TY - CHAP AU - Provos, N. PY - 2001 DA - 2001// TI - Defending against statistical steganalysis BT - Proc of 10th USENIX Security Symposium PB - Washington CY - DC ID - Provos2001 ER - TY - CHAP AU - Eggers, J. AU - Bauml, R. AU - Girod, B. PY - 2002 DA - 2002// TI - A communications approach to steganography BT - Proc of EI SPIE PB - San Jose CY - CA ID - Eggers2002 ER - TY - CHAP AU - Noda, H. AU - Niimi, M. AU - Kawaguchi, E. PY - 2005 DA - 2005// TI - Application of QIM with dead zone for histogram preserving JPEG steganography BT - Proc of ICIP PB - Geneva CY - Italy ID - Noda2005 ER - TY - JOUR AU - Solanki, K. AU - Sakar, A. AU - Manjunath, B. S. PY - 2007 DA - 2007// TI - YASS: Yet another steganographic scheme that resists blind steganalysis JO - Lect Notes Comput Sci VL - 2939 ID - Solanki2007 ER - TY - JOUR AU - Westfeld, A. PY - 2001 DA - 2001// TI - High capacity despite better steganalysis (F5--a steganographic algorithm) JO - Lect Notes Comput Sci VL - 2137 UR - https://doi.org/10.1007/3-540-45496-9_21 DO - 10.1007/3-540-45496-9_21 ID - Westfeld2001 ER - TY - CHAP AU - Fridrich, J. PY - 2006 DA - 2006// TI - Minimizing the embedding impact in steganography BT - Proc of ACM Multimedia and Security Workshop PB - Geneva CY - Switzerland ID - Fridrich2006 ER - TY - JOUR AU - Fridrich, J. PY - 2005 DA - 2005// TI - Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes JO - Lect Notes Comput Sci VL - 3200 UR - https://doi.org/10.1007/978-3-540-30114-1_6 DO - 10.1007/978-3-540-30114-1_6 ID - Fridrich2005 ER - TY - CHAP AU - Fridrich, J. AU - Filler, T. PY - 2007 DA - 2007// TI - Practical methods for minimizing embedding impact in steganography BT - Proc EI SPIE PB - San Jose CY - CA ID - Fridrich2007 ER - TY - CHAP AU - Fridrich, J. AU - Goljan, M. AU - Soukal, D. PY - 2004 DA - 2004// TI - Perturbed quantization steganography using wet paper codes BT - Proc of ACM Workshop on Multimedia and Security PB - Magdeburg CY - Germany ID - Fridrich2004 ER - TY - JOUR AU - Fridrich, J. AU - Goljan, M. AU - Soukal, D. PY - 2005 DA - 2005// TI - Perturbed quantization steganography JO - ACM Multimedia Secur J VL - 11 UR - https://doi.org/10.1007/s00530-005-0194-3 DO - 10.1007/s00530-005-0194-3 ID - Fridrich2005 ER - TY - CHAP AU - Fridrich, J. AU - Pevny, T. AU - Kodovsky, J. PY - 2007 DA - 2007// TI - Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities BT - Proc of ACM Workshop on Multimedia and Security PB - Dallas CY - TX ID - Fridrich2007 ER - TY - JOUR AU - Fridrich, J. AU - Goljan, M. AU - Soukal, D. PY - 2005 DA - 2005// TI - Perturbed quantization steganography JO - ACM Multimedia Secur J VL - 11 UR - https://doi.org/10.1007/s00530-005-0194-3 DO - 10.1007/s00530-005-0194-3 ID - Fridrich2005 ER - TY - JOUR AU - Fridrich, J. AU - Goljan, M. AU - Soukal, D. PY - 2005 DA - 2005// TI - Wet paper coding with improved embedding efficiency JO - IEEE Trans Inf Secur Forensics VL - 1 UR - https://doi.org/10.1109/TIFS.2005.863487 DO - 10.1109/TIFS.2005.863487 ID - Fridrich2005 ER - TY - JOUR AU - Kim, Y. H. AU - Duric, Z. AU - Richards, D. PY - 2006 