Skip to main content

Andrew D. Ker, publications

These documents are included only to ensure timely dissemination of the authors' research. All rights are retained by the author or other copyright holder, even though the works are offered for download here. By downloading one of these documents, you agree to adhere to the terms of the copyright holder, without whose explicit consent they may not be reposted.

My lecture notes are at the bottom of this page. You can find dissertations and theses from some of my students on the students' dissertations page.

[1]Andrew D. Ker, Hanno Nickau, and C.-H. Luke Ong. Innocent game models of untyped lambda-calculus.
Theoretical Computer Science, 272:247-292, 2002.
[2]Andrew D. Ker. A universal innocent game model for the bohm tree lambda theory.
In Computer Science Logic: Proceedings of the 8th Annual Conference of the EACSL, volume 1683 of LNCS, pages 405-419. Springer, 1999.
[3]Andrew D. Ker. Innocent game models of untyped lambda-calculus.
DPhil Thesis, Oxford University, 2000.
[4]Andrew D. Ker, Hanno Nickau, and C.-H. Luke Ong. Adapting game models for the böhm tree lambda-theory.
Theoretical Computer Science, 308:333-366, 2003.
[6]Andrew D. Ker. An idea for a blind watermarking scheme resistant to StirMark.
Programming Research Group Research Report RR-01-14. Oxford University Computing Laboratory, 2001.
[8]Andrew D. Ker. Quantitive evaluation of Pairs and RS steganalysis.
In Security, Steganography, and Watermarking of of Multimedia Contents VI, volume 5306 of Proc. SPIE, pages 83-97. SPIE, 2004.
Slides of conference presentation.
[9]Andrew D. Ker. Improved detection of LSB steganography in grayscale images.
In Proc. 6th Information Hiding Workshop, volume 3200 of LNCS, pages 97-115. Springer, 2004.
Slides of conference presentation.
[10]Andrew D. Ker. Steganalysis of LSB matching in grayscale images.
IEEE Signal Processing Letters, 12(6):441-444, 2005.
[11]Andrew D. Ker. Resampling and the detection of LSB matching in colour bitmaps.
In Security, Steganography, and Watermarking of of Multimedia Contents VII, volume 5681 of Proc. SPIE, pages 1-15. SPIE, 2005.
Slides of conference presentation.
[13]Andrew D. Ker. A general framework for the structural steganalysis of LSB replacement.
In Proc. 7th Information Hiding Workshop, volume 3727 of LNCS, pages 296-311. Springer, 2005.
Slides of conference presentation.
[14]Andrew D. Ker. Fourth-order structural steganalysis and analysis of cover assumptions.
In Security, Steganography, and Watermarking of of Multimedia Contents VIII, volume 6072 of Proc. SPIE, pages 25-38. SPIE, 2006.
Slides of conference presentation.
[15]Rainer Böhme and Andrew D. Ker. A two-factor error model for quantitative steganalysis.
In Security, Steganography, and Watermarking of of Multimedia Contents VIII, volume 6072 of Proc. SPIE, pages 59-74. SPIE, 2006.
Slides of conference presentation.
[18]Andrew D. Ker. Batch steganography and pooled steganalysis.
In Proc. 8th Information Hiding Workshop, volume 4437 of LNCS, pages 265-281. Springer, 2006.
Slides of conference presentation.
[20]Andrew D. Ker. Steganalysis of embedding in two least significant bits.
IEEE Transactions on Information Forensics and Security, 2(1):46-54, 2007.
[21]Andrew D. Ker. Batch steganography and the threshold game.
In Security, Steganography, and Watermarking of of Multimedia Contents IX, volume 6505 of Proc. SPIE, pages 0401-0413. SPIE, 2007.
Slides of conference presentation.
[22]Andrew D. Ker. Derivation of error distribution in least-squares steganalysis.
IEEE Transactions on Information Forensics and Security, 2(2):140-148, 2007.
[23]Andrew D. Ker. Optimally weighted least-squares steganalysis.
In Security, Steganography, and Watermarking of of Multimedia Contents IX, volume 6505 of Proc. SPIE, pages 0601-0616. SPIE, 2007.
