
Farid, steganalysis using higher-order image statistics, IEEE Transactions on InformationForensics and Security, 1(1)(2006) 111-119.ĭ. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE InternationalConference on Information & Communication Technologies: From Theory to Applications, Damascus.Syria, April 19-23, 2004, pp. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01 (3)(2003)32-44.

Judge, Steganography: Past, present, future. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2)(1998) 26-34. Westfeld, A.: High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm). Hetzl S.: Steghide (1) - Linux man page, (cit. In: 10th USENIX Security Symposium, Washington, DC (August 2001) Morgan Kaufmann (2011) ISBN: 978-0-12-374856-0ĭefending Against Statistical Steganalysis Niels Provos. Witten, I.H., Frank, E., Hall, M.A.: Datamining – Practical Machine Learning Tools and Techniques. IJCSI International Journal of Computer Science Issues 7(2(1)) (March 2010) ISSN (Online): 1694-0784 Mosavi, A.: Multiple Criteria Decision-Making Preprocessing Using Data Mining Tools. American Institute of Aeronautics and Astronautics (August 22, 2007)

Obayashi, S., Jeong, S., Chiba, K.: Multiobjective Design Exploration for Aerodynamic Configurations. MIT Press and McGraw-Hill, Cambridge (2001) ISBN 3-7. Matousek, R.: HC12: The Principle of CUDA Implementation. Price, K.: An Introduction to Differential Evolution. (eds.) New Optimization Techniques in Engineering, 33, ch. Zelinka, I.: SOMA – Self Organizing Migrating Algorithm. Technical University of Brno (2008) ISBN: 978-8-6 Volna, E.: Design of neural network trees. Volna, E.: Learning and evolution in artificial neural networks: Comparison study. Matousek, R.: Using AI Methods to Find a Non-Linear Regression Model with a Coupling Condition. IEEE Signal Processing Letters 3 (March 2007) Gül, G., Dirik, A.E., Avcibas, I.: Steganalytic Features for JPEG Compression-Based Perturbed Quantization. In: Proceedings of the Computing Women’s Congress, Hamilton, New Zealand, February 11-19 (2006) Hempstalk, K.: Hiding Behind Corners: Using Edges in Images for Better Steganography. Springer, Heidelberg (2004)įarid, H., Lyu, S.: Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. Submitted to SPIE: Electronic Imaging 2003, Security and Watermarking of Multimedia Contents, Santa Clara, California (2003)įridrich, J.: Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. Springer, Heidelberg (2003), (last accessed: December 24, 2003)įridrich, J., Goljan, M., Hogea, D.: New Methodology for Breaking Steganographic Techniques for JPEGs. Springer (September 1999)įridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: Breaking the F5 algorithm.

In: Proceedings of Information Hiding - Third International Workshop. Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. Provos, N., Honeyman, P.: Hide and Seek: An Introduction to Steganography. Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. Hertz, J., Kogh, A., Palmer, R.G.: Introduction to the Theory of Neural Computation. Goldwasser, S., Bellare, M.: Lecture Notes on Cryptography, 283 p. Wiley Publishing, Inc., United States of America (2003) ISBN 9-9 Cole, E., Krutz, D.R.: Hiding Sight, 321 p.
