Цитирование: | 1. Bas, P., Filler, T., Pevńy, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Filler, T., Pevńy, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59-70. Springer, Heidelberg (2011)
2. Biryukov, A., Nakahara, J., Preneel, B., Vandewalle, J.: New weak-key classes of IDEA. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 315-326. Springer, Heidelberg (2002)
3. Duda, R., Hart, P., Stork, D.: Pattern classification, 2nd edn. Wiley, New York (2001)
4. Fridrich, J.: Rich models for steganalysis of dugital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868-882 (2012)
5. Fridrich, J., Kodovsky, J., Holub, V., Goljan, M.: Steganalysis of content-adaptive steganography in spatial domain. In: Filler, T., Pevńy, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 102-117. Springer, Heidelberg (2011)
6. Fridrich, J., Kodovsky, J., Holub, V., Goljan, M.: Steganalysis of content-adaptive steganography in spatial domain. In: Filler, T., Pevńy, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 102-117. Springer, Heidelberg (2011)
7. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: Proceedings 4th IEEE International Workshop on Information Forensics and Security, pp. 234-239. IEEE (2012)
8. Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings 1th ACM Workshop Information Hiding and Multimedia Security, pp. 59-68 (2013)
9. Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996-2006 (2013)
10. Kara, O., Manap, C.: A new class of weak keys for blowfish. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 167-180. Springer, Heidelberg (2007)
11. Ker, A., et al.: Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings 1st ACM Workshop on Information Hiding and Multimedia Security, pp. 45-58. ACM (2013)
12. Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 434-444 (2011)
13. Monarev, V., Pestunov, A.: A known-key scenario for steganalysis and a highly accurate detector within it. In: Proceedings IEEE 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 175-178. IEEE (2014)
14. Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215-224 (2010)
15. Pevny, T.: Detecting messages of unknown length. In: Proceedings 8th Media Watermarking, Security and Forensics, pp. 1-12 (2011)
16. Pevńy, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Bohme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161-177. Springer, Heidelberg (2010)
17. Feature Extractors for Steganalysis. http://dde.binghamton.edu/download/feature extractors/
18. Break our watermarking system 2nd ed. http://bows2.ec-lille.fr/
19. Break our steganographic system. http://www.agents.cz/boss/
20. NRCS photo gallery. http://photogallery.nrcs.usda.gov/
|