X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/51c827b374614757c68f7d7cd8d799eb46f477e0..e477428ed31d945b364bd9064476c1f0a34f86ef:/biblio.bib?ds=inline diff --git a/biblio.bib b/biblio.bib index 89cddc2..bf2fc7e 100644 --- a/biblio.bib +++ b/biblio.bib @@ -1,31 +1,40 @@ @inproceedings{DBLP:conf/ih/PereiraVMMP01, + editor = {Ira S. Moskowitz}, author = {Shelby Pereira and Sviatoslav Voloshynovskiy and Maribel Madueno and St{\'e}phane Marchand-Maillet and Thierry Pun}, + booktitle = {Information Hiding, 4th International Workshop, IHW 2001, + Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, title = {Second Generation Benchmarking and Application Oriented Evaluation}, - booktitle = {Information Hiding}, year = {2001}, pages = {340-353}, - ee = {http://dx.doi.org/10.1007/3-540-45496-9_25}, - crossref = {DBLP:conf/ih/2001}, - bibsource = {DBLP, http://dblp.uni-trier.de} + series = {Lecture Notes in Computer Science}, + publisher = {Springer}, + volume = {2137}, } -@proceedings{DBLP:conf/ih/2001, - editor = {Ira S. Moskowitz}, - title = {Information Hiding, 4th International Workshop, IHW 2001, + + +@inproceedings{DBLP:conf/ih/Westfeld01, + added-at = {2011-06-28T00:00:00.000+0200}, + author = {Westfeld, Andreas}, + booktitle = {Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, - booktitle = {Information Hiding}, + editor = {Ira S. Moskowitz}, + pages = {289-302}, publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {2137}, - year = {2001}, - isbn = {3-540-42733-3}, - bibsource = {DBLP, http://dblp.uni-trier.de} + series = {Lecture Notes in Computer Science}, + title = {F5-A Steganographic Algorithm.}, + volume = 2137, + year = 2001 } + + + + @article{Chang20101286, title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector", journal = "Digital Signal Processing", @@ -66,62 +75,60 @@ keywords = "Fuzzy edge detector" address = {New York, NY, USA}, keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables}, } + + @inproceedings{Dumitrescu:2005:LSB:1073170.1073176, - author = {Dumitrescu, Sorina and Wu, Xiaolin}, - title = {LSB steganalysis based on high-order statistics}, - booktitle = {Proceedings of the 7th workshop on Multimedia and security}, - series = {MMSec '05}, - year = {2005}, - isbn = {1-59593-032-9}, - location = {New York, NY, USA}, - pages = {25--32}, - numpages = {8}, - url = {http://doi.acm.org/10.1145/1073170.1073176}, - doi = {10.1145/1073170.1073176}, - acmid = {1073176}, - publisher = {ACM}, - address = {New York, NY, USA}, - keywords = {LSB steganography, digital media, steganalysis}, -} + author = {Sorina Dumitrescu and + Xiaolin Wu}, + editor = {Ahmet M. Eskicioglu and + Jessica J. Fridrich and + Jana Dittmann}, + title = {LSB steganalysis based on high-order statistics}, + booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, + MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, + year = {2005}, + publisher = {ACM}, + pages = {25-32}, + ee = {http://doi.acm.org/10.1145/1073170.1073176}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} @inproceedings{DBLP:conf/ih/Ker05, author = {Andrew D. Ker}, title = {A General Framework for Structural Steganalysis of LSB Replacement}, - booktitle = {Information Hiding}, - year = {2005}, - pages = {296-311}, - ee = {http://dx.doi.org/10.1007/11558859_22}, - crossref = {DBLP:conf/ih/2005}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} -@proceedings{DBLP:conf/ih/2005, editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and Stefan Katzenbeisser and Fernando P{\'e}rez-Gonz{\'a}lez}, - title = {Information Hiding, 7th International Workshop, IH 2005, + booktitle = {Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, - booktitle = {Information Hiding}, + year = {2005}, + pages = {296-311}, + ee = {http://dx.doi.org/10.1007/11558859_22}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3727}, - year = {2005}, - isbn = {3-540-29039-7}, - bibsource = {DBLP, http://dblp.uni-trier.de} } + @inproceedings{FK12, -author = {Jessica J. Fridrich and + editor = {Matthias Kirchner and + Dipak Ghosal}, + booktitle = {Information Hiding - 14th International Conference, IH 