Slides of conference presentation.
[24]Andrew D. Ker. A capacity result for batch steganography.
IEEE Signal Processing Letters, 14(8):525-528, 2007.
[25]Andrew D. Ker. Benchmarking steganalysis.
In Multimedia Forensics and Security, pages 266-290. IGI Global, 2009.
[26]Andrew D. Ker. A fusion of maximum likelihood and structural steganalysis.
In Proc. 9th Information Hiding Workshop, volume 4567 of LNCS, pages 204-219. Springer, 2007.
Slides of conference presentation.
[27]Andrew D. Ker. A Weighted Stego Image detector for sequential LSB replacement.
In Proc. 2007 International Workshop on Data Hiding for Information and Multimedia Security, part of IAS 2007, pages 453-456. IEEE Computer Society, 2007.
Slides of conference presentation.
[28]Andrew D. Ker. The ultimate steganalysis benchmark.
In Proc. 9th ACM Workshop on Multimedia and Security, pages 141-148. ACM, 2007.
Slides of conference presentation.
[29]Andrew D. Ker. Steganographic strategies for a square distortion function.
In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 0401-0413. SPIE, 2008.
Slides of conference presentation.
[30]Andrew D. Ker and Rainer Böhme. Revisiting weighted stego-image steganalysis.
In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proc. SPIE, pages 0501-0517. SPIE, 2008.
Slides of conference presentation.
[31]Andrew D. Ker. Perturbation hiding and the batch steganography problem.
In Proc. 10th Information Hiding Workshop, volume 5284 of LNCS, pages 45-59. Springer, 2008.
Slides of conference presentation.
[32]Andrew D. Ker, Tomas Pevný, Jan Kodovský, and Jessica Fridrich. The square root law of steganographic capacity.
In Proc. 10th ACM Workshop on Multimedia and Security, pages 107-116. ACM, 2008.
Slides of conference presentation.
[33]Andrew D. Ker. Locating steganographic payload via WS residuals.
In Proc. 10th ACM Workshop on Multimedia and Security, pages 27-32. ACM, 2008.
Slides of conference presentation.
[34]Andrew D. Ker. Locally square distortion and batch steganographic capacity.
International Journal of Digital Crime and Forensics, 1(1):29-44, 2009. Invited article for inaugural issue. Linked document is not the version in print.
[35]Andrew D. Ker and Ivans Lubenko. Feature reduction and payload location with WAM steganalysis.
In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0A01-0A13. SPIE, 2009.
Slides of conference presentation.
[36]Tomas Filler, Andrew D. Ker, and Jessica Fridrich. The square root law of steganographic capacity for Markov covers.
In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0801-0811. SPIE, 2009. Winner of the Digital Watermarking Alliance best paper award.
Slides of conference presentation.
[37]Tomas Pevný, Jessica Fridrich, and Andrew D. Ker. From blind to quantitative steganalysis.
In Media Forensics and Security XI, volume 7254 of Proc. SPIE, pages 0C01-0C14. SPIE, 2009.
Slides of conference presentation.
[38]Andrew D. Ker. Estimating steganographic Fisher Information in real images.
In Proc. 11th Information Hiding Workshop, volume 5806 of LNCS, pages 73-88. Springer, 2009.
Slides of conference presentation. Slides of rump session talk comparing this work with that by Filler & Fridrich.
[39]Andrew D. Ker. Estimating the information theoretic optimal stego noise.
In Proc. 8th International Workshop on Digital Watermarking, volume 5703 of LNCS, pages 184-198. Springer, 2009. Winner of the workshop best paper award.
Slides of conference presentation.
[40]Andrew D. Ker. The Square Root Law requires a linear key.
In Proc. 11th ACM Workshop on Multimedia and Security, pages 85-92. ACM, 2009.
Slides of conference presentation.
[41]Tomas Pevný, Jessica Fridrich, and Andrew D. Ker. From blind to quantitative steganalysis.
IEEE Transactions on Information Forensics and Security, 2(7):445-454, 2012.
[42]Andrew D. Ker. The Square Root Law in stegosystems with imperfect information.
