[1] Fingerprints for car parts. The Economist, December 8, 2005.
[2] G. F., Amelio, M. F., Tompsett, and G. E., Smith. Experimentalverification of the charge coupled device concept. Bell Systems Technical Journal, 49:593–600, 1970.
[3] R., Anderson. Stretching the limits of steganography. In R. J., Anderson, editor, Information Hiding, 1st International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 39–48, Cambridge, May 30-June 1, 1996. Springer-Verlag, Berlin.
[4] R. J., Anderson, R., Needham, and A., Shamir. The steganographic file system. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 73–82, Portland, OR, April 14-17, 1998. Springer-Verlag, Berlin.
[5] R. J., Anderson and F. A. P., Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communication, 16(4):474–481, 1998.
[6] N., Aoki. A band extension technique for G.711 speech using steganography. IEICE Transactions on Communications, E89-B(6):1896–1898, 2006.
[7] N., Aoki. Potential of value-added speech communications by using steganography. In B.-Y., Liao, editor, Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, volume 2, pages 251–254, Kaohsiung, Taiwan, November 26-28, 2007.
[8] A., Aspect, J., Dalibard, and G., Roger. Experimental test of Bell's inequalities using time-varying analyzers. Physical Review Letters, 49:1804, 1982.
[9] I., Avcibas. Audio steganalysis with content-independent distortion measures. IEEE Signal Processing Letters, 13:92–95, February 2006.
[10] I., Avcibas, M., Kharrazi, N. D., Memon, and B., Sankur. Image steganalysis with binary similarity measures. EURASIP Journal on Applied Signal Processing, 17:2749–2757, 2005.
[11] I., Avcibas, N. D., Memon, and B., Sankur. Steganalysis using image quality metrics. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III, volume 4314, pages 523–531, San Jose, CA, January 22-25, 2001.
[12] I., Avcibas, N. D., Memon, and B., Sankur. Image steganalysis with binary similarity measures. In Proceedings IEEE, International Conference on Image Processing, ICIP 2002, volume 3, pages 645–648, Rochester, NY, September 22-25, 2002.
[13] F., Bach, D., Heckerman, and E., Horvitz. On the path to an ideal ROC curve: Considering cost asymmetry in learning classifiers. In R. G., Cowell and Z., Ghahramani, editors, Proceedings of the 10th International Workshop on Artificial Intelligence and Statistics (AISTATS), pages 9–16. Society for Artificial Intelligence and Statistics, 2005. Available electronically at http://www.gatsby.ucl.ac.uk/aistats/.
[14] M., Backes and C., Cachin. Public-key steganography with active attacks. In J., Kilian, editor, 2nd Theory of Cryptography Conference, volume 3378 of Lecture Notes in Computer Science, pages 210–226, Cambridge, MA, February 10-12, 2005. Springer-Verlag, Heidelberg.
[15] F., Bacon. Of the Advancement and Proficiencie of Learning or the Partitions of Sciences, volume VI. Leon Lichfield, Oxford, for R., Young and E., Forest, 1640.
[16] M., Barni and F., Bartolini. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, volume 21 of Signal Processing and Communications. Boca Raton, FL: CRC Press, 2004.
[17] R. J., Barron, B., Chen, and G. W., Wornell. The duality between information embedding and source coding with side information and some applications. IEEE Transactions on Information Theory, 49(5):1159–1180, 2003.
[18] R., Bergmair. Towards linguistic steganography: A systematic investigation of approaches, systems, and issues. Final year thesis, April 2004. University of Derby, http://bergmair.cjb.net/pub/towlingsteg-rep-inoff-a4.ps.gz.
[19] J., Bierbrauer. Introduction to Coding Theory. London: Chapman & Hall/CRC, 2004.
[20] J., Bierbrauer and J., Fridrich. Constructing good covering codes for applications in steganography. LNCS Transactions on Data Hiding and Multimedia Security, 4920:1–22, 2008.
[21] R., Böhme. Weighted stego-image steganalysis for JPEG covers. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 178–194, Santa Barbara, CA, June 19-21, 2007. Springer-Verlag, New York.
[22] R., Böhme. Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals. PhD thesis, Faculty of Computer Science, Technische Universität Dresden, 2008.
[23] R., Böhme and A. D., Ker. A two-factor error model for quantitative steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 59–74, San Jose, CA, January 16-19, 2006.
[24] R., Böhme and A., Westfeld. Feature-based encoder classification of compressed audio streams. ACM Multimedia System Journal, 11(2):108–120, 2005.
[25] I. A., Bolshakov. Method of linguistic steganography based on collocationally-verified synonymy. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 180–191, Toronto, May 23-25, 2005. Springer-Verlag, Berlin.
[26] K., Borders and A., Prakash. Web tap: Detecting covert web traffic. In V., Atluri, B., Pfitz-mann, and P. Drew, McDaniel, editors, Proceedings 11th ACM Conference on Computer and Communications Security (CCS), pages 110–120, Washington, DC, October 25-29, 2004.
[27] S., Boyd and L., Vandenberghe. Convex Optimization. Cambridge: Cambridge University Press, 2004.
[28] W. S., Boyle and G. E., Smith. Charge coupled semiconductor devices. Bell Systems Technical Journal, 49:587–593, 1970.
[29] J., Brassil, S., Low, N. F., Maxemchuk, and L., O'Gorman. Hiding information in document images. In Proceedings of the Conference on Information Sciences and Systems, CISS, pages 482–489, Johns Hopkins University, Baltimore, MD, March 22-24, 1995.
[30] R. P., Brent, S., Gao, and A. G. B., Lauder. Random Krylov spaces over finite fields. SIAM Journal of Discrete Mathematics, 16(2):276–287, 2003.
[31] D., Brewster. Microscope, volume XIV. Encyclopaedia Britannica or the Dictionary of Arts, Sciences, and General Literature, Edinburgh, IX – Application of photography to the microscope, 8th edition, 1857.
[32] C. W., Brown and B. J., Shepherd. Graphics File Formats. Greenwich, CT: Manning Publications Co., 1995.