2012, + Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, + author = {Jessica J. Fridrich and Jan Kodovsk{\'y}}, - title = {Steganalysis of LSB Replacement Using Parity-Aware Features}, - booktitle = {14th Information Hiding Conference}, - year = {2012}, - month=may, - publisher = {Springer}, - address = {Berkeley, CA}, - note = {to appear} + title = {Steganalysis of LSB Replacement Using Parity-Aware Features}, + year = {2012}, + pages = {31-45}, + ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3}, + volume = {7692}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + bibsource = {DBLP, http://dblp.uni-trier.de} } + @article{DBLP:journals/tsp/DumitrescuWW03, added-at = {2012-02-06T00:00:00.000+0100}, author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe}, @@ -140,73 +147,67 @@ author = {Jessica J. Fridrich and year = 2003 } -@inproceedings{DBLP:conf/mmsec/FridrichGD01, - added-at = {2007-10-26T00:00:00.000+0200}, - author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui}, - biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp}, - booktitle = {MMSec}, - crossref = {DBLP:conf/mmsec/2001}, - date = {2007-10-26}, - description = {dblp}, - editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu}, - ee = {http://doi.acm.org/10.1145/1232454.1232466}, - interhash = {de49b3b9958119616eee66f14060f47f}, - intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b}, - isbn = {1-58113-393-6}, - keywords = {dblp}, - pages = {27-30}, - publisher = {ACM}, - timestamp = {2007-10-26T00:00:00.000+0200}, - title = {Reliable detection of LSB steganography in color and grayscale images.}, - url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01}, - year = 2001 -} -@proceedings{DBLP:conf/mmsec/2001, + +@inproceedings{DBLP:conf/mmsec/FridrichGD01, editor = {Nicolas D. Georganas and Radu Popescu-Zeletin}, - title = {Proceedings of the 4th workshop on Multimedia {\&} Security: + booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, - booktitle = {MM{\&}Sec}, - publisher = {ACM}, + author = {Jessica J. Fridrich and + Miroslav Goljan and + Rui Du}, + title = {Reliable detection of LSB steganography in color and grayscale + images}, year = {2001}, - isbn = {1-58113-393-6}, + pages = {27-30}, + ee = {http://doi.acm.org/10.1145/1232454.1232466}, + publisher = {ACM}, bibsource = {DBLP, http://dblp.uni-trier.de} } + + + + @inproceedings{DBLP:conf/ih/PevnyFB10, - added-at = {2010-10-08T00:00:00.000+0200}, - author = {Pevn{\'y}, Tom{\'a}s and Filler, Tom{\'a}s and Bas, Patrick}, - biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp}, - booktitle = {Information Hiding}, - crossref = {DBLP:conf/ih/2010}, - editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh}, - ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13}, - interhash = {b30869c1bb39a2c15b33e05e5139e58b}, - intrahash = {8d83b7eac2c22ed5e7e072fd43a34248}, - isbn = {978-3-642-16434-7}, - keywords = {dblp}, - pages = {161-177}, + author = {Tom{\'a}s Pevn{\'y} and + Tom{\'a}s Filler and + Patrick Bas}, + title = {Using High-Dimensional Image Models to Perform Highly Undetectable + Steganography}, + editor = {Rainer B{\"o}hme and + Philip W. L. Fong and + Reihaneh Safavi-Naini}, + booktitle = {Information Hiding - 12th International Conference, IH 2010, + Calgary, AB, Canada, June 28-30, 2010, Revised Selected + Papers}, + year = {2010}, + pages = {161-177}, publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - timestamp = {2010-10-08T00:00:00.000+0200}, - title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.}, - url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10}, - volume = 6387, - year = 2010 + series = {Lecture Notes in Computer Science}, + volume = {6387}, + ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13}, + bibsource = {DBLP, http://dblp.uni-trier.de} } + + + @Misc{Boss10, OPTkey = {}, - author = {Pevný, Tomáš and Filler, Tomáš and Bas, Patrick}, + author = {Tom{\'a}s Pevn{\'y} and + Tom{\'a}s Filler and + Patrick Bas}, + title = {Break Our Steganographic System}, OPThowpublished = {}, OPTmonth = {}, year = {2010}, - note = { available at \url{http://www.agents.cz/boss/}}, + note = {Available at \url{http://www.agents.cz/boss/}}, OPTannote = {} } @@ -236,7 +237,7 @@ author = {Jessica J. Fridrich and ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050}, interhash = {bc34a5f04661fee24ee62c39e76361be}, intrahash = {28889a4ab329da28559f0910469f054b}, - journal = {Expert Syst. Appl.