Uniform Embedding for Efficient JPEG Steganography release_uuj2gcycdnfehcmqtylazbnmca

by Linjie Guo, Jiangqun Ni, Yun Qing Shi

References

NOTE: currently batch computed and may include additional references sources, or be missing recent changes, compared to entity reference list.
Fuzzy reference matching is a work in progress!
Read more about quality, completeness, and caveats in the fatcat guide.
Showing 1 - 18 of 18 references (in 113ms)
[b0]

via fuzzy
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
T. Filler, J. Judas, J. Fridrich
2011   IEEE Transactions on Information Forensics and Security
doi:10.1109/tifs.2011.2134094 
web.archive.org [PDF]
[b1]

via grobid
A. Westfeld, "F5-A steganographic algorithm," in Proc. 4th Inf. Hiding Conf., vol. 2137. 2001, pp. 289-302.
[b2]

via grobid
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th ACM Workshop Multimedia Security, Dallas, TX, USA, Sep. 2007, pp. 3-14.
[b3]

via grobid
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Inf. Hiding Conf., vol. 4437. Jul. 2006, pp. 314-327.
[b4]

via grobid
V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganog- raphy method based on heuristic optimization and BCH syndrome coding," in Proc. 11th ACM Workshop Multimedia Security, Sep. 2009, pp. 131-140.
[b5]

via grobid
T. Filler and J. Fridrich, "Design of adaptive steganographic schemes for digital images," Proc. SPIE, vol. 7880, p. 78800F, Jan. 2011.
[b6]

via grobid
C. Wang and J. Ni, "An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients," in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 2012, pp. 1785-1788.
[b7]

via grobid
J. Kodovský and J. Fridrich, "Calibration revisited," in Proc. 11th ACM Workshop Multimedia Security, New York, NY, USA, Sep. 2009, pp. 63-74.
[b8]

via grobid
J. Kodovský, J. Fridrich, and V. Holub, "On dangers of overtrain- ing steganography to incomplete cover model," in Proc. 13th ACM Workshop Multimedia Security, New York, NY, USA, Sep. 2011, pp. 69-76.
[b9]

via fuzzy
Digital image steganography using universal distortion
Vojtěch Holub, Jessica Fridrich
2013   Information Hiding and Multimedia Security Workshop
doi:10.1145/2482513.2482514  dblp:conf/ih/HolubF13 
web.archive.org [PDF]
[b10]

via grobid
J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, p. 83030A, Jan. 2012.
[b11]

via grobid
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
[b12]

via grobid
C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Proc. IEEE Int. Symp. Circuits Syst., Mar. 2008, pp. 3029-3032.
[b13]

via grobid
L. Guo, J. Ni, and Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in Proc. 4th IEEE Int. Workshop Inf. Forensics Security, Tenerife, Spain, Dec. 2012, pp. 169-174.
[b14]

via grobid
P. Bas, T. Filler, and T. Pevný, "Break our steganographic system-The ins and outs of organizing boss," in Proc. 13th Inf. Hiding Conf., 2011, pp. 59-70.
[b15]

via fuzzy
Defending Against Statistical Steganalysis
Niels Provos
2001   USENIX Security Symposium
dblp:conf/uss/Provos01 
[b16]

via grobid
D. Freedman, Statistical Models: Theory and Practice. Cambridge, U.K.: Cambridge Univ. Press, 2009.
[b17]

via fuzzy
LIBSVM : A Library for Support Vector Machines
C Chang, C Lin
2011   ACM Transactions on Intelligent Systems and Technology  unpublished
web.archive.org [PDF]