Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Estaganalisis")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 54

  • Page / 3
Export

Selection :

  • and

Isotropy-Based Steganalysis in Multiple Least Significant BitsXIAOYI YU; BABAGUCHI, Noboru; YUNHONG WANG et al.Proceedings of SPIE, the International Society for Optical Engineering. 2008, pp 681913.1-681913.10, issn 0277-786X, isbn 978-0-8194-6991-5Conference Paper

Model-based steganalysis using invariant featuresQUACH, Tu-Thach; PEREZ-GONZALEZ, Fernando; HEILEMAN, Gregory L et al.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7254, issn 0277-786X, isbn 978-0-8194-7504-6 0-8194-7504-1, 1Vol, 72540B.1-72540B.8Conference Paper

Nonparametric Steganalysis of QIM Data Hiding using Approximate EntropyMALIK, Hafiz; SUBBALAKSHMI, K. P; CHANDRAMOULI, R et al.Proceedings of SPIE, the International Society for Optical Engineering. 2008, pp 681914.1-681914.12, issn 0277-786X, isbn 978-0-8194-6991-5Conference Paper

A novel joint secret image sharing and robust steganography method using waveletMOHAMMAD JAVAD KHOSRAVI; NAGHSH-NILCHI, Ahmad Reza.Multimedia systems. 2014, Vol 20, Num 2, pp 215-226, issn 0942-4962, 12 p.Article

Steganalysis of a PVD-based content adaptive image steganographyXIAOLONG LI; BIN LI; XIANGYANG LUO et al.Signal processing. 2013, Vol 93, Num 9, pp 2529-2538, issn 0165-1684, 10 p.Article

Steganalysis for palette-based images using generalized difference image and color correlogramHONG ZHAO; HONGXIA WANG; MUHAMMAD KHURRAM KHAN et al.Signal processing. 2011, Vol 91, Num 11, pp 2595-2605, issn 0165-1684, 11 p.Article

Steganalysis of halftone image using inverse halftoningJUN CHENG; KOT, Alex C.Signal processing. 2009, Vol 89, Num 6, pp 1000-1010, issn 0165-1684, 11 p.Article

High-performance JPEG steganography using complementary embedding strategyLIU, Chiang-Lung; LIAO, Shiang-Rong.Pattern recognition. 2008, Vol 41, Num 9, pp 2945-2955, issn 0031-3203, 11 p.Article

STEGANALYSIS AWARE STEGANOGRAPHY : STATISTICAL INDISTINGUISHABILITY DESPITE HIGH DISTORTIONORSDEMIR, Adem; ALTUN, H. Oktay; SHARMA, Gaurav et al.Proceedings of SPIE, the International Society for Optical Engineering. 2008, pp 681915.1-681915.9, issn 0277-786X, isbn 978-0-8194-6991-5Conference Paper

New blind steganalysis and its implicationsGOLIAN, Miroslav; FRIDRICH, Jessica; HOLOTYAK, Taras et al.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 607201.1-607201.13, issn 0277-786X, isbn 0-8194-6112-1, 1VolConference Paper

Secure steganography designed for mobile platformsAGAIAN, Sos S; CHEMKURI, Ravindranath; SIFUENTES, Ronnie R et al.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 62500E.1-62500E.10, issn 0277-786X, isbn 0-8194-6306-X, 1VolConference Paper

Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector ValueKEREN WANG; HONG ZHAO; HONGXIA WANG et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 741-751, issn 1556-6013, 11 p.Article

Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video streamSONGBIN LI; HAOJIANG DENG; HUI TIAN et al.Annales des télécommunications. 2014, Vol 69, Num 7-8, pp 461-473, issn 0003-4347, 13 p.Article

Closure of sets: a statistically hypersensitive system for steganalysis of least significant bit embeddingKHOSRAVIRAD, S. R; EGHLIDOS, T; GHAEMMAGHAMI, S et al.IET signal processing (Print). 2011, Vol 5, Num 4, pp 379-389, issn 1751-9675, 11 p.Article

Detection for Steganography Based on Hilbert Huang TransformWU SUYAN; LI WENBO; SHI YANQIN et al.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 8205, issn 0277-786X, isbn 978-0-8194-8847-3, 820519.1-820519.6Conference Paper

Reliable JPEG steganalysis based on multi-directional correlationsYONG WANG; JIUFEN LIU; WEIMING ZHANG et al.Signal processing. Image communication. 2010, Vol 25, Num 8, pp 577-587, issn 0923-5965, 11 p.Article

Une méthodologie pour la Sélection de Variables pour la Stéganalyse = A Feature Selection Methodology for SteganalysisMICHE, Yoan; BAS, Patrick; LENDASSE, Amaury et al.TS. Traitement du signal. 2009, Vol 26, Num 1, pp 13-30, issn 0765-0019, 18 p.Conference Paper

Video steganalysis based on aliasing detectionZHANG, C; ZHANG, C et al.SU, Y; ZHANG, C; ZHANG, C et al.Electronics Letters. 2008, Vol 44, Num 13, pp 801-803, issn 0013-5194, 3 p.Article

Steganographic Capacity Estimation for the Statistical Restoration FrameworkSARKAR, Anindya; SULLIVAN, Kenneth; MANJUNATH, B. S et al.Proceedings of SPIE, the International Society for Optical Engineering. 2008, pp 681916.1-681916.11, issn 0277-786X, isbn 978-0-8194-6991-5Conference Paper

Blind Source Separation for Steganalytic Secret Message EstimationAMBALAVANAN, Aruna; CHANDRAMOULI, R.Proceedings of SPIE, the International Society for Optical Engineering. 2007, pp 650507.1-650507.6, issn 0277-786X, isbn 978-0-8194-6618-1Conference Paper

Optimally Weighted Least-Squares SteganalysisKER, Andrew D.Proceedings of SPIE, the International Society for Optical Engineering. 2007, pp 650506.1-650506.16, issn 0277-786X, isbn 978-0-8194-6618-1Conference Paper

Attacks on lexical natural language steganography systemsTASKIRAN, Cuneyt M; TOPKARA, Umut; TOPKARA, Mercan et al.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 607209.1-607209.9, issn 0277-786X, isbn 0-8194-6112-1, 1VolConference Paper

A One-Time Stegosystem and Applications to Efficient Covert CommunicationKIAYIAS, Aggelos; RAEKOW, Yona; RUSSELL, Alexander et al.Journal of cryptology. 2014, Vol 27, Num 1, pp 23-44, issn 0933-2790, 22 p.Article

Uniform Embedding for Efficient JPEG SteganographyLINJIE GUO; JIANGQUN NI; YUN QING SHI et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 814-825, issn 1556-6013, 12 p.Article

High payload image steganography with reduced distortion using octonary pixel pairing schemeBALASUBRAMANIAN, C; SELVAKUMAR, S; GEETHA, S et al.Multimedia tools and applications. 2014, Vol 73, Num 3, pp 2223-2245, issn 1380-7501, 23 p.Article

  • Page / 3