}, + journal = {Expert Systems with Applications}, keywords = {dblp}, number = 4, pages = {3292-3301}, @@ -267,28 +268,6 @@ author = {Jessica J. Fridrich and -@inproceedings{DBLP:conf/ih/Westfeld01, - added-at = {2011-06-28T00:00:00.000+0200}, - author = {Westfeld, Andreas}, - biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp}, - booktitle = {Information Hiding}, - crossref = {DBLP:conf/ih/2001}, - editor = {Moskowitz, Ira S.}, - ee = {http://dx.doi.org/10.1007/3-540-45496-9_21}, - interhash = {e7eaa917e995dc9373f10304d3e79255}, - intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d}, - isbn = {3-540-42733-3}, - keywords = {dblp}, - pages = {289-302}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - timestamp = {2011-06-28T00:00:00.000+0200}, - title = {F5-A Steganographic Algorithm.}, - url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01}, - volume = 2137, - year = 2001 -} - @inproceedings{DBLP:conf/ih/KimDR06, added-at = {2007-09-20T00:00:00.000+0200}, @@ -331,65 +310,64 @@ author = {Jessica J. Fridrich and bibsource = {DBLP, http://dblp.uni-trier.de} } -@inproceedings{DBLP:conf/mmsec/FridrichPK07, - added-at = {2007-10-26T00:00:00.000+0200}, - author = {Fridrich, Jessica J. and Pevn{\'y}, Tom{\'a}s and Kodovsk{\'y}, Jan}, - biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp}, - booktitle = {MMSec}, - crossref = {DBLP:conf/mmsec/2007}, - date = {2007-10-26}, - description = {dblp}, - editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.}, - ee = {http://doi.acm.org/10.1145/1288869.1288872}, - interhash = {35c4a20b41b7861bcb09c9ff335ac601}, - intrahash = {6123ac512b5e1fe72a44e73d101d8b95}, - isbn = {978-1-59593-857-2}, - keywords = {dblp}, - pages = {3-14}, - publisher = {ACM}, - timestamp = {2007-10-26T00:00:00.000+0200}, - title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.}, - url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07}, - year = 2007 -} -@proceedings{DBLP:conf/mmsec/2007, + +@inproceedings{DBLP:conf/mmsec/FridrichPK07, + author = {Jessica J. Fridrich and + Tom{\'a}s Pevn{\'y} and + Jan Kodovsk{\'y}}, + title = {Statistically undetectable jpeg steganography: dead ends + challenges, and opportunities}, + pages = {3-14}, + ee = {http://doi.acm.org/10.1145/1288869.1288872}, + crossref = {DBLP:conf/mmsec/2007}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, - title = {Proceedings of the 9th workshop on Multimedia {\&} Security, + booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, - booktitle = {MM{\&}Sec}, publisher = {ACM}, year = {2007}, isbn = {978-1-59593-857-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } +@proceedings{DBLP:conf/mmsec/2007, + +} + + + @inproceedings{DBLP:conf/mediaforensics/FillerJF10, - added-at = {2010-08-21T00:00:00.000+0200}, - author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.}, - biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp}, - booktitle = {Media Forensics and Security}, - crossref = {DBLP:conf/mediaforensics/2010}, - editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.}, - ee = {http://dx.doi.org/10.1117/12.838002}, - interhash = {a3d2215b959361a30f0b48f15c012bc9}, - intrahash = {3405985533dce431b5013941a2c2c2cc}, - isbn = {978-0-8194-7934-1}, - keywords = {dblp}, - pages = 754105, + editor = {Nasir D. Memon and + Jana Dittmann and + Adnan M. Alattar and + Edward J. Delp}, + booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE + Electronic Imaging Symposium, San Jose, CA, USA, January + 18-20, 2010, Proceedings}, + author = {Tom{\'a}s Filler and + Jan Judas and + Jessica J. Fridrich}, + title = {Minimizing embedding impact in steganography using trellis-coded + quantization}, + year = {2010}, + pages = {754105}, + ee = {http://dx.doi.org/10.1117/12.838002}, + bibsource = {DBLP, http://dblp.uni-trier.de}, publisher = {SPIE}, - series = {SPIE Proceedings}, - timestamp = {2010-08-21T00:00:00.000+0200}, - title = {Minimizing embedding impact in steganography using trellis-coded quantization.