedings},
+ author = {Manuel Blum and
+ Shafi Goldwasser},
+ title = {An Efficient Probabilistic Public-Key Encryption Scheme
+ Which Hides All Partial Information},
+ year = {1985},
+ pages = {289-302},
+ editor = {G. R. Blakley and
+ David Chaum},
+ publisher = {Springer},
+ series = {Lecture Notes in Computer Science},
+ volume = {196}
+}
+
+
+
+@article{DBLP:journals/ejisec/FontaineG07,
+ author = {Caroline Fontaine and
+ Fabien Galand},
+ title = {A Survey of Homomorphic Encryption for Nonspecialists},
+ journal = {EURASIP Journal on Information Security},
+ volume = {2007},
+ year = {2007},
+ NUMBER = {1},
+ PAGES = {013801},
+ ee = {http://dx.doi.org/10.1155/2007/13801},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
@article{Luo:2010:EAI:1824719.1824720,
author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
title = {Edge adaptive image steganography based on LSB matching revisited},
- journal = {Trans. Info. For. Sec.},
- issue_date = {June 2010},
+ journal = {IEEE Transactions on Information Forensics and Security},
volume = {5},
number = {2},
month = jun,
@article{Mielikainen06,
author = {Mielikainen, J.},
title = {LSB Matching Revisited},
- journal = {Signal Processing Letters},
+ journal = {IEEE Signal Processing Letters},
year = {2006},
OPTkey = {},
volume = {13},
@InProceedings{KF11,
- author = {Jan Kodovský and Jessica Fridrich},
+ author = {Jan Kodovsk{\'y} and Jessica Fridrich},
title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
OPTcrossref = {},
OPTkey = {},
@article{Fillatre:2012:ASL:2333143.2333587,
author = {Fillatre, Lionel},
title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
- journal = {Trans. Sig. Proc.},
- issue_date = {February 2012},
+ journal = {IEEE Transactions on Signal Processing},
+ year = {2012},
volume = {60},
number = {2},
month = feb,
- year = {2012},
issn = {1053-587X},
pages = {556--569},
numpages = {14},
acmid = {2333587},
publisher = {IEEE Press},
address = {Piscataway, NJ, USA},
-}
\ No newline at end of file
+}
+
+
+@inproceedings{Tyan1993,
+ abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
+ address = {{San Francisco, CA, USA}},
+ author = {Tyan, C. Y. and Wang, P. P.},
+ booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
+ citeulike-article-id = {7936501},
+ keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
+ pages = {600--605},
+ posted-at = {2010-10-01 17:27:48},
+ priority = {0},
+ title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
+ volume = {1},
+ year = {1993}
+}
+
+
+@article{Canny:1986:CAE:11274.11275,
+ author = {Canny, J},
+ title = {A Computational Approach to Edge Detection},
+ journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
+ issue_date = {June 1986},
+ volume = {PAMI-8},
+ number = {6},
+ month = jun,
+ year = {1986},
+ issn = {0162-8828},
+ pages = {679--698},
+ numpages = {20},
+ url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
+ doi = {10.1109/TPAMI.1986.4767851},
+ acmid = {11275},
+ publisher = {IEEE Computer Society},
+ address = {Washington, DC, USA},
+ keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
+}
+
+
+@inproceedings{DBLP:conf/ih/FridrichKHG11a,
+ author = {Jessica J. Fridrich and
+ Jan Kodovsk{\'y} and
+ Vojtech Holub and
+ Miroslav Goljan},
+ title = {Steganalysis of Content-Adaptive Steganography in Spatial
+ Domain},
+ booktitle = {Information Hiding},
+ year = {2011},
+ pages = {102-117},
+ ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
+ crossref = {DBLP:conf/ih/2011},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+@proceedings{DBLP:conf/ih/2011,
+ editor = {Tom{\'a}s Filler and
+ Tom{\'a}s Pevn{\'y} and
+ Scott Craver and
+ Andrew D. Ker},
+ title = {Information Hiding - 13th International Conference, IH 2011,
+ Prague, Czech Republic, May 18-20, 2011, Revised Selected
+ Papers},
+ booktitle = {Information Hiding},
+ publisher = {Springer},
+ series = {Lecture Notes in Computer Science},
+ volume = {6958},
+ year = {2011},
+ isbn = {978-3-642-24177-2},
+ ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
+@inproceedings{DBLP:conf/iwdw/Fridrich11,
+ author = {Jessica J. Fridrich},
+ title = {Modern Trends in Steganography and Steganalysis},
+ booktitle = {IWDW},
+ year = {2011},
+ pages = {1},
+ ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
+ crossref = {DBLP:conf/iwdw/2011},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+@proceedings{DBLP:conf/iwdw/2011,
+ editor = {Yun-Qing Shi and
+ Hyoung-Joong Kim and
+ Fernando P{\'e}rez-Gonz{\'a}lez},
+ title = {Digital Forensics and Watermarking - 10th International
+ Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
+ 2011, Revised Selected Papers},
+ booktitle = {IWDW},
+ publisher = {Springer},
+ series = {Lecture Notes in Computer Science},
+ volume = {7128},
+ year = {2012},
+ isbn = {978-3-642-32204-4},
+ ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
+ bibsource = {DBLP, http://dblp.uni-trier.de}
+}
+
+
+
+
+