Steganalysis of video sequences using collusion sensitivity

[1]  Gary C. Kessler Steganography: Implications for the Prosecutor and Computer Forensics Examiner , 2004 .

[2]  Deepa Kundur,et al.  Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.

[3]  Robert E. Tarjan,et al.  Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[4]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[5]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[6]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[7]  Siwei Lyu,et al.  Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.

[8]  Wen Gao,et al.  Steganalysis of data hiding techniques in wavelet domain , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[9]  Jean-Luc Dugelay,et al.  New intra-video collusion attack using mosaicing , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[10]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[11]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[12]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[13]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[14]  Rajarathnam Chandramouli,et al.  A mathematical framework for active steganalysis , 2003, Multimedia Systems.

[15]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[16]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[17]  Shaohui Liu,et al.  Steganalysis based on wavelet texture analysis and neural network , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[18]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[19]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[20]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[21]  Bülent Sankur,et al.  Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.

[22]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.