}, - url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10}, - volume = 7541, - year = 2010 + series = {SPIE Proceedings}, + volume = {7541}, } + + + + + + @proceedings{DBLP:conf/mediaforensics/2010, editor = {Nasir D. Memon and Jana Dittmann and @@ -481,47 +459,46 @@ author = {Jessica J. Fridrich and Manuel Blum and Mike Shub}, title = {Comparison of Two Pseudo-Random Number Generators}, - booktitle = {CRYPTO}, - year = {1982}, - pages = {61-78}, - crossref = {DBLP:conf/crypto/1982}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} -@proceedings{DBLP:conf/crypto/1982, editor = {David Chaum and Ronald L. Rivest and Alan T. Sherman}, - title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa + booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982}, - booktitle = {CRYPTO}, + pages = {61-78}, + bibsource = {DBLP, http://dblp.uni-trier.de}, publisher = {Plenum Press, New York}, year = {1983}, bibsource = {DBLP, http://dblp.uni-trier.de} } + @inproceedings{Blum:1985:EPP:19478.19501, - author = {Blum, Manuel and Goldwasser, Shafi}, - title = {An efficient probabilistic public key encryption scheme which hides all partial information}, - booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology}, - year = {1985}, - isbn = {0-387-15658-5}, - location = {Santa Barbara, California, United States}, - pages = {289--302}, - numpages = {14}, - url = {http://dl.acm.org/citation.cfm?id=19478.19501}, - acmid = {19501}, - publisher = {Springer-Verlag New York, Inc.}, - address = {New York, NY, USA}, - keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption}, -} + booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa + Barbara, California, USA, August 19-22, 1984, Proceedings}, + author = {Manuel Blum and + Shafi Goldwasser}, + title = {An Efficient Probabilistic Public-Key Encryption Scheme + Which Hides All Partial Information}, + year = {1985}, + pages = {289-302}, + editor = {G. R. Blakley and + David Chaum}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {196} +} + + @article{DBLP:journals/ejisec/FontaineG07, author = {Caroline Fontaine and Fabien Galand}, title = {A Survey of Homomorphic Encryption for Nonspecialists}, - journal = {EURASIP J. Information Security}, + journal = {EURASIP Journal on Information Security}, volume = {2007}, year = {2007}, + NUMBER = {1}, + PAGES = {013801}, ee = {http://dx.doi.org/10.1155/2007/13801}, bibsource = {DBLP, http://dblp.uni-trier.de} } @@ -530,8 +507,7 @@ author = {Jessica J. Fridrich and @article{Luo:2010:EAI:1824719.1824720, author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu}, title = {Edge adaptive image steganography based on LSB matching revisited}, - journal = {Trans. Info. For. Sec.}, - issue_date = {June 2010}, + journal = {IEEE Transactions on Information Forensics and Security}, volume = {5}, number = {2}, month = jun, @@ -550,7 +526,7 @@ author = {Jessica J. Fridrich and @article{Mielikainen06, author = {Mielikainen, J.}, title = {LSB Matching Revisited}, - journal = {Signal Processing Letters}, + journal = {IEEE Signal Processing Letters}, year = {2006}, OPTkey = {}, volume = {13}, @@ -647,12 +623,11 @@ author = {Jessica J. Fridrich and @article{Fillatre:2012:ASL:2333143.2333587, author = {Fillatre, Lionel}, title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images}, - journal = {Trans. Sig. Proc.}, - issue_date = {February 2012}, + journal = {IEEE Transactions on Signal Processing}, + year = {2012}, volume = {60}, number = {2}, month = feb, - year = {2012}, issn = {1053-587X}, pages = {556--569}, numpages = {14}, @@ -683,9 +658,9 @@ author = {Jessica J. Fridrich and @article{Canny:1986:CAE:11274.11275, author = {Canny, J}, title = {A Computational Approach to Edge Detection}, - journal = {IEEE Trans. Pattern Anal. Mach. Intell.}, + journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, issue_date = {June 1986}, - volume = {8}, + volume = {PAMI-8}, number = {6}, month = jun, year = {1986},