[33] C. J. C., Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2(2):121–167, 1998.
[34] S., Cabuk, C. E., Brodley, and C., Shields. IP covert timing channels: Design and detection. In V., Atluri, B., Pfitzmann, and P. Drew, McDaniel, editors, Proceedings 11th ACM Conference on Computer and Communications Security (CCS), pages 178–187, Washington, DC, October 25-29, 2004.
[35] C., Cachin. An information-theoretic model for steganography. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 306–318, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.
[36] G., Cancelli and M., Barni. MPSteg-color: A new steganographic technique for color images. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 1–15, Saint Malo, June 11-13, 2007. Springer-Verlag, Berlin.
[37] G., Cancelli, G., Doërr, I. J., Cox, and M., Barni. A comparative study of ±1 steganalyzers. In Proceedings IEEE International Workshop on Multimedia Signal Processing, pages 791–796, Cairns, Australia, October 8-10, 2008.
[38] G., Cancelli, G., Doërr, I. J., Cox, and M., Barni. Detection of ± 1 LSB steganography based on the amplitude of histogram local extrema. In Proceedings IEEE, International Conference on Image Processing, ICIP 2008, pages 1288–1291, San Diego, CA, October 12-15, 2008.
[39] R., Chandramouli and N. D., Memon. A distributed detection framework for steganalysis. In J., Dittmann, K., Nahrstedt, and P., Wohlmacher, editors, Proceedings of the 3rd ACM Multimedia & Security Workshop, pages 123–126, Los Angeles, CA, November 4, 2000.
[40] R., Chandramouli and N. D., Memon. Analysis of LSB based image steganography techniques. In Proceedings IEEE International Conference on Image Processing, ICIP 2001, Thessaloniki, October 7-10, 2001. CD ROM version.
[41] M., Chapman, G. I., Davida, and M., Rennhard. A practical and effective approach to large-scale automated linguistic steganography. In Proceedings of the 4th International Conference on Information Security, volume 2200 of Lecture Notes in Computer Science, pages 156–165, Malaga, October 1-3, 2001. Springer-Verlag, Berlin.
[42] B., Chen and G., Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4):1423–1443, 2001.
[43] M., Chen, J., Fridrich, and M., Goljan. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security, 1(1):74–90, March 2008.
[44] H. G., Chew, R. E., Bogner, and C. C., Lim. Dual-V support vector machine with error rate and training size biasing. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, volume 2, pages 1269–1272, Salt Lake City, UT, May 7-11, 2001.
[45] C. T., Clelland, V., Risca, and C., Bancroft. Hiding messages in DNA microdots. Nature, 399:533–534, June 10, 1999.
[46] G. D., Cohen, I., Honkala, S., Litsyn, and A., Lobstein. Covering Codes, volume 54. Amsterdam: Elsevier, North-Holland Mathematical Library, 1997.
[47] E., Cole. Hiding in Plain Sight: Steganography and the Art of Covert Communication. New York: Wiley Publishing Inc., 2003.
[48] S., Coll and S. B., Glasser. Terrorists turn to web as base of operations. Washington Post, page A01, August 7, 2005.
[49] P., Comesana and F., Pérez-Gonzáles. On the capacity of stegosystems. In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3–14, Dallas, TX, September 20-21, 2007.
[50] T. M., Cover and J. A., Thomas. Elements of Information Theory. NewYork: John Wiley & Sons, Inc., 1991.
[51] I. J., Cox, M. L., Miller, J. A., Bloom, J., Fridrich, and T., Kalker. Digital Watermarking and Steganography. Morgan Kaufman Publishers Inc., San Francisco, CA, 2007.
[52] R., Crandall. Some notes on steganography. Steganography Mailing List, available from http://os.inf.tu-dresden.de/~westfeld/crandall.pdf, 1998.
[53] S., Craver. On public-key steganography in the presence of an active warden. In D., Auc-smith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 355–368, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.
[54] N., Cristianini and J., Shawe-Taylor. Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge: Cambridge University Press, 2000.
[55] O., Dabeer, K., Sullivan, U., Madhow, S., Chandrasekaran, and B. S., Manjunath. Detection of hiding in the least significant bit. IEEE Transactions on Signal Processing, 52:3046–3058, 2004.
[56] N., Dedic, G., Itkis, L., Reyzin, and S., Russell. Upper and lower bounds on black-box steganography. In J., Kilian, editor, Theory of Cryptography, volume 3378 of Lecture Notes in Computer Science, pages 227–244, Cambridge, MA, February 10-12, 2005. Springer-Verlag, London.
[57] Y., Desmedt. Subliminal-free authentication and signature. In C. G., Günther, editor, Advances in Cryptology – EUROCRYPT '88, Workshop on the Theory and Application of Cryptographic Techniques, volume 330 of Lecture Notes in Computer Science, pages 22–33, Davos, May 25-27, 1988. Springer-Verlag, Berlin.
[58] J., Dittmann, T., Vogel, and R., Hillert. Design and evaluation of steganography for voice-over-IP. In Proceedings IEEE International Symposium on Circuits and Systems (ISCAS), Kos, May 21-24, 2006.
[59] E. R., Dougherty. Random Processes for Image and Signal Processing, volume Monograph PM44. Washington, DC: SPIE Press, International Society for Optical Engineering, 1998.
[60] I., Dumer. Handbook of Coding Theory: Volume II, chapter 23, Concatenated Codes and Their Multilevel Generalizations, pages 1911–1988. Elsevier Science, Amsterdam, 1998.
[61] S., Dumitrescu and X., Wu. LSB steganalysis based on higher-order statistics. In A. M., Eskicioglu, J., Fridrich, and J., Dittmann, editors, Proceedings of the 7th ACM Multimedia & Security Workshop, pages 25–32, New York, NY, August 1-2, 2005.
[62] S., Dumitrescu, X., Wu, and N.D., Memon. On steg analysis of random LSB embedding in continuous-tone images. In Proceedings IEEE, International Conference on Image Processing, ICIP 2002, pages 324–339, Rochester, NY, September 22-25, 2002.
