Model-Based Steganography
Top Cited Papers
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Noise removal via Bayesian wavelet coringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Detecting Hidden Messages Using Higher-Order Statistics and Support Vector MachinesPublished by Springer Nature ,2002
- Steganalysis of JPEG Images: Breaking the F5 AlgorithmPublished by Springer Nature ,2002
- Progressive wavelet image coding based on a conditional probability modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- F5—A Steganographic AlgorithmPublished by Springer Nature ,2001
- Elements of Information TheoryPublished by Wiley ,2001
- Attacks on Steganographic SystemsPublished by Springer Nature ,2000
- An Information-Theoretic Model for SteganographyPublished by Springer Nature ,1998
- On the limits of steganographyIEEE Journal on Selected Areas in Communications, 1998
- Arithmetic coding for data compressionCommunications of the ACM, 1987