Topics

No keywords indexed for this article. Browse by subject →

References
41
[1]
westfeld "high capacity despite better steganalysis (f5a steganographic algorithm)" Proc 4th Int Workshop Information Hiding (2001) 10.1007/3-540-45496-9_21
[2]
The Nature of Statistical Learning Theory

Vladimir N. Vapnik

10.1007/978-1-4757-2440-0
[3]
sarkar "further study on yass: steganography based on randomized embedding to resist blind steganalysis" Proc SPIEConf Electronic Imaging Security Steganography Watermarking Multimedia Contents (2008)
[4]
sallee "model-based steganography" Proc 2nd Int Workshop Digital Watermarking (2003) 10.1007/978-3-540-24624-4_12
[5]
pevn "from blind to quantitative steganalysis" Proc SPIE Electronic Imaging Media Forensics and Security XI (2009)
[7]
sullivan "steganalysis of spread spectrum data hiding exploiting cover memory" Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII (2005) 10.1117/12.588121
[8]
soukal "maximum likelihood estimation of secret message length embedded using <formula formulatype="inline"> <tex notation="tex">$\pm k$</tex></formula> steganography in spatial domain" Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII (2005) 10.1117/12.584426
[9]
solanki "yass: yet another steganographic scheme that resists blind steganalysis" Proc 9th Int Workshop Information Hiding (2007) 10.1007/978-3-540-77370-2_2
[10]
shi "a markov process based approach to effective attacking jpeg steganography" Proc 8th Int Workshop Information Hiding (2006) 10.1007/978-3-540-74124-4_17
[11]
goljan "new blind steganalysis and its implications" Proc SPIE Security Steganography and Watermarking of Multimedia Contents VII (2006)
[12]
xuan "steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions" Proc 7th Int Workshop Information Hiding (2005) 10.1007/11558859_20
[13]
harmsen "steganalysis of additive noise modelable information hiding" Proc SPIE Electron Imaging Security Watermarking Multimedia Contents (2003) 10.1117/12.476813
[14]
hetzl "a graphtheoretic approach to steganography" Proc 9th IFIP TC-6 TC-11 Int Conf Communications and Multimedia Security (2005)
[15]
holotyak "blind statistical steganalysis of additive steganography using wavelet higher order statistics" Proc 9th IFIP TC-6 TC-11 Int Conf Communications and Multimedia Security (2005)
[16]
hsu A Practical Guide to Support Vector Classification
[18]
ker "a general framework for structural analysis of lsb replacement" Proc 7th Int Workshop Information Hiding (2005) 10.1007/11558859_22
[20]
ker "a fusion of maximal likelihood and structural steganalysis" Proc 9th Int Workshop Information Hiding (2007) 10.1007/978-3-540-77370-2_14
[21]
ker "revisiting weighted stego-image steganalysis" Proc SPIEConf Electronic Imaging Security Steganography Watermarking Multimedia Contents (2008)
[23]
cancelli "a comparative study of <formula formulatype="inline"><tex notation="tex">$\pm {1}$</tex></formula> steganalyzers" Proc IEEE Int Workshop Multimedia Signal Processing (2008)
[25]
bas BOWS-2 (2007)
[26]
farid "detecting hidden messages using higher-order statistics and support vector machines" Proc 5th Int Workshop Information Hiding (2002)
[27]
pevn "merging markov and dct features for multi-class jpeg steganalysis" Proc SPIE Electronic Imaging Security Steganography and Watermarking of Multimedia Contents IX (2007)
[28]
cancelli "detection of <formula formulatype="inline"><tex notation="tex">$\pm {1}$</tex></formula> steganography based on the amplitude of histogram local extrema" Proc IEEE Int Conf Image Processing (ICIP) (2008)
[29]
fridrich "digital image steganography using stochastic modulation" Proc SPIE Electron Imaging Security Watermarking Multimedia Contents (2003) 10.1117/12.479739
[30]
fridrich "feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes" Proc 6th Int Workshop Information Hiding (2004) 10.1007/978-3-540-30114-1_6
[31]
JP Hide & Seek
[33]
[34]
ker "feature reduction and payload location with wam steganalysis" Proc SPIE Electronic Imaging Media Forensics and Security XI (2009)
[35]
kodovsk "influence of embedding strategies on security of steganographic methods in the jpeg domain" Proc SPIEConf Electronic Imaging Security Steganography Watermarking Multimedia Contents (2008)
[37]
kodovsk "statistically undetectable jpeg steganography: dead ends, challenges, and opportunities" Proc ACM Workshop on Multimedia Security (2007)
Cited By
794
Results in Engineering
Journal of Information Security and...
GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis

Tabares-Soto Reinel, Arteaga-Arteaga Harold Brayan · 2021

IEEE Access
IEEE Access
IEEE Access
IEEE Transactions on Information Fo...
IEEE Transactions on Information Fo...
An Overview on Image Forensics

Alessandro Piva · 2013

ISRN Signal Processing
Metrics
794
Citations
41
References
Details
Published
Jun 01, 2010
Vol/Issue
5(2)
Pages
215-224
License
View
Cite This Article
Tomáš Pevny, Patrick Bas, Jessica Fridrich (2010). Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics and Security, 5(2), 215-224. https://doi.org/10.1109/tifs.2010.2045842
Related

You May Also Like