[63] S., Dumitrescu, X., Wu, and Z., Wang. Detection of LSB steganography via Sample Pairs Analysis. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 355–372, Noord-wijkerhout, October 7-9, 2002. Springer-Verlag, New York.
[64] J., Eggers, R., Bäuml, and B., Girod. A communications approach to steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 26–37, San Jose, CA, January 21-24, 2002.
[65] T., Ernst. Schwarzweisse Magie. Der Schlüssel zum dritten Buch der Steganographia des Trithemius. Daphnis, 25(1), 1996.
[66] J. M., Ettinger. Steganalysis and game equilibria. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 319–328, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.
[67] H., Farid and L., Siwei. Detecting hidden messages using higher-order statistics and support vector machines. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 340–354, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York.
[68] T., Filler and J., Fridrich. Binary quantization using belief propagation over factor graphs of LDGM codes. In 45th Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, September 26-28, 2007.
[69] T., Filler and J., Fridrich. Complete characterization of perfectly secure stegosystems with mutually independent embedding. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, Taipei, April 19-24, 2009.
[70] T., Filler and J., Fridrich. Fisher information determines capacity of e-secure steganog-raphy. In S., Katzenbeisser and A.-R., Sadeghi, editors, Information Hiding, 11th International Workshop, volume 5806 of Lecture Notes in Computer Science, pages 31–47, Darmstadt, June 7-10, 2009. Springer-Verlag, New York.
[71] T., Filler, A. D., Ker, and J., Fridrich. The Square Root Law of steganographic capacity for Markov covers. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 08 1-08 11, San Jose, CA, January 18-21, 2009.
[72] G., Fisk, M., Fisk, C., Papadopoulos, and J., Neil. Eliminating steganography in Internet traffic with active wardens. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 18–35, Noordwijkerhout, October 7-9, 2003. Springer-Verlag, New York.
[73] M. A., Fitch and R. E., Jamison. Minimum sum covers of small cyclic groups. Congressus Numerantium, 147:65–81, 2000.
[74] J. D., Foley, A., van Dam, S. K., Feiner, J. F., Hughes, and R. L., Phillips. Introduction to Computer Graphics. New York: Addison-Wesley, 1997.
[75] E., Franz. Steganography preserving statistical properties. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 278–294, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York.
[76] E., Franz. Embedding considering dependencies between pixels. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages D 1-D 12, San Jose, CA, January 27-31, 2008.
[77] E., Franz and A., Schneidewind. Pre-processing for adding noise steganography. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 189–203, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.
[78] J., Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67–81, Toronto, May 23-25, 2004. Springer-Verlag, New York.
[79] J., Fridrich. Asymptotic behavior of the ZZW embedding construction. IEEE Transactions on Information Forensics and Security, 4(1):151–153, March 2009.
[80] J., Fridrich and R., Du. Secure steganographic methods for palette images. In A., Pfitz-mann, editor, Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 47–60, Dresden, September 29-October 1, 1999. Springer-Verlag, New York.
[81] J., Fridrich, P., Lisonëk, and D., Soukal. On steganographic embedding efficiency. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 282–296, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
[82] J., Fridrich and M., Goljan. Digital image steganography using stochastic modulation. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 191–202, Santa Clara, CA, January 21-24, 2003.
[83] J., Fridrich and M., Goljan. On estimation of secret message length in LSB steganog-raphy in spatial domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 23–34, San Jose, CA, January 19-22, 2004.
[84] J., Fridrich, M., Goljan, and R., Du. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, Special Issue on Security, 8(4):22–28, October-December 2001.
[85] J., Fridrich, M., Goljan, and R., Du. Steganalysis based on JPEG compatibility. In A. G., Tescher, editor, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, volume 4518, pages 275–280, Denver, CO, August 20-24, 2001.
[86] J., Fridrich, M., Goljan, and D., Hogea. Steganalysis of JPEG images: Breaking the F5 algorithm. In Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 310–323, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, New York.
[87] J., Fridrich, M., Goljan, D., Hogea, and D., Soukal. Quantitative steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal, 9(3):288–302, 2003.
[88] J., Fridrich, M., Goljan, and D., Soukal. Higher-order statistical steganalysis of palette images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, pages 178–190, Santa Clara, CA, January 21-24, 2003.
[89] J., Fridrich, M., Goljan, and D., Soukal. Perturbed quantization steganography using wet paper codes. In J., Dittmann and J., Fridrich, editors, Proceedings of the 6th ACM Multimedia & Security Workshop, pages 4–15, Magdeburg, September 20-21, 2004.
[90] J., Fridrich, M., Goljan, and D., Soukal. Searching for the stego key. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 70–82, San Jose, CA, January 19-22, 2004.
[91] J., Fridrich, M., Goljan, and D., Soukal. Efficient wet papercodes. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, Lecture Notes in Computer Science, pages 204–218, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.
[92] J., Fridrich, M., Goljan, and D., Soukal. Perturbed quantization steganography. ACM Multimedia System Journal, 11(2):98–107, 2005.
[93] J., Fridrich, M., Goljan, and D., Soukal. Steganography via codes for memory with defective cells. In 43rd Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, September 28-30, 2005.
[94] J., Fridrich, M., Goljan, D., Soukal, and T., Holotyak. Forensic steganalysis: Determining the stego key in spatial domain steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 631–642, San Jose, CA, January 16-20, 2005.
[95] J., Fridrich, T., Pevny, and J., Kodovsky. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3–14, Dallas, TX, September 20-21, 2007.
[96] J., Fridrich and D., Soukal. Matrix embedding for large payloads. IEEE Transactions on Information Forensics and Security, 1(3):390–394, 2006.
[97] F., Galand and C., Fontaine. How Reed-Solomon codes can improve steganographic schemes. EURASIP Journal on Information Security, 2009. Article ID 274845, doi:10.1155/2009/274845.
[98] F., Galand and G., Kabatiansky. Information hiding by coverings. In Proceedings IEEE, Information Theory Workshop, ITW 2003, pages 151–154, Paris, March 31-April 4, 2003.