In Proc. Information Hiding, 12th International Conference, volume 6387 of LNCS, pages 145-160. Springer, 2010.
Slides of conference presentation.
[43]Andrew D. Ker. The Square Root Law does not require a linear key.
In Proc. 12th ACM Workshop on Multimedia and Security, pages 213-223. ACM, 2010.
Slides of conference presentation.
[44]Andrew D. Ker. The uniform prior and zero information: A Technical Note.
Research Report CS-RR-10-06. Oxford University Department of Computer Science, 2010.
[45]Andrew D. Ker. A curiosity regarding steganographic capacity of pathologically nonstationary sources.
In Media Watermarking, Security, and Forensics XIII, volume 7880 of Proc. SPIE, pages 0E01-0E12. SPIE, 2011.
Slides of conference presentation.
[46]Ivans Lubenko and Andrew D. Ker. Steganalysis using logistic regression.
In Media Watermarking, Security, and Forensics XIII, volume 7880 of Proc. SPIE, pages 0K01-0K11. SPIE, 2011.
Slides of conference presentation.
[47]Ventsislav K. Chonev and Andrew D. Ker. Feature restoration and distortion metrics.
In Media Watermarking, Security, and Forensics XIII, volume 7880 of Proc. SPIE, pages 0G01-0G14. SPIE, 2011.
Slides of conference presentation.
[48]Andrew D. Ker and Tomas Pevný. A new paradigm for steganalysis via clustering.
In Media Watermarking, Security, and Forensics XIII, volume 7880 of Proc. SPIE, pages 0U01-0U13. SPIE, 2011.
Slides of conference presentation.
[49]Andrew D. Ker. Stability of the Mahalanobis Distance: A Technical Note.
Research Report CS-RR-10-20. Oxford University Department of Computer Science, 2010.
[50]Ivans Lubenko and Andrew D. Ker. Going from small to large data in steganalysis.
In Media Watermarking, Security, and Forensics XIV, volume 8303 of Proc. SPIE, pages 0M01-0M10. SPIE, 2012.
Slides of conference presentation.
[51]Andrew D. Ker and Tomas Pevný. Identifying a steganographer in realistic and heterogeneous data sets.
In Media Watermarking, Security, and Forensics XIV, volume 8303 of Proc. SPIE, pages 0N01-0N13. SPIE, 2012.
Slides of conference presentation.
[52]Ivan Lubenko and Andrew D. Ker. Steganalysis with mismatched covers: Do simple classifiers help.
In Proc. 13th ACM Workshop on Multimedia and Security, pages 11-18. ACM, 2012.
Slides of conference presentation.
[53]Andrew D. Ker and Tomas Pevný. Batch steganography in the real world.
In Proc. 13th ACM Workshop on Multimedia and Security, pages 1-10. ACM, 2012.
Slides of conference presentation.
[54]Andreas Neufeld and Andrew D. Ker. A study of embedding operations and locations for steganography in H.264 video.
In Media Watermarking, Security, and Forensics 2013, volume 8665 of Proc. SPIE, pages 0J01-0J14. SPIE, 2013.
Slides of conference presentation.
[55]Julie Makelberge and Andrew D. Ker. Exploring multitask learning for steganalysis.
In Media Watermarking, Security, and Forensics 2013, volume 8665 of Proc. SPIE, pages 0N01-0N10. SPIE, 2013.
Slides of conference presentation.
[56]Tomas Pevný and Andrew. D. Ker. The challenges of rich features in universal steganalysis.
In Media Watermarking, Security, and Forensics 2013, volume 8665 of Proc. SPIE, pages 0M01-0M15. SPIE, 2013.
Slides of conference presentation.
[57]Andrew D. Ker, Patrick Bas, Rainer Böhme, Remi Cogranne, Scott Craver, Moving steganography and steganalysis from the laboratory into the real world.
In Proc. 1st ACM Workshop on Information Hiding and Multimedia Security, pages 45-58. ACM, 2013.
Slides of conference presentation.
[58]Andrew D. Ker and Tomas Pevný. The steganographer is the outlier: Realistic large-scale steganalysis.
