From f8b908398fba8486b55c67dc525a8cede4c7a5c1 Mon Sep 17 00:00:00 2001 From: The Open Journals editorial robot <89919391+editorialbot@users.noreply.github.com> Date: Tue, 16 Jan 2024 14:07:02 +0000 Subject: [PATCH] Creating 10.21105.joss.05982.crossref.xml --- joss.05982/10.21105.joss.05982.crossref.xml | 281 ++++++++++++++++++++ 1 file changed, 281 insertions(+) create mode 100644 joss.05982/10.21105.joss.05982.crossref.xml diff --git a/joss.05982/10.21105.joss.05982.crossref.xml b/joss.05982/10.21105.joss.05982.crossref.xml new file mode 100644 index 0000000000..2f3e55b512 --- /dev/null +++ b/joss.05982/10.21105.joss.05982.crossref.xml @@ -0,0 +1,281 @@ + + + + 20240116T140635-af8cb7de35106f9d0197ba7ea207bf1a38334723 + 20240116140635 + + JOSS Admin + admin@theoj.org + + The Open Journal + + + + + Journal of Open Source Software + JOSS + 2475-9066 + + 10.21105/joss + https://joss.theoj.org + + + + + 01 + 2024 + + + 9 + + 93 + + + + Aletheia: an open-source toolbox for +steganalysis + + + + Daniel + Lerch-Hostalot + https://orcid.org/0000-0003-2602-672X + + + David + Megías + https://orcid.org/0000-0002-0507-7731 + + + + 01 + 16 + 2024 + + + 5982 + + + 10.21105/joss.05982 + + + http://creativecommons.org/licenses/by/4.0/ + http://creativecommons.org/licenses/by/4.0/ + http://creativecommons.org/licenses/by/4.0/ + + + + Software archive + 10.5281/zenodo.10497963 + + + GitHub review issue + https://github.com/openjournals/joss-reviews/issues/5982 + + + + 10.21105/joss.05982 + https://joss.theoj.org/papers/10.21105/joss.05982 + + + https://joss.theoj.org/papers/10.21105/joss.05982.pdf + + + + + + Deep residual network for steganalysis of +digital images + Boroumand + IEEE Transactions on Information Forensics +and Security + 5 + 14 + 10.1109/TIFS.2018.2871749 + 2019 + Boroumand, M., Chen, M., & +Fridrich, J. (2019). Deep residual network for steganalysis of digital +images. IEEE Transactions on Information Forensics and Security, 14(5), +1181–1193. +https://doi.org/10.1109/TIFS.2018.2871749 + + + Statistically undetectable JPEG +steganography: Dead ends challenges, and opportunities + Fridrich + Proceedings of the 9th workshop on multimedia +& security + 10.1145/1288869.1288872 + 9781595938572 + 2007 + Fridrich, J., Pevný, T., & +Kodovský, J. (2007). Statistically undetectable JPEG steganography: Dead +ends challenges, and opportunities. Proceedings of the 9th Workshop on +Multimedia & Security, 3--14. +https://doi.org/10.1145/1288869.1288872 + + + Uniform embedding for efficient JPEG +steganography + Guo + IEEE Transactions on Information Forensics +and Security + 5 + 9 + 10.1109/TIFS.2014.2312817 + 2014 + Guo, L., Ni, J., & Shi, Y. Q. +(2014). Uniform embedding for efficient JPEG steganography. IEEE +Transactions on Information Forensics and Security, 9(5), 814–825. +https://doi.org/10.1109/TIFS.2014.2312817 + + + A graph–theoretic approach to +steganography + Hetzl + Communications and multimedia +security + 10.1007/11552055_12 + 978-3-540-31978-8 + 2005 + Hetzl, S., & Mutzel, P. (2005). A +graph–theoretic approach to steganography. In J. Dittmann, S. +Katzenbeisser, & A. Uhl (Eds.), Communications and multimedia +security (pp. 119–128). Springer Berlin Heidelberg. +https://doi.org/10.1007/11552055_12 + + + Universal distortion function for +steganography in an arbitrary domain + Holub + EURASIP Journal on Information +Security + 1 + 2014 + 10.1186/1687-417X-2014-1 + 2014 + Holub, V., Fridrich, J., & +Denemark, T. (2014). Universal distortion function for steganography in +an arbitrary domain. EURASIP Journal on Information Security, 2014(1), +1–13. https://doi.org/10.1186/1687-417X-2014-1 + + + Moving steganography and steganalysis from +the laboratory into the real world + Ker + Proceedings of the first ACM workshop on +information hiding and multimedia security + 10.1145/2482513.2482965 + 2013 + Ker, A. D., Bas, P., Böhme, R., +Cogranne, R., Craver, S., Filler, T., Fridrich, J., & Pevný, T. +(2013). Moving steganography and steganalysis from the laboratory into +the real world. Proceedings of the First ACM Workshop on Information +Hiding and Multimedia Security, 45–58. +https://doi.org/10.1145/2482513.2482965 + + + Detection of classifier inconsistencies in +image steganalysis + Lerch-Hostalot + Proceedings of the ACM workshop on +information hiding and multimedia security + 10.1145/3335203.3335738 + 9781450368216 + 2019 + Lerch-Hostalot, D., & Megı́as, D. +(2019). Detection of classifier inconsistencies in image steganalysis. +Proceedings of the ACM Workshop on Information Hiding and Multimedia +Security, 222--229. +https://doi.org/10.1145/3335203.3335738 + + + Subsequent embedding in targeted image +steganalysis: Theoretical framework and practical +applications + Megı́as + IEEE Transactions on Dependable and Secure +Computing + 2 + 20 + 10.1109/tdsc.2022.3154967 + 2023 + Megı́as, D., & Lerch-Hostalot, D. +(2023). Subsequent embedding in targeted image steganalysis: Theoretical +framework and practical applications. IEEE Transactions on Dependable +and Secure Computing, 20(2), 1403–1421. +https://doi.org/10.1109/tdsc.2022.3154967 + + + A new cost function for spatial image +steganography + Li + 2014 IEEE international conference on image +processing (ICIP) + 10.1109/icip.2014.7025854 + 2014 + Li, B., Wang, M., Huang, J., & +Li, X. (2014). A new cost function for spatial image steganography. 2014 +IEEE International Conference on Image Processing (ICIP), 4206–4210. +https://doi.org/10.1109/icip.2014.7025854 + + + Defending against statistical +steganalysis + Provos + 10th USENIX security symposium (USENIX +security 01) + 2001 + Provos, N. (2001). Defending against +statistical steganalysis. 10th USENIX Security Symposium (USENIX +Security 01), 1–13. +https://www.usenix.org/conference/10th-usenix-security-symposium/defending-against-statistical-steganalysis + + + An implementation of key-based digital signal +steganography + Sharp + Information hiding + 2137 + 10.1007/3-540-45496-9_2 + 2001 + Sharp, T. (2001). An implementation +of key-based digital signal steganography. In Information hiding (Vol. +2137, pp. 13–26). Springer. +https://doi.org/10.1007/3-540-45496-9_2 + + + ImageNet pre-trained CNNs for JPEG +steganalysis + Yousfi + 2020 IEEE international workshop on +information forensics and security (WIFS) + 10.1109/WIFS49906.2020.9360897 + 2020 + Yousfi, Y., Butora, J., Khvedchenya, +E., & Fridrich, J. (2020). ImageNet pre-trained CNNs for JPEG +steganalysis. 2020 IEEE International Workshop on Information Forensics +and Security (WIFS), 1–6. +https://doi.org/10.1109/WIFS49906.2020.9360897 + + + SteganoGAN: High capacity image steganography +with GANs + Zhang + 2019 + Zhang, K. A., Cuesta-Infante, A., Xu, +L., & Veeramachaneni, K. (2019). SteganoGAN: High capacity image +steganography with GANs. +https://arxiv.org/abs/1901.03892 + + + + + +