A formulation of conditional states on steganalysis approach
暂无分享,去创建一个
[1] Rajarathnam Chandramouli,et al. Current trends in steganalysis: a critical survey , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..
[2] Bin Zhang,et al. Audio Content-based Highlight Detection Using Adaptive Hidden Markov Model , 2006, Sixth International Conference on Intelligent Systems Design and Applications.
[3] Jessica J. Fridrich,et al. Stochastic approach to secret message length estimation in ±k embedding steganography , 2005, IS&T/SPIE Electronic Imaging.
[4] Patrick Bouthemy,et al. A HMM-Based Method for Recognizing Dynamic Video Contents from Trajectories , 2007, 2007 IEEE International Conference on Image Processing.
[5] Roshidi Din,et al. The capability of image in hiding a secret message , 2006 .
[6] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[7] Duong Van Hieu,et al. Image Preprocessing and Trajectory Feature Extraction based on Hidden Markov Models for Sign Language Recognition , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
[8] Nasir D. Memon,et al. A Distribution Detection Framework for Watermark Analysis , 2000 .
[9] Nasir D. Memon,et al. A distributed detection framework for Steganalysis , 2000, MULTIMEDIA '00.
[10] Rajarathnam Chandramouli,et al. Active steganalysis of sequential steganography , 2003, IS&T/SPIE Electronic Imaging.
[11] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[12] Xingming Sun,et al. An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[13] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[14] Azman Samsudin,et al. Computational intelligence in steganalysis environment , 2008 .
[15] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[16] Rajarathnam Chandramouli,et al. Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.
[17] Kun Yue,et al. An adaptive Markov model for text categorization , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.
[18] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[19] Maxim Sidorov,et al. Hidden Markov models and steganalysis , 2004, MM&Sec '04.
[20] Azman Samsudin,et al. A conceptual framework for natural language steganalysis , 2011 .
[21] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[22] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[23] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[24] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[25] Xing Li,et al. A novel steganography method based on modifying quantized spectrum values of MPEG/audio layer III , 2007 .
[26] Ramamurti Chandramouli,et al. Active steganalysis of spread spectrum image steganography , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[27] Stephen Clark,et al. Linguistic Steganography Using Automatically Generated Paraphrases , 2010, NAACL.
[28] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[29] Hassan Mathkour,et al. An improved steganalysis approach for breaking the F5 algorithm , 2008 .
[30] Azman Samsudin,et al. Intelligent steganalytic system: application on natural language environment , 2009 .
[31] Nan Jiang. A Novel Analysis Method of Information Hiding , 2008, 2008 Congress on Image and Signal Processing.