LSB matching steganalysis based on patterns of pixel differences and random embedding (English)
- New search for: Lerch-Hostalot, Daniel
- New search for: Lerch-Hostalot, Daniel
- New search for: Megías, David
In:
Computers & security
;
32
; 192-206
;
2013
-
ISSN:
- Article (Journal) / Print
-
Title:LSB matching steganalysis based on patterns of pixel differences and random embedding
-
Contributors:Lerch-Hostalot, Daniel ( author ) / Megías, David
-
Published in:Computers & security ; 32 ; 192-206
-
Publisher:
- New search for: Elsevier
-
Place of publication:Kidlington, Oxford
-
Publication date:2013
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 32
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity ProtocolToledo, Nerea / Higuero, Marivi / Astorga, Jasone / Aguado, Marina / Bonnin, Jean Marie et al. | 2012
- 19
-
Tree-formed verification data for trusted platformsSchmidt, Andreas U. / Leicher, Andreas / Brett, Andreas / Shah, Yogendra / Cha, Inhyok et al. | 2012
- 36
-
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networksTan, Hailun / Ostry, Diethelm / Zic, John / Jha, Sanjay et al. | 2012
- 56
-
Digital media triage with bulk data analysis and bulk_extractorGarfinkel, Simson L. et al. | 2012
- 73
-
The architecture of a digital forensic readiness management systemReddy, K. / Venter, H.S. et al. | 2012
- 90
-
Future directions for behavioral information security researchCrossler, Robert E. / Johnston, Allen C. / Lowry, Paul Benjamin / Hu, Qing / Warkentin, Merrill / Baskerville, Richard et al. | 2012
- 102
-
From keyloggers to touchloggers: Take the rough with the smoothDamopoulos, D. / Kambourakis, G. / Gritzalis, S. et al. | 2012
- 115
-
On the detection of desynchronisation attacks against security protocols that use dynamic shared secretsLasc, Ioana / Dojen, Reiner / Coffey, Tom et al. | 2012
- 130
-
Systematic bug finding and fault localization enhanced with input data trackingDeMott, Jared D. / Enbody, Richard J. / Punch, William F. et al. | 2012
- 158
-
Exploring attack graph for cost-benefit security hardening: A probabilistic approachWang, Shuzhen / Zhang, Zonghua / Kadobayashi, Youki et al. | 2012
- 170
-
EVIV: An end-to-end verifiable Internet voting systemJoaquim, Rui / Ferreira, Paulo / Ribeiro, Carlos et al. | 2012
- 192
-
LSB matching steganalysis based on patterns of pixel differences and random embeddingLerch-Hostalot, Daniel / Megías, David et al. | 2012
- 207
-
A universal system for fair non-repudiable certified e-mail without a trusted third partyPaulin, Alois / Welzer, Tatjana et al. | 2012
- 219
-
The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfallsSchreuders, Z. Cliffe / McGill, Tanya / Payne, Christian et al. | 2012
- 242
-
Security-related behavior in using information systems in the workplace: A review and synthesisGuo, Ken H. et al. | 2012
- 252
-
A middleware approach for outsourcing data securelyJammalamadaka, Ravi Chandra / Gamboni, Roberto / Mehrotra, Sharad / Seamons, Kent / Venkatasubramanian, Nalini et al. | 2012
- 267
-
Hacking VoIPSoupionis, Yannis / Gritzalis, Dimitris et al. | 2012
- 268
-
Metasploit the Penetration Tester's GuideKandias, Miltiadis / Gritzalis, Dimitris et al. | 2012
- IFC
-
Editorial Board| 2012
- iii
-
Contents| 2012
- v
-
EditorialSpafford, Eugene H. et al. | 2013