Rich Models for Steganalysis of Digital Images
暂无分享,去创建一个
[1] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[2] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[3] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[4] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[5] Jessica J. Fridrich,et al. Breaking HUGO - The Process Discovery , 2011, Information Hiding.
[6] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[7] Jan Kodovský. On dangers of cross-validation in steganalysis On dangers of cross-validation in steganalysis , 2011 .
[8] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[9] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[10] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[11] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[12] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[13] Jessica J. Fridrich,et al. Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.
[14] Andrew D. Ker,et al. Feature restoration and distortion metrics , 2011, Electronic Imaging.
[15] Jessica J. Fridrich,et al. Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.
[16] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[17] Masoud Nikravesh,et al. Feature Extraction - Foundations and Applications , 2006, Feature Extraction.
[18] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[19] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[20] B. S. Manjunath,et al. Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.
[21] Tamara G. Kolda,et al. Optimization by Direct Search: New Perspectives on Some Classical and Modern Methods , 2003, SIAM Rev..
[22] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[23] Jessica J. Fridrich,et al. Steganalysis of Content-Adaptive Steganography in Spatial Domain , 2011, Information Hiding.
[24] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[25] Jessica J. Fridrich,et al. On completeness of feature spaces in blind steganalysis , 2008, MM&Sec '08.
[26] Ingemar J. Cox,et al. Detection of ±1 LSB steganography based on the amplitude of histogram local extrema , 2008, 2008 15th IEEE International Conference on Image Processing.
[27] Fatih Kurugollu,et al. A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO) , 2011, Information Hiding.
[28] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[29] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[30] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[31] Wei Su,et al. A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.
[32] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[33] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[34] Vojtech Holub,et al. On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.
[35] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.