Entropy-Based Video Steganalysis of Motion Vectors
暂无分享,去创建一个
[1] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[2] Hong Zhao,et al. Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value , 2014, IEEE Transactions on Information Forensics and Security.
[3] Hong Zhang,et al. Motion vector-based video steganography with preserved local optimality , 2016, Multimedia Tools and Applications.
[4] Leonardo Acho,et al. Image Segmentation Based on Statistical Confidence Intervals , 2018, Entropy.
[5] Gary J. Sullivan,et al. Rate-distortion optimization for video compression , 1998, IEEE Signal Process. Mag..
[6] Jiwu Huang,et al. Adaptive Steganalysis Based on Embedding Probabilities of Pixels , 2016, IEEE Transactions on Information Forensics and Security.
[7] Gary J. Sullivan,et al. Rate-constrained coder control and comparison of video coding standards , 2003, IEEE Trans. Circuits Syst. Video Technol..
[8] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[9] Yuting Su,et al. A video steganalytic algorithm against motion-vector-based steganography , 2011, Signal Process..
[10] Hong Zhang,et al. A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality , 2017, IEEE Transactions on Information Forensics and Security.
[11] Jiwu Huang,et al. Improved steganalysis algorithm against motion vector based video steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[12] Kai-Kuang Ma,et al. Correction to "a new diamond search algorithm for fast block-matching motion estimation" , 2000, IEEE Trans. Image Process..
[13] Dengguo Feng,et al. Video Steganography with Perturbed Motion Estimation , 2011, Information Hiding.
[14] Ying Chen,et al. Content Adaptive Lagrange Multiplier Selection for Rate-Distortion Optimization in 3-D Wavelet-Based Scalable Video Coding , 2018, Entropy.
[15] KokSheik Wong,et al. An Overview of Information Hiding in H.264/AVC Compressed Video , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[16] Jerry D. Gibson,et al. Rate Distortion Functions and Rate Distortion Function Lower Bounds for Real-World Sources , 2017, Entropy.
[17] Sakir Sezer,et al. Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes , 2016, IEEE Transactions on Image Processing.
[18] Arijit Sur,et al. Detection of motion vector based video steganography , 2014, Multimedia Tools and Applications.
[19] Michael J. Gormish,et al. Computation-rate-distortion in transform coders for image compression , 1993, Electronic Imaging.
[20] Long-Wen Chang,et al. Data hiding for digital video with phase of motion vector , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[21] Shaohui Liu,et al. Steganalysis based on wavelet texture analysis and neural network , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[22] Lap-Pui Chau,et al. Hexagon-based search pattern for fast block motion estimation , 2002, IEEE Trans. Circuits Syst. Video Technol..
[23] Li Xiang,et al. Video steganography using motion vector and linear block codes , 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences.
[24] Antonio Ortega,et al. Rate-distortion methods for image and video compression , 1998, IEEE Signal Process. Mag..
[25] Patricia A. Lafferty,et al. Texture-based steganalysis: results for color images , 2004, SPIE Optics + Photonics.
[26] Mohammed Ghanbari,et al. Standard Codecs: Image Compression to Advanced Video Coding , 2003 .
[27] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[28] Xuansen He,et al. A Novel Steganographic Algorithm Based on the Motion Vector Phase , 2008, 2008 International Conference on Computer Science and Software Engineering.
[29] Lina Wang,et al. Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC , 2017, IH&MMSec.
[30] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[31] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[32] Hong Zhang,et al. Video Steganography Based on Optimized Motion Estimation Perturbation , 2015, IH&MMSec.
[33] Guangrong Ji,et al. A New Method of Steganalysis Based on Image Entropy , 2007, ICIC.
[34] H. A. Aly,et al. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error , 2011, IEEE Transactions on Information Forensics and Security.
[35] Kai-Kuang Ma,et al. A new diamond search algorithm for fast block-matching motion estimation , 2000, IEEE Trans. Image Process..
[36] T. R. Preetha,et al. Adaptive image steganography based on Syndrome-Trellis codes , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[37] Xianfeng Zhao,et al. Motion vector reversion-based steganalysis revisited , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[38] Thomas Wiegand,et al. Draft ITU-T recommendation and final draft international standard of joint video specification , 2003 .