[99] S. I., Gel'fand and M. S., Pinsker. Coding for channel with random parameters. Problems of Control and Information Theory, 9(1):19–31, 1980.
[100] S., Gianvecchio and H., Wang. Detecting covert timing channels: An entropy-based approach. In P., Ning, S. De Capitani di, Vimercati, and P. F., Syverson, editors, Proceedings 14th ACM Conference on Computer and Communication Security (CCS), pages 307–316, Alexandria, VA, October 28-31, 2007.
[101] J., Giffin, R., Greenstadt, P., Litwack, and R., Tibbetts. Covert messaging through TCP timestamps. In R., Dingledine and P., Syverson, editors, Proceedings Privacy Enhancing Technologies Workshop (PET), volume 2482 of Lecture Notes in Computer Science, pages 194–208, San Francisco, CA, April 14-15, 2002. Springer-Verlag, Berlin.
[102] M., Goljan, J., Fridrich, and T., Holotyak. New blind steganalysis and its implications. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 1–13, San Jose, CA, January 16-19, 2006.
[103] R. L., Graham and N. J. A., Sloane. On additive bases and harmonious graphs. SIAM Journal on Algebraic and Discrete Methods, 1(4):382–404, December 1980.
[104] A., Gretton, K. M., Borgwardt, M., Rasch, B., Schölkopf, and A. J., Smola. A kernel method forthe two-sample-problem. In B., Schölkopf, J., Platt, and T., Hoffman, editors, Advances in Neural Information Processing Systems 19, pages 513–520. MIT Press, Cambridge, MA, 2007.
[105] H., Haanpää. Minimum sum and difference covers of abelian groups. Journal of Integer Sequences, 7(2), 2004. Article 04.2.6.
[106] T. G., Handel and M. T., Stanford IIIHiding data in the OSI network model. In Information Hiding, 1st International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 23-38, Cambridge, May 30-June 1, 1996. Springer-Verlag, Berlin.
[107] J. J., Harmsen and W. A., Pearlman. Steganalysis of additive noise modelable information hiding. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 131–142, Santa Clara, CA, January 21-24, 2003.
[108] C., Heegard and A. A., El-Gamal. On the capacity of computer memory with defects. IEEE Transactions on Information Theory, 29(5):731–739, 1983.
[109] Herodotus. The Histories. Penguin Books, London, 1996. Translated by Aubrey de Sélincourt.
[110] S., Hetzl and P., Mutzel. A graph-theoretic approach to steganography. In J., Dittmann, S., Katzenbeisser, and A., Uhl, editors, Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, volume 3677 of Lecture Notes in Computer Science, pages 119–128, Salzburg, September 19-21, 2005.
[111] F. S., Hill Jr., Computer Graphics Using Open GL. Upper Saddle River, NJ: Prentice Hall, 2nd edition, 2000.
[112] N. J., Hopper. On steganographic chosen covertext security. In 32nd Annual International Colloquium on Automata, Languages and Programming, (ICALP 2005), pages 311–321, Lisbon, July 11-15, 2005.
[113] N. J., Hopper, J., Langford, and L., von Ahn. Provably secure steganography. In M., Yung, editor, Advances in Cryptology, CRYPTO '02, 22nd Annual International Cryptology Conference, volume 2442 of Lecture Notes in Computer Science, pages 77–92, Santa Barbara, CA, August 18-22, 2002. Springer-Verlag.
[114] C., Hsu and C., Lin. A comparison of methods for multi-class support vector machines. Technical report, Department of Computer Science and Information Engineering, National Taiwan University, Taipei, 2001.
[115] D. F., Hsu and X., Jia. Additive bases and extremal problems in groups, graphs and networks. Utilitas Mathematica, 66:61–91, 2004.
[116] G. A., Francia III and T. S., Gomez. Steganography obliterator: An attack on the least significant bits. In Proceedings 3rd Annual Conference on Information Security Curriculum Development (InfoSecCD '06), pages 85–91, Kennesaw State University, Kennesaw, GA, September 22-23, 2006.
[117] D., Johnson. White King and Red Queen: How the Cold War Was Fought on the Chessboard. Houghton Mifflin Company, Boston and New York, 2008.
[118] M. K., Johnson, S., Lyu, and H., Farid. Steganalysis of recorded speech. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 664–672, San Jose, CA, January 16-20, 2005.
[119] N. F., Johnson and S., Jajodia. Exploring steganography: Seeing the unseen. IEEE Computer, 31:26–34, February 1998.
[120] N. F., Johnson and S., Jajodia. Steganalysis of images created using current steganography software. In D., Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, pages 273–289, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.
[121] N. F., Johnson and S., Jajodia. Steganalysis: The investigation of hidden information. In Proceedings IEEE, Information Technology Conference, Syracuse, NY, September 1-3, 1998.
[122] N. F., Johnson and P., Sallee. Detection of hidden information, covert channels and information flows. In John G., Voeller, editor, Wiley Handbook of Science Technology for Homeland Security. New York: Wiley & Sons, Inc, April 4, 2008.
[123] S., Katzenbeisser and F. A. P., Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking. New York: Artech House, 2000.
[124] S., Katzenbeisser and F. A. P., Petitcolas. Defining security in steganographic systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, volume 4675, pages 50–56, San Jose, CA, January 21-24, 2002.
[125] S. M., Kay. Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory, volume II. Upper Saddle River, NJ: Prentice Hall, 1998.
[126] S. M., Kay. Fundamentals of Statistical Signal Processing, Volume II: Detection Theory, volume II. Upper Saddle River, NJ: Prentice Hall, 1998.
[127] A. D., Ker. Improved detection of LSB steganography in grayscale images. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 97–115, Toronto, May 23-25, 2004. Springer-Verlag, Berlin.
[128] A. D., Ker. A general framework for structural analysis of LSB replacement. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 296–311, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.
[129] A. D., Ker. Resampling and the detection of LSB matching in color bitmaps. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 1–15, San Jose, CA, January 16-20, 2005.
[130] A. D., Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6):441–444, June 2005.
[131] A. D., Ker. Fourth-order structural steganalysis and analysis of cover assumptions. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 25–38, San Jose, CA, January 16-19, 2006.
