Fuzzy Localization of Steganographic Flipped Bits via Modification Map
暂无分享,去创建一个
Ning Zheng | Ming Xu | Tong Qiao | Quanqi Liu
[1] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[2] Mi Wen,et al. Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.
[3] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[4] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[5] Jiwu Huang,et al. Adaptive Steganalysis Based on Embedding Probabilities of Pixels , 2016, IEEE Transactions on Information Forensics and Security.
[6] Jessica J. Fridrich,et al. Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.
[7] Jiwu Huang,et al. Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.
[8] Florent Retraint,et al. Statistical detection of Jsteg steganography using hypothesis testing theory , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[9] Andrew D. Ker,et al. Feature reduction and payload location with WAM steganalysis , 2009, Electronic Imaging.
[10] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[11] Florent Retraint,et al. Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters , 2014, IH&MMSec '14.
[12] Florent Retraint,et al. Steganalysis of JSteg algorithm using hypothesis testing theory , 2015, EURASIP J. Inf. Secur..
[13] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[14] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[15] Xiangyang Luo,et al. Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[16] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[17] Shahid Mumtaz,et al. ECOSECURITY: Tackling Challenges Related to Data Exchange and Security: An Edge-Computing-Enabled Secure and Efficient Data Exchange Architecture for the Energy Internet , 2019, IEEE Consumer Electronics Magazine.
[18] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[19] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[20] Zhenxing Qian,et al. On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.
[21] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[22] Andrew D. Ker. Locating steganographic payload via ws residuals , 2008, MM&Sec '08.
[23] Yue Zhang,et al. Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection , 2019, IEEE Access.
[24] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[25] Xiaojiang Du,et al. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.