default search action
Andrew D. Ker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j10]Quentin Giboulot, Tomás Pevný, Andrew D. Ker:
The Non-Zero-Sum Game of Steganography in Heterogeneous Environments. IEEE Trans. Inf. Forensics Secur. 18: 4436-4448 (2023) - 2014
- [j9]Andrew D. Ker, Tomás Pevný:
The Steganographer is the Outlier: Realistic Large-Scale Steganalysis. IEEE Trans. Inf. Forensics Secur. 9(9): 1424-1435 (2014) - 2012
- [j8]Tomás Pevný, Jessica J. Fridrich, Andrew D. Ker:
From Blind to Quantitative Steganalysis. IEEE Trans. Inf. Forensics Secur. 7(2): 445-454 (2012) - 2009
- [j7]Andrew D. Ker:
Locally Square Distortion and Batch Steganographic Capacity. Int. J. Digit. Crime Forensics 1(1): 29-44 (2009) - 2007
- [j6]Andrew D. Ker:
A Capacity Result for Batch Steganography. IEEE Signal Process. Lett. 14(8): 525-528 (2007) - [j5]Andrew D. Ker:
Steganalysis of Embedding in Two Least-Significant Bits. IEEE Trans. Inf. Forensics Secur. 2(1): 46-54 (2007) - [j4]Andrew D. Ker:
Derivation of Error Distribution in Least Squares Steganalysis. IEEE Trans. Inf. Forensics Secur. 2(2): 140-148 (2007) - 2005
- [j3]Andrew D. Ker:
Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12(6): 441-444 (2005) - 2003
- [j2]Andrew D. Ker, Hanno Nickau, C.-H. Luke Ong:
Adapting innocent game models for the Böhm treelambda -theory. Theor. Comput. Sci. 308(1-3): 333-366 (2003) - 2002
- [j1]Andrew D. Ker, Hanno Nickau, C.-H. Luke Ong:
Innocent game models of untyped lambda-calculus. Theor. Comput. Sci. 272(1-2): 247-292 (2002)
Conference and Workshop Papers
- 2022
- [c56]Andrew D. Ker:
Capacity Laws for Steganography in a Crowd. IH&MMSec 2022: 147-156 - 2020
- [c55]Christy Kin-Cleaves, Andrew D. Ker:
Simulating Suboptimal Steganographic Embedding. IH&MMSec 2020: 121-126 - [c54]Tamio-Vesa Nakajima, Andrew D. Ker:
The Syndrome-Trellis Sampler for Generative Steganography. WIFS 2020: 1-6 - 2019
- [c53]Christy Kin-Cleaves, Andrew D. Ker:
Reducing coding loss with irregular syndrome trellis codes. Media Watermarking, Security, and Forensics 2019 - 2018
- [c52]Tomás Pevný, Andrew D. Ker:
Exploring Non-Additive Distortion in Steganography. IH&MMSec 2018: 109-114 - [c51]Andrew D. Ker:
On the Relationship Between Embedding Costs and Steganographic Capacity. IH&MMSec 2018: 115-120 - [c50]Christy Kin-Cleaves, Andrew D. Ker:
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes. WIFS 2018: 1-7 - 2017
- [c49]Andrew D. Ker:
The Square Root Law of Steganography: Bringing Theory Closer to Practice. IH&MMSec 2017: 33-44 - 2016
- [c48]Andrew D. Ker, Tomás Pevný, Patrick Bas:
Rethinking Optimal Embedding. IH&MMSec 2016: 93-102 - [c47]Tomás Pevný, Martin Kopp, Jakub Kroustek, Andrew D. Ker:
Malicons: Detecting Payload in Favicons. Media Watermarking, Security, and Forensics 2016: 1-9 - [c46]Alex Wilson, Andrew D. Ker:
Avoiding detection on twitter: embedding strategies for linguistic steganography. Media Watermarking, Security, and Forensics 2016: 1-9 - 2015
- [c45]Alex Wilson, Phil Blunsom, Andrew D. Ker:
Detection of Steganographic Techniques on Twitter. EMNLP 2015: 2564-2569 - [c44]Tomás Pevný, Andrew D. Ker:
Towards dependable steganalysis. Media Watermarking, Security, and Forensics 2015: 94090I - [c43]James M. Whitaker, Andrew D. Ker:
Steganalysis of overlapping images. Media Watermarking, Security, and Forensics 2015: 94090X - 2014
- [c42]Tomás Pevný, Andrew D. Ker:
Steganographic key leakage through payload metadata. IH&MMSec 2014: 109-114 - [c41]Andrew D. Ker:
Implementing the projected spatial rich features on a GPU. Media Watermarking, Security, and Forensics 2014: 90280K - [c40]Andrew D. Ker, Tomás Pevný:
A mishmash of methods for mitigating the model mismatch mess. Media Watermarking, Security, and Forensics 2014: 90280I - [c39]Alex Wilson, Phil Blunsom, Andrew D. Ker:
Linguistic steganography on Twitter: hierarchical language modeling with manual interaction. Media Watermarking, Security, and Forensics 2014: 902803 - 2013
- [c38]Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomás Filler, Jessica J. Fridrich, Tomás Pevný:
Moving steganography and steganalysis from the laboratory into the real world. IH&MMSec 2013: 45-58 - [c37]Julie Makelberge, Andrew D. Ker:
Exploring multitask learning for steganalysis. Media Watermarking, Security, and Forensics 2013: 86650N - [c36]Andreas Neufeld, Andrew D. Ker:
A study of embedding operations and locations for steganography in H.264 video. Media Watermarking, Security, and Forensics 2013: 86650J - [c35]Tomás Pevný, Andrew D. Ker:
The challenges of rich features in universal steganalysis. Media Watermarking, Security, and Forensics 2013: 86650M - 2012
