Minimizing the embedding impact in steganography
暂无分享,去创建一个
[1] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[2] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[3] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[4] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[5] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[6] Martin J. Wainwright,et al. Lossy source encoding via message-passing and decimation over generalized codewords of LDGM codes , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[7] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[8] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[9] Nasir D. Memon,et al. Benchmarking steganographic and steganalysis techniques , 2005, IS&T/SPIE Electronic Imaging.
[10] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[11] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[12] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[13] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[14] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[15] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[16] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[17] Andrew D. Ker. A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.
[18] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[19] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[20] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[21] Gustavus J. Simmons,et al. A Secure Subliminal Channel (?) , 1985, CRYPTO.
[22] R. Crandall,et al. Some Notes on Steganography , 1999 .
[23] Mikhail J. Atallah,et al. A hierarchical protocol for increasing the stealthiness of steganographic methods , 2004, MM&Sec '04.
[24] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[25] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[26] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.
[27] Gérard D. Cohen,et al. Covering Codes , 2005, North-Holland mathematical library.
[28] Marten van Dijk,et al. Embedding Information in Grayscale Images , 2001 .
[29] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.