A Blind Steganalytic Scheme Based on DCT and Spatial Domain for JPEG Images
暂无分享,去创建一个
Xuezeng Pan | Zhuo Li | Kuijun Lu | Xian-Ting Zeng | Xian-Ting Zeng | Zhuo Li | Xuezeng Pan | Kuijun Lu
[1] Tao Zhang,et al. A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..
[2] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[3] Jessica Fridrich,et al. Determining the stego algorithm for JPEG images , 2006 .
[4] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[5] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[6] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[7] Tomás Pevný,et al. Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.
[8] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[9] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[10] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[11] Nasir D. Memon,et al. Steganalysis based on image quality metrics , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[12] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[13] Gérard Dreyfus,et al. Single-layer learning revisited: a stepwise procedure for building and training a neural network , 1989, NATO Neurocomputing.
[14] Tomás Pevný,et al. Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.
[15] William A. Pearlman,et al. Fast additive noise steganalysis , 2004, IS&T/SPIE Electronic Imaging.
[16] Sun Kang,et al. Variable characteristics based blind detection of hidden information , 2007 .
[17] J. Fridrich,et al. Attacking the OutGuess , 2002 .