[132] A. D., Ker. A capacity result for batch steganography. IEEE Signal Processing Letters, 14(8):525–528, 2007.
[133] A. D., Ker. A fusion of maximal likelihood and structural steganalysis. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 204–219, Saint Malo, June 11-13, 2007. Springer-Verlag, Berlin.
[134] A. D., Ker. Optimally weighted least-squares steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 6 1-6 16, San Jose, CA, January 29-February 1, 2007.
[135] A. D., Ker. Steganalysis of embedding in two least significant bits. IEEE Transactions on Information Forensics and Security, 2:46–54, 2007.
[136] A. D., Ker. The ultimate steganalysis benchmark? In J., Dittmann and J., Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 141–148, Dallas, TX, September 20-21, 2007.
[137] A. D., Ker. Locating steganographic payload via WS residuals. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 27–32, Oxford, September 22-23, 2008.
[138] A. D., Ker and R., Böhme. Revisiting weighted stego-image steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 5 1-5 17, San Jose, CA, January 27-31, 2008.
[139] A. D., Ker and I., Lubenko. Feature reduction and payload location with WAM steganalysis. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 0A 1-0A 13, San Jose, CA, January 18-21, 2009.
[140] A. D., Ker, T., Pevny, J., Kodovsky, and J., Fridrich. The Square Root Law of stegano-graphic capacity. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 107–116, Oxford, September 22-23, 2008.
[141] Y., Kim, Z., Duric, and D., Richards. Modified matrix encoding technique for minimal distortion steganography. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 314–327, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
[142] G., Kipper. Investigator's Guide to Steganography. Boca Raton, FL: CRC Press, 2004.
[143] J., Kodovsky and J., Fridrich. Influence of embedding strategies on security of stegano-graphic methods in the JPEG domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 2 1-2 13, San Jose, CA, January 27-31, 2008.
[144] J., Kodovsky and J., Fridrich. On completeness of feature spaces in blind steganalysis. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123–132, Oxford, September 22-23, 2008.
[145] G., Kolata. A mystery unraveled, twice. The New York Times, pages F1–F6, April 14, 1998.
[146] G., Kolata. Veiled messages of terror may lurk in cyberspace. The New York Times, October 30, 2001.
[147] N., Komaki, N., Aoki, and T., Yamamoto. A packet loss concealment technique for VoIP using steganography. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, E86-A(8):2069–2072, 2003.
[148] O., Koval, S., Voloshynovskiy, T., Holotyak, and T., Pun. Information theoretic analysis of steganalysis in real images. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 11–16, Geneva, September 26-27, 2006.
[149] C., Krätzer and J., Dittmann. Pros and cons of melcepstrum based audio steganalysis using SVM classification. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, pages 359–377, Saint Malo, June 11-13, 2007.
[150] C., Krätzer, J., Dittmann, A., Lang, and T., Kühne. WLAN steganography: A first practical review. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 17–22, Geneva, September 26-27, 2006.
[151] M., Kutter and F. A. P., Petitcolas. A fair benchmark for image watermarking systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents I, volume 3657, pages 226–239, San Jose, CA, 1999.
[152] A. V., Kuznetsov and B. S., Tsybakov. Coding in a memory with defective cells. Problems of Information Transmission, 10:132–138, 1974.
[153] Tri, Van Le. Efficient provably secure public key steganography. Technical report, Florida State University, 2003. Cryptography ePrint Archive, http://eprint.iacr.org/2003/156.
[154] Tri, Van Le and K., Kurosawa. Efficient public key steganography secure against adaptively chosen stegotext attacks. Technical report, Florida State University, 2003. Cryptography ePrint Archive, http://eprint.iacr.org/2003/244.
[155] K., Lee, C., Jung, S., Lee, and J., Lim. New steganalysis methodology: LR cube analysis for the detection of LSB steganography. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 312–326, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.
[156] K., Lee and A., Westfeld. Generalized category attack - improving histogram-based attack on JPEG LSB embedding. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 378–392, Saint Malo, June 11-13, 2007. Springer-Verlag, Berlin.
[157] K., Lee, A., Westfeld, and S., Lee. Category attack for LSB embedding of JPEG images. In Y.-Q., Shi, B., Jeon, Y.Q., Shi, and B., Jeon, editors, Digital Watermarking, 5th International Workshop, volume 4283 of Lecture Notes in Computer Science, pages 35–48, Jeju Island, November 8-10, 2006. Springer-Verlag, Berlin.
[158] X., Li, B., Yang, D., Cheng, and T., Zeng. A generalization of LSB matching. IEEE Signal Processing Letters, 16(2):69–72, February 2009.
[159] X., Li, T., Zeng, and B., Yang. Detecting LSB matching by applying calibration technique for difference image. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 133–138, Oxford, September 22-23, 2008.
[160] X., Li, T., Zeng, and B., Yang. Improvement of the embedding efficiency of LSB matching by sum and difference covering set. In Proceedings IEEE, International Conference on Multimedia and Expo, pages 209–212, Hannover, June 23-April 26, 2008.
[161] Tsung-Yuan, Liu and Wen-Hsiang, Tsai. A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique. IEEE Transactions on Information Forensics and Security, 2(1):24–30, March 2007.
[162] D., Llamas, C., Allison, and A., Miller. Covert channels in internet protocols: A survey. In M., Merabti and R., Pereira, editors, Proceedings 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting (PGNET), Liverpool, June 27-28, 2005.
[163] P., Lu, X., Luo, Q., Tang, and L., Shen. An improved sample pairs method for detection of LSB embedding. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 116–127, Toronto, May 23-25, 2004. Springer-Verlag, Berlin.
[164] M., Luby. LT, codes. In 43rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2002, pages 271–282, Vancouver, November 16-19, 2002.
[165] N. B., Lucena, G., Lewandowski, and S. J., Chapin. Covert channels in IPv6. In G., Danezis and D., Martin, editors, Proceedings Privacy Enhancing Technologies Workshop (PET), volume 3856 of Lecture Notes in Computer Science, pages 147–166, Dubrovnik, May 30-June 1, 2006. Springer-Verlag, Berlin.
