ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
3
views
23
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,321
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2004
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
other
Author(s):
Rainer Böhme
,
Andreas Westfeld
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
23
Record
: found
Abstract
: not found
Article
: not found
R: A Language for Data Analysis and Graphics
Ross Ihaka
,
Robert C Gentleman
(1996)
0
comments
Cited
423
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Arithmetic coding for data compression
Ian H. Witten
,
Radford Neal
,
John Cleary
(1987)
0
comments
Cited
207
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Information hiding-a survey
F.A.P. Petitcolas
,
R.J. Anderson
,
M.G. Kuhn
(1999)
0
comments
Cited
133
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2004
Pages
: 125-140
DOI:
10.1007/978-3-540-30108-0_8
SO-VID:
2c067e34-24df-4c2a-85e0-030e48780f8c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 423
Redundancy and Diversity in Security
pp. 109
A Formalization of Anonymity and Onion Routing
pp. 125
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
pp. 160
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
pp. 225
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
pp. 293
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Similar content
4,321
Using contourlet transform and cover selection for secure steganography
Authors:
Hedieh Sajedi
,
Mansour Jamzad
,
H. Sajedi
…
Implementation of a steganography system based on hybrid square quaternion moment compression in IoMT
Authors:
Mohamed Amine Tahiri
,
Ahmed Bencherqui
,
Hicham Karmouni
…
Reversible Image Steganography Scheme Based on a U-Net Structure
Authors:
Xintao Duan
,
Kai Jia
,
Baoxia Li
…
See all similar
Cited by
6
Digital image steganography: Survey and analysis of current methods
Authors:
Kevin Curran
,
Abbas Cheddad
,
Joan Condell
…
Universal distortion function for steganography in an arbitrary domain
Authors:
Vojtěch Holub
,
Jessica Fridrich
,
Tomáš Denemark
Gibbs Construction in Steganography
Authors:
Tom Filler
,
Jessica Fridrich
See all cited by