Practical methods of optimization; (2nd ed.)
Practical methods of optimization; (2nd ed.)
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Image compression via joint statistical characterization in the wavelet domain
IEEE Transactions on Image Processing
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
A new approach to reliable detection of LSB steganography in natural images
Signal Processing - Special section: Security of data hiding technologies
Locating secret messages in images
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
Statistical characterisation of MP3 encoders for steganalysis
Proceedings of the 2004 workshop on Multimedia and security
Automatic image orientation determination with natural image statistics
Proceedings of the 13th annual ACM international conference on Multimedia
Data Masking: A New Approach for Steganography?
Journal of VLSI Signal Processing Systems
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Information-theoretic analysis of steganalysis in real images
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Least significant bit steganography detection with machine learning techniques
Proceedings of the 2007 international workshop on Domain driven data mining
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Towards digital video steganalysis using asymptotic memoryless detection
Proceedings of the 9th workshop on Multimedia & security
Machine learning based adaptive watermark decoding in view of anticipated attack
Pattern Recognition
Review: A review on blind detection for image steganography
Signal Processing
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Universal Steganalysis Using Multiwavelet Higher-Order Statistics and Support Vector Machines
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III
Benchmarking for Steganography
Information Hiding
Fusion Based Blind Image Steganalysis by Boosting Feature Selection
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Steganalysis Versus Splicing Detection
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Steganalysis of halftone image using inverse halftoning
Signal Processing
Extracting hidden image using histogram, DFT and SVM
Proceedings of the 2nd Bangalore Annual Compute Conference
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Secure Cover Selection Steganography
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Multi-class Blind Steganalysis Based on Image Run-Length Analysis
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
MPSteg-color: data hiding through redundant basis decomposition
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Progressive randomization: Seeing the unseen
Computer Vision and Image Understanding
Secure steganography using gabor filter and neural networks
Transactions on data hiding and multimedia security III
Image watermarking method in multiwavelet domain based on support vector machines
Journal of Systems and Software
A novel universal steganalyser design: "LogSv"
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
SVD-based universal spatial domain image steganalysis
IEEE Transactions on Information Forensics and Security
Classification of steganalysis techniques: A study
Digital Signal Processing
BSS: Boosted steganography scheme with cover image preprocessing
Expert Systems with Applications: An International Journal
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
CBS: Contourlet-Based Steganalysis Method
Journal of Signal Processing Systems
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
Steganalysis of content-adaptive steganography in spatial domain
IH'11 Proceedings of the 13th international conference on Information hiding
A chosen plaintext steganalysis of Hide4PGP v 2.0
PReMI'05 Proceedings of the First international conference on Pattern Recognition and Machine Intelligence
Towards multi-class blind steganalyzer for JPEG images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Secret message location steganalysis based on local coherences of hue
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Computer Standards & Interfaces
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
Assessment of steganalytic methods using multiple regression models
IH'05 Proceedings of the 7th international conference on Information Hiding
A feature selection methodology for steganalysis
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Improving steganalysis by fusion techniques: a case study with image steganography
Transactions on Data Hiding and Multimedia Security I
Category attack for LSB steganalysis of JPEG images
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Universal JPEG steganalysis in the compressed frequency domain
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Steganalysis based on differential statistics
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Predicting protein-protein interactions by a supervised learning classifier
Computational Biology and Chemistry
Steganographic algorithm based on parametric discrete cosine transform
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Textural features for steganalysis
IH'12 Proceedings of the 14th international conference on Information Hiding
A novel mapping scheme for steganalysis
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
A wavelet-based particle swarm optimization algorithm for digital image watermarking
Integrated Computer-Aided Engineering - Anniversary Volume: Celebrating 20 Years of Excellence
Hi-index | 0.00 |
Techniques for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting hidden messages has become considerably more difficult. This paper describes an approach to detecting hidden messages in images that uses a wavelet-like decomposition to build higher-order statistical models of natural images. Support vector machines are then used to discriminate between untouched and adulterated images.