[166] A., Lysyanskaya and M., Meyerovich. Steganography with imperfect sampling. Technical report, Brown University, 2005. Cryptography ePrint Archive, http://eprint.iacr.org/2005/305.
[167] S., Lyu and H., Farid. Steganalysis using color wavelet statistics and one-class support vectormachines. In E.J., Delp and P.W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 35–45, San Jose, CA, January 19-22, 2004.
[168] S., Lyu and H., Farid. Steganalysis using higher-order image statistics. IEEE Transactions on Information Forensics and Security, 1(1):111–119, 2006.
[169] W., Mazurczyk and K., Szczypiorski. Steganography of VoIP streams. In Proceedings of the 3rd International Symposium on Information Security, volume 5332 of Lecture Notes in Computer Science, pages 1001–1018, Monterrey, Mexico, November 10-11, 2008. Springer-Verlag, Berlin.
[170] A. D., McDonald and M. G., Kuhn. StegFS: A steganographic file system for Linux. In Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 454–468, Dresden, September 29-October 1, 1999. Springer-Verlag, Berlin.
[171] D. J. C., McKay. Information Theory, Inference, and Learning Algorithms. Cambridge: Cambridge University Press, 2003.
[172] S., Meignen and H., Meignen. On the modeling of DCT and subband image data for compression. IEEE Transactions on Image Processing, 4(2):186–193, February 1995.
[173] Y., Miche, B., Roue, A., Lendasse, and P., Bas. A feature selection methodology for steganalysis. In B., Günsel, A. K., Jain, A. M., Tekalp, and B., Sankur, editors, Multimedia Content Representation, Classification and Security, International Workshop, volume 4105 of Lecture Notes in Computer Science, pages 49–56, Istanbul, September 11-13, 2006. Springer-Verlag.
[174] J., Mielikainen. LSB matching revisited. IEEE Signal Processing Letters, 13(5):285–287, May 2006.
[175] M. K., Mihcak, I., Kozintsev, K., Ramchandran, and P., Moulin. Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters, 6(12):300–303, December 1999.
[176] D. S., Mitrinovic, J. E., Pecaric, and A. M., Fink. Classical and New Inequalities in Analysis. Kluwer Academic Publishers, Dordrecht, 1993.
[177] I. S., Moskowitz, R. E., Newman, D. P., Crepeau, and A. R., Miller. Covert channels and anonymizing networks. In S., Jajodia, P., Samarati, and P. F., Syverson, editors, Proceedings Workshop on Privacy in the Electronic Society (WPES), pages 79–88, Washington, DC, October 30, 2003.
[178] P., Moulin, M. K., Mihcak, and G. I., Lin. An information-theoretic model for image watermarking and data hiding. In Proceedings IEEE, International Conference on Image Processing, ICIP 2000, volume 3, pages 667–670, Vancouver, September 10-13, 2000.
[179] P., Moulin and J. A., Sullivan. Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, 49(3):563–593, March 2003.
[180] P., Moulin and Y., Wang. New results on steganographic capacity. In Proceedings of the Conference on Information Sciences and Systems, CISS, Princeton, NJ, March 17-19, 2004.
[181] A., Munoz and J. M., Moguerza. Estimation of high-density regions using one-class neighbor machines. IEEE Transactions on Pattern Analysis and Machine Intelligence, 26(3):476–480, 2006.
[182] B., Murphy and C., Vogel. Statistically constrained shallow text marking: Techniques, evaluation paradigm, and results. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages Z 1-Z 9, San Jose, CA, January 29-February 1, 2007.
[183] H., Noda, M., Niimi, and E., Kawaguchi. Application of QIM with dead zone for histogram preserving JPEG steganography. In Proceedings IEEE, International Conference on Image Processing, ICIP 2005, volume II, pages 1082–1085, Genova, September 11-14, 2005.
[184] H.-O., Peitgen, H., Jürgens, and D., Saupe. Chaos and Fractals: New Frontiers of Science. Berlin: Springer-Verlag, 1992.
[185] W., Pennebaker and J., Mitchell. JPEG: Still Image Data Compression Standard. Van Nostrand Reinhold, New York, 1993.
[186] F., Perez-Gonzalez and S., Voloshynovskiy, editors. Fundamentals of Digital Image Watermarking. New York: Wiley Blackwell, 2005.
[187] F. A. P., Petitcolas. MP3Stego software. 1998.
[188] K., Petrowski, M., Kharrazi, H. T., Sencar, and N. D., Memon. Psteg: Steganographic embedding through patching. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, pages 537–540, Philadelphia, PA, March 18-23, 2005.
[189] T., Pevny and J., Fridrich. Multiclass blind steganalysis for JPEG images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages O 1-O 13, San Jose, CA, January 16-19, 2006.
[190] T., Pevny and J., Fridrich. Merging Markov and DCT features for multi-class JPEG steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1-3 14, San Jose, CA, January 29-February 1, 2007.
[191] T., Pevny and J., Fridrich. Benchmarking for steganography. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 251–267, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York.
[192] T., Pevny and J., Fridrich. Detection of double-compression for applications in steganography. IEEE Transactions on Information Forensics and Security, 3(2):247–258, 2008.
[193] T., Pevny and J., Fridrich. Multiclass detector of current steganographic methods for JPEG format. IEEE Transactions on Information Forensics and Security, 3(4):635–650, December 2008.
[194] T., Pevny and J., Fridrich. Novelty detection in blind steganalysis. In A. D., Ker, J., Dittmann, and J., Fridrich, editors, Proceedings of the 10th ACM Multimedia & Security Workshop, pages 167–176, Oxford, September 22-23, 2008.
[195] T., Pevny, J., Fridrich, and A. D., Ker. From blind to quantitative steganalysis. In N. D., Memon, E. J., Delp, P. W., Wong, and J., Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 0C 1-0C 14, San Jose, CA, January 18-21, 2009.
[196] A. C., Popescu. Statistical Tools for Digital Image Forensics. PhD thesis, Department of Computer Science, Dartmouth College, 2005.
