Synchronizing Embedding Changes in Side-Informed Steganography
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Effect of saturated pixels on security of steganographic schemes for digital images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[2] Hyoung Joong Kim,et al. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.
[3] Patrick Bas,et al. Steganography via cover-source switching , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[4] Jiwu Huang,et al. New Channel Selection Rule for JPEG Steganography , 2012, IEEE Transactions on Information Forensics and Security.
[5] Patrick Bas,et al. An embedding mechanism for natural steganography after down-sampling , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Vojtöch Holub,et al. CONTENT ADAPTIVE STEGANOGRAPHY - DESIGN AND DETECTION , 2014 .
[7] Jessica J. Fridrich,et al. Side-informed steganography with additive distortion , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[8] Tomás Pevný,et al. Exploring Non-Additive Distortion in Steganography , 2018, IH&MMSec.
[9] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[10] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[11] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[12] Jessica J. Fridrich,et al. Steganography with two JPEGs of the same scene , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[13] Jiangqun Ni,et al. Model-based image steganography using asymmetric embedding scheme , 2018, J. Electronic Imaging.
[14] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[15] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[16] Patrick Bas,et al. A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain , 2019, Media Watermarking, Security, and Forensics.
[17] Andrew D. Ker. A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.
[18] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[19] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[20] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Jessica J. Fridrich,et al. On the role of side information in steganography in empirical covers , 2013, Electronic Imaging.
[22] Marc Chaumont,et al. Yedroudj-Net: An Efficient CNN for Spatial Steganalysis , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[24] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[25] Jessica J. Fridrich,et al. Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.
[26] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[27] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[28] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[29] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[30] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[31] Marc Chaumont,et al. How to augment a small learning set for improving the performances of a CNN-based steganalyzer? , 2018, Media Watermarking, Security, and Forensics.
[32] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[33] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[34] Patrick Bas,et al. The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis , 2019, IH&MMSec.
[35] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[36] Jessica J. Fridrich,et al. Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.
[37] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[38] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[39] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[40] Elke Franz,et al. Pre-processing for Adding Noise Steganography , 2005, Information Hiding.
[41] Elke Franz. Embedding considering dependencies between pixels , 2008, Electronic Imaging.