From post

New methodology for breaking steganographic techniques for JPEGs.

, , и . Security and Watermarking of Multimedia Contents, том 5020 из SPIE Proceedings, стр. 143-155. SPIE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Asymptotic behavior of the ZZW embedding construction.. IEEE Trans. Inf. Forensics Secur., 4 (1): 151-154 (2009)Camera identification from cropped and scaled images., и . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, том 6819 из SPIE Proceedings, стр. 68190E. SPIE, (2008)Practical steganalysis of digital images: state of the art., и . Security and Watermarking of Multimedia Contents, том 4675 из SPIE Proceedings, стр. 1-13. SPIE, (2002)New methodology for breaking steganographic techniques for JPEGs., , и . Security and Watermarking of Multimedia Contents, том 5020 из SPIE Proceedings, стр. 143-155. SPIE, (2003)Security of fragile authentication watermarks with localization.. Security and Watermarking of Multimedia Contents, том 4675 из SPIE Proceedings, стр. 691-700. SPIE, (2002)Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain., , и . Security, Steganography, and Watermarking of Multimedia Contents, том 5681 из Proceedings of SPIE, стр. 595-606. SPIE, (2005)The square root law of steganographic capacity for Markov covers., , и . Media Forensics and Security, том 7254 из SPIE Proceedings, стр. 725408. SPIE, (2009)Boosting Steganalysis with Explicit Feature Maps., и . IH&MMSec, стр. 149-157. ACM, (2016)Improving Steganographic Security by Synchronizing the Selection Channel., и . IH&MMSec, стр. 5-14. ACM, (2015)Introduction to the ACM multimedia and security workshop., и . MM&Sec, стр. 1-3. ACM, (2004)