Efficient cover image selection based on spatial block analysis and DCT embedding
暂无分享,去创建一个
[1] Hedieh Sajedi,et al. Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[2] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[3] Tae-Sun Choi,et al. Scene-based watermarking method for copy protection using image complexity and motion vector amplitude , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[4] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[5] Phalguni Gupta,et al. Edge-based image steganography , 2014, EURASIP J. Inf. Secur..
[6] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[7] Fenlin Liu,et al. Selecting Cover for Image Steganography by Correlation Coefficient , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[8] Hedieh Sajedi,et al. Secure steganography based on embedding capacity , 2009, International Journal of Information Security.
[9] Kuo-Chen Wu,et al. Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.
[10] Zhengping Wu,et al. Highly secure image steganography algorithm using curvelet transform and DCT encryption , 2015, 2015 Long Island Systems, Applications and Technology.
[11] N. Perkins,et al. Optimal Cut-point and Its Corresponding Youden Index to Discriminate Individuals Using Pooled Blood Samples , 2005, Epidemiology.
[12] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[13] Jessica J. Fridrich,et al. Effect of saturated pixels on security of steganographic schemes for digital images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[14] Wei-Jen Wang,et al. A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization , 2013, J. Inf. Hiding Multim. Signal Process..
[15] Yang Ren-e. Cover selection for image steganography based on image characteristics , 2014 .
[16] Yongdong Zhang,et al. A Fast Uyghur Text Detector for Complex Background Images , 2018, IEEE Transactions on Multimedia.
[17] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[18] Fenlin Liu,et al. A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[19] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[20] C. Ern. Information hiding techniques for steganography and digital watermarking , 2018 .
[21] Qionghai Dai,et al. Cross-Modality Bridging and Knowledge Transferring for Image Understanding , 2019, IEEE Transactions on Multimedia.
[22] Der-Chyuan Lou,et al. A novel adaptive steganography based on local complexity and human vision sensitivity , 2010, J. Syst. Softw..
[23] Manish Mahajan,et al. Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques , 2012 .
[24] Weiwei Liu,et al. Adaptive steganography based on block complexity and matrix embedding , 2013, Multimedia Systems.
[25] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[26] Nasir D. Memon,et al. Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.
[27] Yongdong Zhang,et al. STAT: Spatial-Temporal Attention Mechanism for Video Captioning , 2020, IEEE Transactions on Multimedia.
[28] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[29] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[30] M. Jamzad,et al. A robust steganography algorithm based on texture similarity using Gabor filter , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[31] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[32] Jessica J. Fridrich,et al. Steganography with two JPEGs of the same scene , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[33] Xinpeng Zhang,et al. Secure Cover Selection for Steganography , 2019, IEEE Access.
[34] Mansour Jamzad,et al. Achieving Higher Stability in Watermarking According to Image Complexity , 2006 .
[35] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[36] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.