”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS
Top Cited Papers
- 1 January 2011
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Minimizing Additive Distortion in Steganography Using Syndrome-Trellis CodesIEEE Transactions on Information Forensics and Security, 2011
- Gibbs Construction in SteganographyIEEE Transactions on Information Forensics and Security, 2010
- Modern steganalysis can detect YASSPublished by SPIE-Intl Soc Optical Eng ,2010
- Using High-Dimensional Image Models to Perform Highly Undetectable SteganographyPublished by Springer Nature ,2010
- Steganalysis by subtractive pixel adjacency matrixPublished by Association for Computing Machinery (ACM) ,2009
- On completeness of feature spaces in blind steganalysisPublished by Association for Computing Machinery (ACM) ,2008
- The first BOWS contest: Break Our Watermarking SystemPublished by SPIE-Intl Soc Optical Eng ,2007
- Some distance properties of latent root and vector methods used in multivariate analysisBiometrika, 1966