Content-Adaptive Residual for Steganalysis
暂无分享,去创建一个
Wei Lu | Bingwen Feng | Wei Sun | Xu Lin | Wei Sun | Wei Lu | Bingwen Feng | Xu Lin
[1] Ingemar J. Cox,et al. Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[2] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[3] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[4] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[5] Jessica J. Fridrich,et al. Optimizing pixel predictors for steganalysis , 2012, Other Conferences.
[6] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[7] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[8] Jessica J. Fridrich,et al. Steganalysis of Content-Adaptive Steganography in Spatial Domain , 2011, Information Hiding.
[9] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[10] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[11] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[12] Jessica J. Fridrich,et al. Minimizing embedding impact in steganography using trellis-coded quantization , 2010, Electronic Imaging.
[13] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[14] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[15] Vojtech Holub,et al. On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.
[16] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[17] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.