- [c34]Andrew D. Ker, Tomás Pevný:
Identifying a steganographer in realistic and heterogeneous data sets. Media Watermarking, Security, and Forensics 2012: 83030N - [c33]Ivans Lubenko, Andrew D. Ker:
Going from small to large data in steganalysis. Media Watermarking, Security, and Forensics 2012: 83030M - [c32]Andrew David Ker, Tomás Pevný:
Batch steganography in the real world. MM&Sec 2012: 1-10 - [c31]Ivans Lubenko, Andrew D. Ker:
Steganalysis with mismatched covers: do simple classifiers help? MM&Sec 2012: 11-18 - 2011
- [c30]Ventsislav Chonev, Andrew D. Ker:
Feature restoration and distortion metrics. Media Forensics and Security 2011: 78800G - [c29]Andrew D. Ker:
A curiosity regarding steganographic capacity of pathologically nonstationary sources. Media Forensics and Security 2011: 78800E - [c28]Andrew D. Ker, Tomás Pevný:
A new paradigm for steganalysis via clustering. Media Forensics and Security 2011: 78800U - [c27]Ivans Lubenko, Andrew D. Ker:
Steganalysis using logistic regression. Media Forensics and Security 2011: 78800K - 2010
- [c26]Andrew D. Ker:
The Square Root Law in Stegosystems with Imperfect Information. Information Hiding 2010: 145-160 - [c25]Andrew D. Ker:
The square root law does not require a linear key. MM&Sec 2010: 213-224 - 2009
- [c24]Andrew D. Ker:
Estimating Steganographic Fisher Information in Real Images. Information Hiding 2009: 73-88 - [c23]Andrew D. Ker:
Estimating the Information Theoretic Optimal Stego Noise. IWDW 2009: 184-198 - [c22]Andrew D. Ker, Ivans Lubenko:
Feature reduction and payload location with WAM steganalysis. Media Forensics and Security 2009: 72540A - [c21]Tomás Pevný, Jessica J. Fridrich, Andrew D. Ker:
From blind to quantitative steganalysis. Media Forensics and Security 2009: 72540C - [c20]Tomás Filler, Andrew D. Ker, Jessica J. Fridrich:
The square root law of steganographic capacity for Markov covers. Media Forensics and Security 2009: 725408 - [c19]Andrew D. Ker:
The square root law requires a linear key. MM&Sec 2009: 85-92 - 2008
- [c18]Andrew D. Ker:
Perturbation Hiding and the Batch Steganography Problem. Information Hiding 2008: 45-59 - [c17]Andrew D. Ker:
Locating steganographic payload via ws residuals. MM&Sec 2008: 27-32 - [c16]Andrew D. Ker, Tomás Pevný, Jan Kodovský, Jessica J. Fridrich:
The square root law of steganographic capacity. MM&Sec 2008: 107-116 - [c15]Andrew D. Ker:
Steganographic strategies for a square distortion function. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681904 - [c14]Andrew D. Ker, Rainer Böhme:
Revisiting weighted stego-image steganalysis. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681905 - 2007
- [c13]Andrew D. Ker:
A Weighted Stego Image Detector for Sequential LSB Replacement. IAS 2007: 453-456 - [c12]Andrew D. Ker:
A Fusion of Maximum Likelihood and Structural Steganalysis. Information Hiding 2007: 204-219 - [c11]Andrew D. Ker:
The ultimate steganalysis benchmark? MM&Sec 2007: 141-148 - [c10]Andrew D. Ker:
Batch steganography and the threshold game. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650504 - [c9]Andrew D. Ker:
Optimally weighted least-squares steganalysis. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650506 - 2006
- [c8]Andrew D. Ker:
Batch Steganography and Pooled Steganalysis. Information Hiding 2006: 265-281 - [c7]Andrew D. Ker:
Fourth-order structural steganalysis and analysis of cover assumptions. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607203 - [c6]Rainer Böhme, Andrew D. Ker:
A two-factor error model for quantitative steganalysis. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607206 - 2005
- [c5]Andrew D. Ker:
A General Framework for Structural Steganalysis of LSB Replacement. Information Hiding 2005: 296-311 - [c4]Andrew D. Ker:
Resampling and the detection of LSB matching in color bitmaps. Security, Steganography, and Watermarking of Multimedia Contents 2005: 1-15 - 2004
- [c3]Andrew D. Ker:
Improved Detection of LSB Steganography in Grayscale Images. Information Hiding 2004: 97-115 - [c2]Andrew D. Ker:
Quantitative evaluation of pairs and RS steganalysis. Security, Steganography, and Watermarking of Multimedia Contents 2004: 83-97 - 1999
- [c1]Andrew D. Ker, Hanno Nickau, C.-H. Luke Ong:
A Universal Innocent Game Model for the Böhm Tree Lambda Theory. CSL 1999: 405-419
Editorship
- 2011
- [e2]Tomás Filler, Tomás Pevný, Scott Craver, Andrew D. Ker:
Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6958, Springer 2011, ISBN 978-3-642-24177-2 [contents] - 2008
- [e1]Andrew D. Ker, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008. ACM 2008, ISBN 978-1-60558-058-6 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint