Back to Results
First PageMeta Content
Graphics file formats / Steganalysis / Computer file formats / ISO standards / JPEG / Digital watermarking / Yass / Jessica Fridrich / Quantization / Cryptography / Espionage / Steganography


Modern Steganalysis Can Detect YASS Jan Kodovskýa , Tomáš Pevnýb ∗, Jessica Fridricha †, a Department of Electrical and Computer Engineering, Binghamton University, State University of New York
Add to Reading List

Document Date: 2009-11-28 18:47:02


Open Document

File Size: 200,02 KB

Share Result on Facebook

City

Springer-Verlag / Dallas / Noordwijkerhout / Alexandria / San Diego / Grenoble / Allerton / San Jose / /

Company

nsF5 / /

Country

Taiwan / Netherlands / France / /

/

Facility

National Taiwan University / Binghamton University / State University of New York / Czech Technical University / /

/

IndustryTerm

steganographic algorithms / secure embedding algorithms / steganalysis algorithms / least detectable algorithms / error-correcting algorithm / extraction algorithm / blind steganalysis tools / machine learning algorithm / advertising quality factor / steganographic algorithm / steganography algorithms / /

Organization

Czech Technical University in Prague / U.S. Government / National Taiwan University / Department of Cybernetics / State University of New York / Department of Electrical and Computer Engineering / Binghamton University / Department of Computer Science and Information Engineering / Air Force office of Scientific Research / /

Person

Anindya Sarkar / ARA TSAR / Jan Kodovský / Jessica Fridrich / Jessica Fridricha / Jan Kodovskýa / /

/

Position

MP / combination MP / /

ProvinceOrState

Texas / Virginia / Prince Edward Island / Illinois / New York / California / /

PublishedMedium

IEEE Transactions on Information Theory / Lecture Notes in Computer Science / /

Technology

three algorithms / JPEG / least detectable algorithms / machine learning algorithm / YASS algorithm / secret key / machine learning / secure embedding algorithms / Image Processing / extraction algorithm / F5 algorithm / two algorithms / error-correcting algorithm / embedding algorithm / 0.5 Detection error PE Algorithm / steganographic algorithms / steganographic algorithm / intriguing steganographic algorithm / steganalysis algorithms / controlled using a secret key / compressed using JPEG / /

SocialTag