IEEE Transactions on Information Forensics and Security, 9(9):1424-1435, 2014.
[59]Andrew D. Ker and Tomas Pevný. A mishmash of methods for mitigating the model mismatch mess.
In Media Watermarking, Security, and Forensics 2014, volume 9028 of Proc. SPIE, pages 1601-1615. SPIE, 2014. Winner of the conference best paper award.
Slides of conference presentation.
[60]Alex Wilson, Phil Blunsom, and Andrew D. Ker. Linguistic steganography on Twitter: Hierarchical language modelling with manual interaction.
In Media Watermarking, Security, and Forensics 2014, volume 9028 of Proc. SPIE, pages 0201-0217. SPIE, 2014.
Slides of conference presentation.
[61]Andrew D. Ker. Implementing the projected spatial rich features on a GPU.
In Media Watermarking, Security, and Forensics 2014, volume 9028 of Proc. SPIE, pages 1801-1810. SPIE, 2014.
Slides of conference presentation.
[62]Tomas Pevný and Andrew D. Ker. Steganographic key leakage through payload metadata.
In Proc. 2nd ACM Workshop on Information Hiding and Multimedia Security, pages 109-114. ACM, 2014. Winner of the workshop best paper award.
Slides of conference presentation.
[64]James M. Whitaker and Andrew D. Ker. Steganalysis of overlapping images.
In Media Watermarking, Security, and Forensics 2015, volume 9409 of Proc. SPIE, pages 2601-2615. SPIE, 2015.
Slides of conference presentation.
[65]Tomas Pevný and Andrew. D. Ker. Towards dependable steganalysis.
In Media Watermarking, Security, and Forensics 2015, volume 9409 of Proc. SPIE, pages 1501-1514. SPIE, 2015.
Slides of conference presentation.
[66]Alex Wilson, Phil Blunsom, and Andrew Ker. Detection of steganographic techniques on twitter.
In Proc. 2015 Conference on Empirical Methods in Natural Language Processing, pages 2564-2569. Association for Computational Linguistics, 2015.
Poster.
[67]Tomas Pevný, Martin Kopp, Jakub Kroustek, and Andrew. D. Ker. Malicons: Detecting payload in favicons.
In Media Watermarking, Security, and Forensics 2016, number 8, pages 15:1-9. IS&T, 2016.
[68]Alex Wilson and Andrew. D. Ker. Avoiding detection on Twitter: Embedding strategies for linguistic steganography.
In Media Watermarking, Security, and Forensics 2016, number 8, pages 10:1-9. IS&T, 2016.
Slides of conference presentation.
[69]Andrew D. Ker, Tomas Pevný, and Patrick Bas. Rethinking optimal embedding.
In Proc. 4th ACM Workshop on Information Hiding and Multimedia Security, pages 93-102. ACM, 2016.
Slides of conference presentation.
[71]Andrew D. Ker. The square root law of steganography: Bringing theory closer to practice.
In Proc. 5th ACM Workshop on Information Hiding and Multimedia Security, pages 33-44. ACM, 2017. Winner of the workshop best paper award.
Slides of conference presentation.
[---]Andrew D. Ker. Lambda Calculus and Types.
Lecture notes (150pp), last updated Hilary Term 2009. See the course website for slides and up-to-date course material.
[---]Andrew D. Ker. Discrete Mathematics.
Lecture notes (125 pp), last updated Michaelmas Term 2010. See the course website for slides and up-to-date course material.
[---]Andrew D. Ker. Computer Security.
Lecture notes (144 pp), last updated Michaelmas Term 2014. See the course website for slides and up-to-date course material.
[---]Andrew D. Ker. Advanced Security: Information Hiding.
Lecture notes (104 pp), last updated Hilary Term 2016. See the course website for slides and up-to-date course material.

The numbers beside each publication refer to my own private numbering system for papers. Since some projects were merged or abandoned, the numbers are not consecutive. Red links indicate documents currently unavailable.

Out of fairness to the publishers, I do not include in-press articles, or conference papers in advance of the conference. Also, past experience shows that I will probably not update this page very often.