TY - BOOK AU - Böhme, R. PY - 2010 DA - 2010// TI - Advanced Statistical Steganalysis PB - Springer-Verlag CY - Berlin UR - https://doi.org/10.1007/978-3-642-14313-7 DO - 10.1007/978-3-642-14313-7 ID - Böhme2010 ER - TY - JOUR AU - Shannon, C. E. PY - 1959 DA - 1959// TI - Coding theorems for a discrete source with a fidelity criterion JO - IRE Nat. Conv. Rec VL - 4 ID - Shannon1959 ER - TY - JOUR AU - Filler, T. AU - Judas, J. AU - Fridrich, J. PY - 2011 DA - 2011// TI - Minimizing additive distortion in steganography using syndrome-trellis codes JO - IEEE Trans. Inf. Forensics Secur VL - 6 UR - https://doi.org/10.1109/TIFS.2011.2134094 DO - 10.1109/TIFS.2011.2134094 ID - Filler2011 ER - TY - JOUR AU - Filler, T. AU - Fridrich, J. PY - 2010 DA - 2010// TI - Gibbs construction in steganography JO - IEEE Trans. Inf. Forensics Secur VL - 5 UR - https://doi.org/10.1109/TIFS.2010.2077629 DO - 10.1109/TIFS.2010.2077629 ID - Filler2010 ER - TY - CHAP AU - Filler, T. AU - Fridrich, J. ED - Alattar, A. ED - Memon, N. D. ED - Delp, E. J. ED - Dittmann, J. PY - 2011 DA - 2011// TI - Design of adaptive steganographic schemes for digital images BT - Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics III, vol. 7880 ID - Filler2011 ER - TY - CHAP AU - Böhme, R. AU - Westfeld, A. PY - 2004 DA - 2004// TI - Breaking Cauchy model-based JPEG steganography with first order statistics BT - Computer Security - ESORICS 2004. Proceedings 9th European Symposium on Research in Computer Security, ed. by P Samarati, PYA Ryan, D Gollmann, R Molvapages, Sophia Antipolis, France. Lecture Notes in Computer Science PB - Springer CY - Berlin ID - Böhme2004 ER - TY - CHAP AU - Kodovský, J. AU - Fridrich, J. AU - Holub, V. ED - Dittmann, J. ED - Craver, S. ED - Heitzenrater, C. PY - 2011 DA - 2011// TI - On dangers of overtraining steganography to incomplete cover model BT - Proceedings of the 13th ACM Multimedia & Security Workshop ID - Kodovský2011 ER - TY - CHAP AU - Kim, Y. AU - Duric, Z. AU - Richards, D. PY - 2006 DA - 2006// TI - Modified matrix encoding technique for minimal distortion steganography BT - 8th International Workshop on Information Hiding, ed. by JL Camenisch, CS Collberg, NF Johnson, P Sallee, Alexandria, 10–12 July 2006. Lecture Notes in Computer Science PB - Springer-Verlag CY - New York ID - Kim2006 ER - TY - CHAP AU - Sachnev, V. AU - Kim, H. J. AU - Zhang, R. ED - Dittmann, J. ED - Craver, S. ED - Fridrich, J. PY - 2009 DA - 2009// TI - Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding BT - Proceedings of the 11th ACM Multimedia & Security Workshop UR - https://doi.org/10.1145/1597817.1597841 DO - 10.1145/1597817.1597841 ID - Sachnev2009 ER - TY - CHAP AU - Wang, C. AU - Ni, J. PY - 2012 DA - 2012// TI - An efficient JPEG steganographic scheme based on the block–entropy of DCT coefficients BT - Proceedings of IEEE ICASSP ID - Wang2012 ER - TY - JOUR AU - Huang, F. AU - Huang, J. AU - Shi, Y. -. Q. PY - 2012 DA - 2012// TI - New channel selection rule for JPEG steganography JO - IEEE Trans. Inf. Forensics Secur VL - 7 UR - https://doi.org/10.1109/TIFS.2012.2198213 DO - 10.1109/TIFS.2012.2198213 ID - Huang2012 ER - TY - CHAP AU - Huang, F. AU - Luo, W. AU - Huang, J. AU - Shi, Y. -. Q. PY - 2013 DA - 2013// TI - Distortion function designing for JPEG steganography with uncompressed side-image BT - 1st ACM Information Hiding and Multimedia Security Workshop ID - Huang2013 ER - TY - CHAP AU - Guo, L. AU - Ni, J. AU - Shi, Y. -. Q. PY - 2012 DA - 2012// TI - An efficient JPEG steganographic scheme using uniform embedding BT - Fourth IEEE International Workshop on Information Forensics and Security ID - Guo2012 ER - TY - CHAP AU - Fridrich, J. AU - Pevný, T. AU - Kodovský, J. ED - Dittmann, J. ED - Fridrich, J. PY - 2007 DA - 2007// TI - Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities BT - Proceedings of the 9th ACM Multimedia & Security Workshop ID - Fridrich2007 ER - TY - CHAP AU - Pevný, T. AU - Filler, T. AU - Bas, P. PY - 2010 DA - 2010// TI - Using high-dimensional image models to perform highly undetectable steganography BT - Information Hiding, ed. by R Böhme, R Safavi-Naini. 12th International Conference, IH 2010, Calgary, 28–30 June 2010. Lecture Notes in Computer Science PB - Springer CY - Heidelberg ID - Pevný2010 ER - TY - JOUR AU - Pevný, T. AU - Bas, P. AU - Fridrich, J. PY - 2010 DA - 2010// TI - Steganalysis by subtractive pixel adjacency matrix JO - IEEE Trans. Inf. Forensics Secur VL - 5 UR - https://doi.org/10.1109/TIFS.2010.2045842 DO - 10.1109/TIFS.2010.2045842 ID - Pevný2010 ER - TY - CHAP AU - Holub, V. AU - Fridrich, J. PY - 2012 DA - 2012// TI - Designing steganographic distortion using directional filters BT - Fourth IEEE International Workshop on Information Forensics and Security ID - Holub2012 ER - TY - JOUR AU - Fridrich, J. AU - Kodovský, J. PY - 2011 DA - 2011// TI - Rich models for steganalysis of digital images JO - IEEE Trans. Inf. Forensics Secur VL - 7 UR - https://doi.org/10.1109/TIFS.2012.2190402 DO - 10.1109/TIFS.2012.2190402 ID - Fridrich2011 ER - TY - CHAP AU - Holub, V. AU - Fridrich, J. PY - 2013 DA - 2013// TI - Digital image steganography using universal distortion BT - 1st ACM Information Hiding and Multimedia Security Workshop ID - Holub2013 ER - TY - CHAP AU - Fridrich, J. AU - Kodovský, J. AU - Goljan, M. AU - Holub, V. PY - 2011 DA - 2011// TI - Steganalysis of content-adaptive steganography in spatial domain BT - Information Hiding, 13th International Conference, Lecture Notes in Computer Science, ed. by T Filler, T Pevný, A Ker, S Craver ID - Fridrich2011 ER - TY - CHAP AU - Gül, G. AU - Kurugollu, F. PY - 2011 DA - 2011// BT - A new methodology in steganalysis: breaking highly undetactable steganograpy (HUGO), Information Hiding, ed. by T Filler, T Pevný, A Ker, S Craver, 13th International Conference, IH 2011, Prague, 18–20 May 2011. Lecture Notes in Computer Science PB - Springer CY - Heidelberg ID - Gül2011 ER - TY - CHAP AU - Shi, Y. -. Q. AU - Sutthiwan, P. AU - Chen, L. PY - 2012 DA - 2012// TI - Textural features for steganalysis BT - Information Hiding, ed. by M Kirchner, D Ghosal. 