Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. Böhme, R. & Westfeld, A. In Samarati, P., Ryan, P. Y. A., Gollmann, D., & Molva, R., editors, Computer Security (ESORICS), volume 3193, of Lecture Notes in Computer Science, pages 125–140, Berlin Heidelberg, 2004. Springer. bibtex @inproceedings{Boehme2004-MB1,
Address = {Berlin Heidelberg},
Author = {B{\"o}hme, Rainer and Westfeld, Andreas},
Booktitle = {Computer Security (ESORICS)},
Date-Modified = {2015-04-09 20:41:03 +0000},
Editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva},
Location = {Sophia Antipolis, France},
Pages = {125--140},
Publisher = {Springer},
Series = {Lecture Notes in Computer Science},
Title = {Breaking {C}auchy Model-Based {JPEG} Steganography with First Order Statistics},
Volume = {3193},
Year = {2004}}
Downloads: 0
{"_id":"v8gdRLjGzZPDoQff7","bibbaseid":"bhme-westfeld-breakingcauchymodelbasedjpegsteganographywithfirstorderstatistics-2004","authorIDs":[],"author_short":["Böhme, R.","Westfeld, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","address":"Berlin Heidelberg","author":[{"propositions":[],"lastnames":["Böhme"],"firstnames":["Rainer"],"suffixes":[]},{"propositions":[],"lastnames":["Westfeld"],"firstnames":["Andreas"],"suffixes":[]}],"booktitle":"Computer Security (ESORICS)","date-modified":"2015-04-09 20:41:03 +0000","editor":[{"firstnames":["Pierangela"],"propositions":[],"lastnames":["Samarati"],"suffixes":[]},{"firstnames":["Peter","Y.","A."],"propositions":[],"lastnames":["Ryan"],"suffixes":[]},{"firstnames":["Dieter"],"propositions":[],"lastnames":["Gollmann"],"suffixes":[]},{"firstnames":["Refik"],"propositions":[],"lastnames":["Molva"],"suffixes":[]}],"location":"Sophia Antipolis, France","pages":"125–140","publisher":"Springer","series":"Lecture Notes in Computer Science","title":"Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics","volume":"3193","year":"2004","bibtex":"@inproceedings{Boehme2004-MB1,\n\tAddress = {Berlin Heidelberg},\n\tAuthor = {B{\\\"o}hme, Rainer and Westfeld, Andreas},\n\tBooktitle = {Computer Security (ESORICS)},\n\tDate-Modified = {2015-04-09 20:41:03 +0000},\n\tEditor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva},\n\tLocation = {Sophia Antipolis, France},\n\tPages = {125--140},\n\tPublisher = {Springer},\n\tSeries = {Lecture Notes in Computer Science},\n\tTitle = {Breaking {C}auchy Model-Based {JPEG} Steganography with First Order Statistics},\n\tVolume = {3193},\n\tYear = {2004}}\n\n","author_short":["Böhme, R.","Westfeld, A."],"editor_short":["Samarati, P.","Ryan, P. Y. A.","Gollmann, D.","Molva, R."],"key":"Boehme2004-MB1","id":"Boehme2004-MB1","bibbaseid":"bhme-westfeld-breakingcauchymodelbasedjpegsteganographywithfirstorderstatistics-2004","role":"author","urls":{},"downloads":0,"html":""},"bibtype":"inproceedings","biburl":"https://raw.githubusercontent.com/uibk-infsec/website/master/nanoc/bibtex/ours.bib?token=AAHY2PSSM2C4OY6O2ADKHXK6OIK42","creationDate":"2020-03-11T12:36:35.449Z","downloads":0,"keywords":[],"search_terms":["breaking","cauchy","model","based","jpeg","steganography","first","order","statistics","böhme","westfeld"],"title":"Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics","year":2004,"dataSources":["j7JRJgzJFwcssyBtp"]}