Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Filler, Tom
and
Fridrich, Jessica
2010.
Gibbs Construction in Steganography.
IEEE Transactions on Information Forensics and Security,
Vol. 5,
Issue. 4,
p.
705.
Pevný, Tomáš
Filler, Tomáš
and
Bas, Patrick
2010.
Information Hiding.
Vol. 6387,
Issue. ,
p.
161.
Filler, Tomas
and
Fridrich, Jessica
2010.
Minimizing additive distortion functions with non-binary embedding operation in steganography.
p.
1.
Kodovsky, Jan
and
Fridrich, Jessica
2010.
Quantitative Structural Steganalysis of Jsteg.
IEEE Transactions on Information Forensics and Security,
Vol. 5,
Issue. 4,
p.
681.
Zielinska, Elzbieta
and
Szczypiorski, Krzysztof
2011.
Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4.
p.
586.
Cogranne, Rémi
Zitzmann, Cathel
Fillatre, Lionel
Retraint, Florent
Nikiforov, Igor
and
Cornu, Philippe
2011.
Information Hiding.
Vol. 6958,
Issue. ,
p.
178.
Gul, Gokhan
and
Kurugollu, Fatih
2011.
Information Hiding.
Vol. 6958,
Issue. ,
p.
71.
Fridrich, Jessica
and
Kodovsky, Jan
2012.
Rich Models for Steganalysis of Digital Images.
IEEE Transactions on Information Forensics and Security,
Vol. 7,
Issue. 3,
p.
868.
Ray, Rishav
Sanyal, Jeeyan
Das, Debanjan
and
Nath, Asoke
2012.
A New Challenge of Hiding any Encrypted Secret Message inside any Text/ASCII File or in MS Word File: RJDA Algorithm.
p.
889.
Fillatre, Lionel
2012.
Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images.
IEEE Transactions on Signal Processing,
Vol. 60,
Issue. 2,
p.
556.
Lima, Juliano B.
and
de Souza, Ricardo M. Campello
2012.
Histogram Uniformization for Digital Image Encryption.
p.
55.
Hong, Wien
and
Chen, Tung-Shou
2012.
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.
IEEE Transactions on Information Forensics and Security,
Vol. 7,
Issue. 1,
p.
176.
Zhou, Fucheng
Yang, Rener
Zheng, Ziwei
and
He, Jiaming
2012.
Steganography in multimedia messaging service of mobile intelligent terminal.
p.
1340.
Chaumont, Marc
and
Kouider, Sarra
2012.
Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features.
p.
1133.
2012.
Machine Learning in Image Steganalysis.
p.
267.
Fridrich, Jessica
2013.
Effect of Cover Quantization on Steganographic Fisher Information.
IEEE Transactions on Information Forensics and Security,
Vol. 8,
Issue. 2,
p.
361.
El-Alfy, El-Sayed M.
2013.
Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network.
p.
160.
Che, Pak Hou
Bakshi, Mayank
and
Jaggi, Sidharth
2013.
Reliable deniable communication: Hiding messages in noise.
p.
2945.
Atawneh, Samer
Almomani, Ammar
and
Sumari, Putra
2013.
Steganography in digital images: Common approaches and tools.
IETE Technical Review,
Vol. 30,
Issue. 4,
p.
344.
Véron, Pascal
2013.
Algebraic Informatics.
Vol. 8080,
Issue. ,
p.
9.