14th International Conference, IH 2012, Berkeley, 15–18 May 2012. Lecture Notes in Computer Science PB - Springer CY - Heidelberg ID - Shi2012 ER - TY - BOOK AU - Vetterli, M. AU - Kovacevic, J. PY - 1995 DA - 1995// TI - Wavelets and Subband Coding PB - Prentice Hall CY - Englewood Cliffs ID - Vetterli1995 ER - TY - CHAP AU - Kodovský, J. AU - Fridrich, J. ED - Alattar, A. ED - Memon, N. D. ED - Delp, E. J. PY - 2012 DA - 2012// TI - Steganalysis of JPEG images using rich models BT - Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012 ID - Kodovský2012 ER - TY - STD TI - Filler T, Pevný T, Bas P: BOSS (Break Our Steganography System). , accessed date 20/12/13 http://www.agents.cz/boss UR - http://www.agents.cz/boss ID - ref25 ER - TY - JOUR AU - Kodovský, J. AU - Fridrich, J. AU - Holub, V. PY - 2012 DA - 2012// TI - Ensemble classifiers for steganalysis of digital media JO - IEEE Trans. Inf. Forensics Secur VL - 7 UR - https://doi.org/10.1109/TIFS.2011.2175919 DO - 10.1109/TIFS.2011.2175919 ID - Kodovský2012 ER - TY - CHAP AU - Denemark, T. AU - Fridrich, J. AU - Holub, V. ED - Alattar, A. ED - Memon, N. D. ED - Heitzenrater, C. D. PY - 2014 DA - 2014// BT - Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014 ID - Denemark2014 ER - TY - JOUR AU - Luo, W. AU - Huang, F. AU - Huang, J. PY - 2010 DA - 2010// TI - Edge adaptive image steganography based on LSB matching revisited JO - IEEE Trans. Inf. Forensics Secur VL - 5 UR - https://doi.org/10.1109/TIFS.2010.2041812 DO - 10.1109/TIFS.2010.2041812 ID - Luo2010 ER - TY - CHAP AU - Fridrich, J. AU - Goljan, M. AU - Soukal, D. AU - Lisoněk, P. ED - Delp, E. J. ED - Wong, P. W. PY - 2005 DA - 2005// TI - Writing on wet paper BT - Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII UR - https://doi.org/10.1117/12.583160 DO - 10.1117/12.583160 ID - Fridrich2005 ER - TY - CHAP AU - Ker, A. D. PY - 2007 DA - 2007// TI - A fusion of maximal likelihood and structural steganalysis BT - Information Hiding, ed. by T Furon, F Cayre, G Doërr, P Bas. 9th International Workshop, IH 2007, Saint Malo, 11–13 PB - Springer-Verlag CY - Berlin ID - Ker2007 ER - TY - CHAP AU - Fridrich, J. AU - Du, R. PY - 1999 DA - 1999// TI - Secure steganographic methods for palette images BT - Information Hiding, ed. by A Pfitzmann, 3rd International Workshop, IH 1999, Dresden, 29 September–1 October 1999. Lecture Notes in Computer Science PB - Springer-Verlag CY - New York ID - Fridrich1999 ER - TY - BOOK AU - Winkler, G. PY - 2003 DA - 2003// TI - Image Analysis, Random Fields and Markov Chain Monte Carlo Methods: A Mathematical Introduction (Stochastic Modelling and Applied Probability) PB - Springer CY - Berlin UR - https://doi.org/10.1007/978-3-642-55760-6 DO - 10.1007/978-3-642-55760-6 ID - Winkler2003 ER - TY - CHAP AU - Pevný, T. ED - Alattar, A. ED - Memon, N. D. ED - Delp, E. J. ED - Dittmann, J. PY - 2011 DA - 2011// TI - Detecting messages of unknown length BT - Proceedings SPIE, Electronic Imaging, Media Watermarking, Security and Forensics III ID - Pevný2011 ER -