DA - 2006// TI - Modified matrix encoding technique for minimal distortion steganography JO - Lect Notes Comput Sci VL - 4437 UR - https://doi.org/10.1007/978-3-540-74124-4_21 DO - 10.1007/978-3-540-74124-4_21 ID - Kim2006 ER - TY - JOUR AU - Schönfeld, D. AU - Winkler, A. PY - 2008 DA - 2008// TI - Reducing the complexity of syndrome coding for embedding JO - Lect Notes Comput Sci VL - 4567 UR - https://doi.org/10.1007/978-3-540-77370-2_10 DO - 10.1007/978-3-540-77370-2_10 ID - Schönfeld2008 ER - TY - JOUR AU - Zhang, R. AU - Sachnev, V. AU - Kim, H. J. PY - 2009 DA - 2009// TI - Fast BCH syndrome coding for steganography JO - Lect Notes Comput Sci VL - 5806 UR - https://doi.org/10.1007/978-3-642-04431-1_4 DO - 10.1007/978-3-642-04431-1_4 ID - Zhang2009 ER - TY - CHAP AU - Sachnev, V. AU - Kim, H. J. AU - Zhang, R. PY - 2009 DA - 2009// TI - Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding BT - Proc of ACM Workshop on Multimedia and Security PB - Princeton CY - NJ UR - https://doi.org/10.1145/1597817.1597841 DO - 10.1145/1597817.1597841 ID - Sachnev2009 ER - TY - CHAP AU - Filler, T. AU - Fridrich, J. PY - 2010 DA - 2010// TI - Steganography using Gibbs random fields BT - Proceedings of ACM Multimedia and Security Workshop PB - Rome CY - Italy UR - https://doi.org/10.1145/1854229.1854266 DO - 10.1145/1854229.1854266 ID - Filler2010 ER - TY - STD TI - Upham D[http://www.funet.fi/pub/crypt/stegangraphy/jpeg-jsteg-v4.diff.gz] UR - http://www.funet.fi/pub/crypt/stegangraphy/jpeg-jsteg-v4.diff.gz ID - ref19 ER - TY - CHAP AU - Pevny, T. AU - Fridrich, J. PY - 2007 DA - 2007// TI - Merging Markov and DCT features for multi-class JPEG steganalysis BT - Proc of SPIE PB - San Jose CY - CA ID - Pevny2007 ER - TY - JOUR AU - Shi, Y. Q. AU - Chen, C. AU - Chen, W. PY - 2006 DA - 2006// TI - Markov process based approach to effective attacking JPEG steganography JO - Lect Notes Comput Sci VL - 4437 UR - https://doi.org/10.1007/978-3-540-74124-4_17 DO - 10.1007/978-3-540-74124-4_17 ID - Shi2006 ER - TY - JOUR AU - Filler, T. AU - Judas, J. AU - Fridrich, J. PY - 2011 DA - 2011// TI - Minimizing embedding impact in steganography using trellis-coded quantization JO - IEEE Trans Inf Secur Forensics VL - 6 UR - https://doi.org/10.1109/TIFS.2011.2134094 DO - 10.1109/TIFS.2011.2134094 ID - Filler2011 ER - TY - JOUR AU - Rifa-Pous, H. AU - Rifa, J. PY - 2009 DA - 2009// TI - Product perfect codes and steganography JO - Digital Signal Process VL - 19 UR - https://doi.org/10.1016/j.dsp.2008.11.005 DO - 10.1016/j.dsp.2008.11.005 ID - Rifa-Pous2009 ER - TY - JOUR AU - Zhao, Z. AU - Wu, F. AU - Yu, S. AU - Zhou, J. PY - 2005 DA - 2005// TI - A lookup table based fast algorithm for finding roots of quadratic or cubic polynomials in the GF(2m) JO - J Huazhong Univ Sci Technol (Nat Sci Ed.) VL - 33 ID - Zhao2005 ER - TY - CHAP AU - Kodovsky, J. AU - Fridrich, J. ED - Dittmann, J. ED - Craver, S. ED - Fridrich, J. PY - 2009 DA - 2009// TI - Calibration revisited BT - Proceedings of the 11th ACM Multimedia & Security Workshop PB - Princeton CY - NJ ID - Kodovsky2009 ER -