Improved Audio Steganalytic Feature and Its Applications in Audio Forensics
暂无分享,去创建一个
Rui Yang | Jiwu Huang | Qi Yan | Haodong Li | Weiqi Luo | Jiwu Huang | Weiqi Luo | Haodong Li | Rui Yang | Qi Yan
[1] Ming Tang,et al. AMR Steganalysis Based on the Probability of Same Pulse Position , 2015, IEEE Transactions on Information Forensics and Security.
[2] Siwei Lyu,et al. Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.
[3] Gérard Dreyfus,et al. Single-layer learning revisited: a stepwise procedure for building and training a neural network , 1989, NATO Neurocomputing.
[4] Jiwu Huang,et al. Audio Postprocessing Detection Based on Amplitude Cooccurrence Vector Feature , 2016, IEEE Signal Processing Letters.
[5] Qingzhong Liu,et al. MP3 audio steganalysis , 2013, Inf. Sci..
[6] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[7] K. J. Ray Liu,et al. Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.
[8] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[9] Qingzhong Liu,et al. Derivative-based audio steganalysis , 2011, TOMCCAP.
[10] Qingzhong Liu,et al. Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[11] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[12] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[13] Jiwu Huang,et al. Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.
[14] Jana Dittmann,et al. Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.
[15] Hany Farid,et al. Detecting Steganographic Messages in Digital Images , 2001 .
[16] Rui Yang,et al. Identifying Compression History of Wave Audio and Its Applications , 2014, TOMCCAP.
[17] Yong Wang,et al. Identification of Electronic Disguised Voices , 2014, IEEE Transactions on Information Forensics and Security.
[18] Jiwu Huang,et al. A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.