ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Statistically undetectable jpeg steganography
Proceedings of the 9th workshop on Multimedia & security - MM&Sec '07
◽
10.1145/1288869.1288872
◽
2007
◽
Cited By ~ 162
Author(s):
Jessica Fridrich
◽
Tomáš Pevný
◽
Jan Kodovský
Keyword(s):
Jpeg Steganography
Download Full-text
Related Documents
Cited By
References
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security - MM&Sec '09
◽
10.1145/1597817.1597841
◽
2009
◽
Cited By ~ 38
Author(s):
Vasiliy Sachnev
◽
Hyoung Joong Kim
◽
Rongyue Zhang
Keyword(s):
Heuristic Optimization
◽
Jpeg Steganography
Download Full-text
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '15
◽
10.1145/2756601.2756608
◽
2015
◽
Cited By ~ 108
Author(s):
Xiaofeng Song
◽
Fenlin Liu
◽
Chunfang Yang
◽
Xiangyang Luo
◽
Yi Zhang
Keyword(s):
Gabor Filters
◽
Jpeg Steganography
Download Full-text
Challenging the doctrines of JPEG steganography
10.1117/12.2035178
◽
2014
◽
Cited By ~ 2
Author(s):
Vojtech Holub
◽
Jessica Fridrich
Keyword(s):
Jpeg Steganography
Download Full-text
Improving the Robustness of JPEG Steganography with Robustness Cost
IEEE Signal Processing Letters
◽
10.1109/lsp.2021.3129419
◽
2021
◽
pp. 1-1
Author(s):
Jimin Zhang
◽
Xianfeng Zhao
◽
Xiaolei He
◽
Hong Zhang
Keyword(s):
Jpeg Steganography
Download Full-text
Designing adaptive JPEG steganography based on the statistical properties in spatial domain
Multimedia Tools and Applications
◽
10.1007/s11042-018-6747-1
◽
2018
◽
Vol 78
(7)
◽
pp. 8655-8665
Author(s):
Ge Liu
◽
Fangjun Huang
◽
Zhonghua Li
Keyword(s):
Spatial Domain
◽
Statistical Properties
◽
Jpeg Steganography
Download Full-text
A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy
IEEE Transactions on Circuits and Systems for Video Technology
◽
10.1109/tcsvt.2018.2865537
◽
2018
◽
Vol 28
(12)
◽
pp. 3545-3549
◽
Cited By ~ 9
Author(s):
Wenkang Su
◽
Jiangqun Ni
◽
Xiaohan Li
◽
Yun-Qing Shi
Keyword(s):
Distortion Function
◽
Uniform Embedding
◽
Function Design
◽
Jpeg Steganography
◽
Embedding Strategy
Download Full-text
A Markov Process Based Approach to Effective Attacking JPEG Steganography
Information Hiding - Lecture Notes in Computer Science
◽
10.1007/978-3-540-74124-4_17
◽
2007
◽
pp. 249-264
◽
Cited By ~ 124
Author(s):
Yun Q. Shi
◽
Chunhua Chen
◽
Wen Chen
Keyword(s):
Markov Process
◽
Jpeg Steganography
Download Full-text
JPEG Steganography and Steganalysis – A Review
Advances in Intelligent Systems and Computing - Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014
◽
10.1007/978-3-319-12012-6_20
◽
2015
◽
pp. 175-187
◽
Cited By ~ 1
Author(s):
Siddhartha Banerjee
◽
Bibek Ranjan Ghosh
◽
Pratik Roy
Keyword(s):
Jpeg Steganography
Download Full-text
Secure Robust JPEG Steganography based on AutoEncoder with Adaptive BCH Encoding
IEEE Transactions on Circuits and Systems for Video Technology
◽
10.1109/tcsvt.2020.3027843
◽
2020
◽
pp. 1-1
Author(s):
Wei Lu
◽
Junhong Zhang
◽
Xianfeng Zhao
◽
Weiming Zhang
◽
Jiwu Huang
Keyword(s):
Jpeg Steganography
Download Full-text
JPEG steganography with particle swarm optimization accelerated by AVX
Concurrency and Computation Practice and Experience
◽
10.1002/cpe.5448
◽
2019
◽
Vol 32
(8)
◽
Cited By ~ 2
Author(s):
Vaclav Snasel
◽
Pavel Kromer
◽
Jakub Safarik
◽
Jan Platos
Keyword(s):
Particle Swarm Optimization
◽
Particle Swarm
◽
Swarm Optimization
◽
Jpeg Steganography
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close