Steganography With Multiple JPEG Images of the Same Scene
暂无分享,去创建一个
[1] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[2] Karen O. Egiazarian,et al. Practical Poissonian-Gaussian Noise Modeling and Fitting for Single-Image Raw-Data , 2008, IEEE Transactions on Image Processing.
[3] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[4] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[5] Elke Franz. Embedding considering dependencies between pixels , 2008, Electronic Imaging.
[6] Nasir D. Memon,et al. PSTEG: steganographic embedding through patching [image steganography] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[7] Tomás Pevný,et al. Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[8] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[9] K A Birney,et al. On the modeling of DCT and subband image data for compression , 1995, IEEE Trans. Image Process..
[10] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[11] Florent Retraint,et al. Camera Model Identification Based on the Heteroscedastic Noise Model , 2014, IEEE Transactions on Image Processing.
[12] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[13] Andrew D. Ker. A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.
[14] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[15] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[16] Jessica J. Fridrich,et al. Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.
[17] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[18] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[19] Elke Franz,et al. Pre-processing for Adding Noise Steganography , 2005, Information Hiding.
[20] Jessica J. Fridrich,et al. Side-informed steganography with additive distortion , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Jessica J. Fridrich,et al. On the role of side information in steganography in empirical covers , 2013, Electronic Imaging.
[22] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[23] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[24] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[25] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[26] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[27] Hyoung Joong Kim,et al. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.
[28] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[29] Jiwu Huang,et al. New Channel Selection Rule for JPEG Steganography , 2012, IEEE Transactions on Information Forensics and Security.