Andrew D. Ker

Orcid: 0000-0002-1154-3305

According to our database1, Andrew D. Ker authored at least 65 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Non-Zero-Sum Game of Steganography in Heterogeneous Environments.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Capacity Laws for Steganography in a Crowd.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

2020
The Syndrome-Trellis Sampler for Generative Steganography.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Simulating Suboptimal Steganographic Embedding.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

2019
Reducing coding loss with irregular syndrome trellis codes.
Proceedings of the Media Watermarking, 2019

2018
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Exploring Non-Additive Distortion in Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

On the Relationship Between Embedding Costs and Steganographic Capacity.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
The Square Root Law of Steganography: Bringing Theory Closer to Practice.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

2016
Avoiding detection on twitter: embedding strategies for linguistic steganography.
Proceedings of the Media Watermarking, 2016

Malicons: Detecting Payload in Favicons.
Proceedings of the Media Watermarking, 2016

Rethinking Optimal Embedding.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

2015
Steganalysis of overlapping images.
Proceedings of the Media Watermarking, 2015

Towards dependable steganalysis.
Proceedings of the Media Watermarking, 2015

Detection of Steganographic Techniques on Twitter.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

2014
The Steganographer is the Outlier: Realistic Large-Scale Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2014

Linguistic steganography on Twitter: hierarchical language modeling with manual interaction.
Proceedings of the Media Watermarking, 2014

A mishmash of methods for mitigating the model mismatch mess.
Proceedings of the Media Watermarking, 2014

Implementing the projected spatial rich features on a GPU.
Proceedings of the Media Watermarking, 2014

Steganographic key leakage through payload metadata.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

2013
The challenges of rich features in universal steganalysis.
Proceedings of the Media Watermarking, 2013

A study of embedding operations and locations for steganography in H.264 video.
Proceedings of the Media Watermarking, 2013

Exploring multitask learning for steganalysis.
Proceedings of the Media Watermarking, 2013

Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
From Blind to Quantitative Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2012

Steganalysis with mismatched covers: do simple classifiers help?
Proceedings of the Multimedia and Security Workshop, 2012

Batch steganography in the real world.
Proceedings of the Multimedia and Security Workshop, 2012

Going from small to large data in steganalysis.
Proceedings of the Media Watermarking, 2012

Identifying a steganographer in realistic and heterogeneous data sets.
Proceedings of the Media Watermarking, 2012

2011
Steganalysis using logistic regression.
Proceedings of the Media Forensics and Security III, 2011

A new paradigm for steganalysis via clustering.
Proceedings of the Media Forensics and Security III, 2011

A curiosity regarding steganographic capacity of pathologically nonstationary sources.
Proceedings of the Media Forensics and Security III, 2011

Feature restoration and distortion metrics.
Proceedings of the Media Forensics and Security III, 2011

2010
The square root law does not require a linear key.
Proceedings of the Multimedia and Security Workshop, 2010

The Square Root Law in Stegosystems with Imperfect Information.
Proceedings of the Information Hiding - 12th International Conference, 2010

2009
Locally Square Distortion and Batch Steganographic Capacity.
Int. J. Digit. Crime Forensics, 2009

The square root law requires a linear key.
Proceedings of the Multimedia and Security Workshop, 2009

Feature reduction and payload location with WAM steganalysis.
Proceedings of the Media Forensics and Security I, 2009

The square root law of steganographic capacity for Markov covers.
Proceedings of the Media Forensics and Security I, 2009

Estimating the Information Theoretic Optimal Stego Noise.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Estimating Steganographic Fisher Information in Real Images.
Proceedings of the Information Hiding, 11th International Workshop, 2009

2008
Revisiting weighted stego-image steganalysis.
Proceedings of the Security, 2008

Steganographic strategies for a square distortion function.
Proceedings of the Security, 2008

The square root law of steganographic capacity.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Locating steganographic payload via ws residuals.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Perturbation Hiding and the Batch Steganography Problem.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
Derivation of Error Distribution in Least Squares Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2007

Steganalysis of Embedding in Two Least-Significant Bits.
IEEE Trans. Inf. Forensics Secur., 2007

A Capacity Result for Batch Steganography.
IEEE Signal Process. Lett., 2007

Optimally weighted least-squares steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Batch steganography and the threshold game.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

The ultimate steganalysis benchmark?
Proceedings of the 9th workshop on Multimedia & Security, 2007

A Fusion of Maximum Likelihood and Structural Steganalysis.
Proceedings of the Information Hiding, 9th International Workshop, 2007

A Weighted Stego Image Detector for Sequential LSB Replacement.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Fourth-order structural steganalysis and analysis of cover assumptions.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A two-factor error model for quantitative steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Batch Steganography and Pooled Steganalysis.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Steganalysis of LSB matching in grayscale images.
IEEE Signal Process. Lett., 2005

Resampling and the detection of LSB matching in color bitmaps.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A General Framework for Structural Steganalysis of LSB Replacement.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2004
Quantitative evaluation of pairs and RS steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Improved Detection of LSB Steganography in Grayscale Images.
Proceedings of the Information Hiding, 6th International Workshop, 2004

2003
Adapting innocent game models for the Böhm treelambda -theory.
Theor. Comput. Sci., 2003

2002
Innocent game models of untyped lambda-calculus.
Theor. Comput. Sci., 2002

1999
A Universal Innocent Game Model for the Böhm Tree Lambda Theory.
Proceedings of the Computer Science Logic, 13th International Workshop, 1999


  Loading...