[197] S., Pradhan, J., Chou, and K., Ramchandran. Duality between source coding and channel coding and its extension to the side information case. IEEE Transactions on Information Theory, 49(5):1181–1203, 2003.
[198] N., Provos. Defending against statistical steganalysis. In 10th USENIX Security Symposium, pages 323–335, Washington, DC, August 13-17, 2001.
[199] N., Provos and P., Honeyman. Detecting steganographic content on the internet. Technical report, 01-11, CITI, August 2001.
[200] R., Radhakrishnan, M., Kharrazi, and N. D., Memon. Data masking a new approach for data hiding?Journal of VLSI Signal Processing Systems, 41(3):293–303, November 2005.
[201] J. A., Reeds. Solved: The ciphers in Book III of Trithemius's Steganographia. Cryptologia, 22:291–319, October 1998.
[202] X.-M., Ru, H.-J., Zhang, and X., Huang. Steganalysis of audio: Attacking the Steghide. In Proceedings of the International Conference on Machine Learning and Cybernetics, volume 7, pages 3937–3942, Guangzhou, August 18-21, 2005.
[203] J., Rutenberg. A nation challenged: Videotape. New York Times, February 1, 2002.
[204] P., Sallee. Model-based steganography. In T., Kalker, I. J., Cox, and Y. Man, Ro, editors, Digital Watermarking, 2nd International Workshop, volume 2939 of Lecture Notes in Computer Science, pages 154–167, Seoul, October 20-22, 2003. Springer-Verlag, New York.
[205] P., Sallee. Model-based methods for steganography and steganalysis. International Journal of Image Graphics, 5(1):167–190, 2005.
[206] K., Sayood. Introduction to Data Compression (3rd edition). New York: Morgan Kaufmann, 2000.
[207] B., Schneier. Applied Cryptography. New York: John Wiley & Sons, 1996.
[208] D., Schönfeld and A., Winkler. Embedding with syndrome coding based on BCH codes. In S., Voloshynovskiy, J., Dittmann, and J., Fridrich, editors, Proceedings of the 8th ACM Multimedia & Security Workshop, pages 214–223, Geneva, September 26-27, 2006.
[209] T., Sharp. An implementation of key-based digital signal steganography. In I. S., Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 13–26, Pittsburgh, PA, April 25-27, 2001. Springer-Verlag, New York.
[210] Y. Q., Shi, C., Chen, and W., Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L., Camenisch, C. S., Collberg, N. F., Johnson, and P., Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249–264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
[211] F. Y., Shih. Digital Watermarking and Steganography: Fundamentals and Techniques. Boca Raton, FL: CRC Press, 2007.
[212] B., Shimanovsky, J., Feng, and M., Potkonjak. Hiding data in DNA. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 373–386, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, Berlin.
[213] M., Sidorov. Hidden Markov models and steganalysis. In J., Dittmann and J., Fridrich, editors, Proceedings of the 6th ACM Multimedia & Security Workshop, pages 63–67, Magdeburg, September 20-21, 2004.
[214] G. J., Simmons. The prisoner's problem and the subliminal channel. In D., Chaum, editor, Advances in Cryptology, CRYPTO '83, pages 51–67, Santa Barbara, CA, August 22-24, 1983. New York: Plenum Press.
[215] A. J., Smola and B., Schölkopf. A tutorial on support vector regression. NeuroCOLT2 Technical Report NC2-TR-1998-030, 1998.
[216] T., Sohn, J., Seo, and J., Moon. A study on the covert channel detection of TCP/IP header using support vector machine. In S., Qing, D., Gollmann, and J., Zhou, editors, Proceedings of the 5th International Conference on Information and Communications Security, volume 2836 of Lecture Notes in Computer Science, pages 313–324, Huhe-haote, October 10-13, 2003. Springer-Verlag, Berlin.
[217] K., Solanki, A., Sarkar, and B. S., Manjunath. YASS: Yet another steganographic scheme that resists blind steganalysis. In T., Furon, F., Cayre, G., Doërr, and P., Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 16–31, Saint Malo, June 11-13, 2007. Springer-Verlag, New York.
[218] K., Solanki, K., Sullivan, U., Madhow, B. S., Manjunath, and S., Chandrasekaran. Provably secure steganography: Achieving zero K-L divergence using statistical restoration. In Proceedings IEEE, International Conference on Image Processing, ICIP 2006, pages 125–128, Atlanta, GA, October 8-11, 2006.
[219] A., Somekh-Baruch and N., Merhav. On the capacity game of public watermarking systems. IEEE Transactions on Information Theory, 50(3):511–524, 2004.
[220] D., Soukal, J., Fridrich, and M., Goljan. Maximum likelihood estimation of secret message length embedded using ±k steganography in spatial domain. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 595–606, San Jose, CA, January 16-20, 2005.
[221] M. R., Spiegel. Schaum's Outline of Theory and Problems of Statistics. McGraw-Hill, New York, 3rd edition, 1961.
[222] M., Stamm and K. J., Ray Liu. Blind forensics of contrast enhancement in digital images. In Proceedings IEEE, International Conference on Image Processing, ICIP 2008, pages 3112–3115, San Diego, CA, October 12-15, 2008.
[223] I., Steinwart. On the influence of the kernel on the consistency of support vector machines. Journal of Machine Learning Research, 2:67–93, 2001. Available electronically at http://www.jmlr.org/papers/volume2/steinwart01a/steinwart01a.ps.gz.
[224] G. W. W., Stevens. Microphotography – Photography and Photofabrication at Extreme Resolutions. London, Chapman & Hall, 1968.
[225] K., Sullivan, U., Madhow, B. S., Manjunath, and S., Chandrasekaran. Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensics and Security, 1(2):275–287, June 2006.
[226] A., Tacticius. How to Survive Under Siege/Aineas the Tactician. Oxford: Clarendon Ancient History Series, 1990.
[227] C. M., Taskiran, U., Topkara, M., Topkara, and E. J., Delp. Attacks on lexical natural language steganography systems. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 97–105, San Jose, CA, January 16-19, 2006.
[228] D. S., Taubman and M. W., Marcellin. JPEG 2000 Image Compression Fundamentals, Standards, and Practices. Kluwer Academic Publishers, Boston, MA, 2002.
[229] J., Taylor and A., Verbyla. Joint modeling of location and scale parameters of the t-distribution. Statistical Modeling, 4:91–112, 2004.
[230] J., Tobin and R., Dobard. Hidden in Plain View: The Secret Story of Quilts and the Underground Railroad. Doubleday, New York, 1999.
[231] B. S., Tsybakov. Defect and error correction. Problemy Peredachi Informatsii, 11:21–30, July-September 1975. Translated from Russian.
[232] R., Tzschoppe, R., Bäuml, J. B., Huber, and A., Kaup. Steganographic system based on higher-order statistics. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents V, volume 5020, pages 156–166, Santa Clara, CA, January 21-24, 2003.
[233] M., van Dijk and F., Willems. Embedding information in grayscale images. In Proceedings of the 22nd Symposium on Information and Communication Theory, pages 147–154, Enschede, May 15-16, 2001.
[234] L., von Ahn and N., Hopper. Public-key steganography. In C., Cachin and J., Camenisch, editors, Advances in Cryptology – EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, volume 3027 of Lecture Notes in Computer Science, pages 323–341, Interlaken, May 2-6, 2004. Springer-Verlag, Heidleberg.
[235] Y., Wang and P., Moulin. Steganalysis of block-structured stegotext. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, volume 5306, pages 477–488, San Jose, CA, January 19-22, 2004.
[236] Y., Wang and P., Moulin. Statistical modelling and steganalysis of DFT-based image steganography. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 2 1-2 11, San Jose, CA, January 16-19, 2006.
[237] Y., Wang and P., Moulin. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security, 55(6):2706–2722, June 2008.
[238] P., Wayner. Mimic functions. CRYPTOLOGIA, 16(3):193–214, July 1992.
[239] P., Wayner. Disappearing Cryptography. Morgan Kaufmann, San Francisco, CA, 2nd edition, 2002.
[240] J., Werner. Optimization – Theory and Applications. Braunschweig: Vieweg, 1984.
[241] A., Westfeld. High capacity despite better steganalysis (F5 – a steganographic algorithm). In I. S., Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of Lecture Notes in Computer Science, pages 289–302, Pittsburgh, PA, April 25-27, 2001. Springer-Verlag, New York.
[242] A., Westfeld. Detecting low embedding rates. In F. A. P., Petitcolas, editor, Information Hiding, 5th International Workshop, volume 2578 of Lecture Notes in Computer Science, pages 324–339, Noordwijkerhout, October 7-9, 2002. Springer-Verlag, Berlin.
[243] A., Westfeld. Space filling curves in steganalysis. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 28–37, San Jose, CA, January 16-20, 2005.
[244] A., Westfeld. Generic adoption of spatial steganalysis to transformed domain. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 161–177, Santa Barbara, CA, June 19-21, 2007. Springer-Verlag, New York.
[245] A., Westfeld and R., Böhme. Exploiting preserved statistics for steganalysis. In J., Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 82–96, Toronto, May 23-25, 2004. Springer-Verlag, Berlin.
[246] A., Westfeld and A., Pfitzmann. Attacks on steganographic systems. In A., Pfitzmann, editor, Information Hiding, 3rd International Workshop, volume 1768 of Lecture Notes in Computer Science, pages 61–75, Dresden, September 29-October 1, 1999. Springer-Verlag, New York.
[247] E. H., Wilkins. A History of Italian Literature. Oxford University Press, London, 1954.
[248] F. J. M., Williams and N. J., Sloane. The Theory of Error-Correcting Codes. North-Holland, Amsterdam, 1977.
[249] P. W., Wong, H., Chen, and Z., Tang. On steganalysis of plus-minus one embedding in continuous-tone images. In E. J., Delp and P. W., Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, volume 5681, pages 643–652, San Jose, CA, January 16-20, 2005.
[250] F. B., Wrixon. Codes, Ciphers and Other Cryptic and Clandestine Communication. New York: Black Dog & Leventhal Publishers, 1998.
[251] Z., Wu and W., Yang. G.711-based adaptive speech information hiding approach. In De-Shuang Huang, K.Li, and G. W., Irwin, editors, Proceedings of the International Conference on Intelligent Computing, volume 4113 of Lecture Notes in Computer Science, pages 1139–1144, Kunming, August 16-19, 2006. Springer-Verlag, Berlin.
[252] G., Xuan, Y. Q., Shi, J., Gao, D., Zou, C., Yang, Z. Z. P., Chai, C., Chen, and W., Chen. Ste- ganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In M., Barni, J., Herrera, S., Katzenbeisser, and F., Pérez-González, editors, Information Hiding, 7th International Workshop, volume 3727 of Lecture Notes in Computer Science, pages 262–277, Barcelona, June 6-8, 2005. Springer-Verlag, Berlin.
[253] C., Yang, F., Liu, X., Luo, and B., Liu. Steganalysis frameworks of embedding in multiple least-significant bits. IEEE Transactions on Information Forensics and Security, 3:662–672, 2008.
[254] R., Zamir, S., Shamai, and U., Erez. Nested linear/lattice codes for structured multiterminal binning. IEEE Transactions on Information Theory, 48(6):1250–1276, 2002.
[255] T., Zhang and X., Ping. A fast and effective steganalytic technique against Jsteg-like algorithms. In Proceedings of the ACM Symposium on Applied Computing, pages 307–311, Melbourne, FL, March 9-12, 2003.
[256] T., Zhang and X., Ping. A new approach to reliable detection of LSB steganography in natural images. Signal Processing, 83(10):2085–2094, October 2003.
[257] W., Zhang, X., Zhang, and S., Wang. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes. In K., Solanki, K., Sullivan, and U., Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lecture Notes in Computer Science, pages 60–71, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York.
[258] X., Zhang, W., Zhang, and S., Wang. Efficient double-layered steganographic embedding. Electronics Letters, 43:482–483, April 2007.