The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Probability Models for Clutter in Natural Images
IEEE Transactions on Pattern Analysis and Machine Intelligence
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Introduction to Coding Theory
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
IEEE Transactions on Information Theory
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
Frequency-domain data hiding based on the Matryoshka principle
International Journal of Advanced Media and Communication
Ubiquity
The capability of image in hiding a secret message
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
Data-Embeddable Texture Synthesis
SG '07 Proceedings of the 8th international symposium on Smart Graphics
WhiteSteg: a new scheme in information hiding using text steganography
WSEAS Transactions on Computers
An improved steganalysis approach for breaking the F5 algorithm
WSEAS Transactions on Computers
Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Detecting steganography on a large scale
Crossroads
Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography
CICLing '09 Proceedings of the 10th International Conference on Computational Linguistics and Intelligent Text Processing
Digital logic based encoding strategies for steganography on voice-over-IP
MM '09 Proceedings of the 17th ACM international conference on Multimedia
A high-capacity steganography scheme for JPEG2000 baseline system
IEEE Transactions on Image Processing
Geometrically robust image watermarking using star patterns
SIP '07 Proceedings of the Ninth IASTED International Conference on Signal and Image Processing
A New Steganography Based on Χ2 Technic
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Evaluation of Feature Selection Measures for Steganalysis
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Texture synthesis for mobile data communications
IEEE Computer Graphics and Applications
Image processing algorithms employing two-dimensional Karhunen-Loeve Transform
Annales UMCS, Informatica
An application of linear mixed effects model to steganography detection
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
An Effective Message Embedding Scheme for 3D Models
Fundamenta Informaticae
Hiding secret data in images via predictive coding
Pattern Recognition
A security steganography method for lossy compression gray scale image
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Tri-layer stego for enhanced security: a keyless random approach
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
An M-sequence based steganography model for voice over IP
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A method for automatic identification of signatures of steganography software
IEEE Transactions on Information Forensics and Security
A local variance-controlled reversible data hiding method using prediction and histogram-shifting
Journal of Systems and Software
ICGI'10 Proceedings of the 10th international colloquium conference on Grammatical inference: theoretical results and applications
An efficient prediction-and-shifting embedding technique for high quality reversible data hiding
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Journal of Visual Communication and Image Representation
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Huffman table swapping-based steganograpy for MP3 audio
Multimedia Tools and Applications
Towards a protocol for autonomic covert communication
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Stegobot: a covert social network botnet
IH'11 Proceedings of the 13th international conference on Information hiding
A network-flow-based method for embedding rectification
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
An improved image data hiding method using two-layer embedment strategy
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Adaptive partial-matching steganography for voice over IP using triple M sequences
Computer Communications
An extended matrix encoding algorithm for steganography of high embedding efficiency
Computers and Electrical Engineering
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
KL-sense secure image steganography
International Journal of Security and Networks
An analysis of empirical PMF based tests for least significant bit image steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Journal of Systems and Software
An intelligent chaotic embedding approach to enhance stego-image quality
Information Sciences: an International Journal
Robust and secured image-adaptive data hiding
Digital Signal Processing
A new blind method for detecting novel steganography
Digital Investigation: The International Journal of Digital Forensics & Incident Response
An Effective Message Embedding Scheme for 3D Models
Fundamenta Informaticae
Human visual system based data embedding method using quadtree partitioning
Image Communication
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
Webpage information hiding algorithm based on integration of tags and data
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Journal of Systems and Software
Creating optimal cloud storage systems
Future Generation Computer Systems
Enriching undergraduate computer science curriculum with steganography examples
Journal of Computing Sciences in Colleges
Journal of Systems and Software
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear
Proceedings of the 4th ACM conference on Data and application security and privacy
Privacy aware image template matching in clouds using ambient data
The Journal of Supercomputing
Wavelet-transform steganography: algorithm and hardware implementation
International Journal of Electronic Security and Digital Forensics
Data hiding by an improved exploiting modification direction
Multimedia Tools and Applications
Hi-index | 0.00 |
Although people have hidden secrets in plain sight-now called steganography-throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today's security techniques.