F5—a steganographic algorithm A Westfeld Information hiding, 289-302, 2001 | 1928* | 2001 |
Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools-and some lessons learned A Westfeld, A Pfitzmann International workshop on information hiding, 61-76, 1999 | 1803 | 1999 |
Modeling the security of steganographic systems J Zöllner, H Federrath, H Klimant, A Pfitzmann, R Piotraschke, A Westfeld, ... Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998 | 348 | 1998 |
Detecting low embedding rates A Westfeld International Workshop on Information Hiding, 324-339, 2002 | 259 | 2002 |
Exploiting preserved statistics for steganalysis R Böhme, A Westfeld International Workshop on Information Hiding, 82-96, 2004 | 235 | 2004 |
Breaking Cauchy model-based JPEG steganography with first order statistics R Böhme, A Westfeld Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004 | 120 | 2004 |
Steganography in a video conferencing system A Westfeld, G Wolf International Workshop on Information Hiding, 32-47, 1998 | 83 | 1998 |
Statistical characterisation of MP3 encoders for steganalysis R Böhme, A Westfeld Proceedings of the 2004 workshop on Multimedia and security, 25-34, 2004 | 53 | 2004 |
Generalised category attack—improving histogram-based attack on JPEG LSB embedding K Lee, A Westfeld, S Lee Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France …, 2007 | 43 | 2007 |
Category attack for LSB steganalysis of JPEG images K Lee, A Westfeld, S Lee Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island …, 2006 | 35 | 2006 |
Weaknesses of MB2 C Ullerich, A Westfeld International Workshop on Digital Watermarking, 127-142, 2007 | 31 | 2007 |
Two key estimation techniques for the broken arrows watermarking scheme P Bas, A Westfeld Proceedings of the 11th ACM workshop on Multimedia and security, 1-8, 2009 | 26 | 2009 |
Generic Adoption of Spatial Steganalysis to Transformed Domain. A Westfeld Information Hiding 5284, 161-177, 2008 | 22 | 2008 |
A regression-based restoration technique for automated watermark removal A Westfeld Proceedings of the 10th ACM workshop on Multimedia and security, 215-220, 2008 | 21 | 2008 |
Space filling curves in steganalysis A Westfeld Security, Steganography, and Watermarking of Multimedia Contents VII 5681, 28-37, 2005 | 21 | 2005 |
Lessons from the BOWS contest A Westfeld Proceedings of the 8th Workshop on Multimedia and Security, 208-213, 2006 | 20 | 2006 |
A Java-based distributed platform for multilateral security A Pfitzmann, A Schill, A Westfeld, G Wicke, G Wolf, J Zöllner Trends in Distributed Systems for Electronic Commerce: International IFIP/GI …, 1998 | 20 | 1998 |
Steganography for radio amateurs—A DSSS based approach for slow scan television A Westfeld International Workshop on Information Hiding, 201-215, 2006 | 16 | 2006 |
Mehrseitige Sicherheit in offenen Netzen A Pfitzmann, A Schill, A Westfeld, G Wolf Grundlagen, praktische Umsetzung und in Java implementierte Demonstrations …, 2000 | 15 | 2000 |
Feature-based encoder classification of compressed audio streams R Böhme, A Westfeld Multimedia Systems 11, 108-120, 2005 | 13 | 2005 |