A new feature extraction scheme in wavelet transform for stego image classification
暂无分享,去创建一个
[1] Hs Sudhira,et al. An approach to regional planning in India , 2012, Int. J. Syst. Syst. Eng..
[2] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[3] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[4] John L. Casti,et al. Bell curves and monkey languages: When do empirical relations become a law of nature? , 1995, Complex.
[5] L. Egghe,et al. The power of power laws and an interpretation of Lotkaian informetric systems as self-similar fractals , 2005, J. Assoc. Inf. Sci. Technol..
[6] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[7] Qingzhong Liu,et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..
[8] Lucien Benguigui,et al. Beyond the power law - a new approach to analyze city size distributions , 2007, Comput. Environ. Urban Syst..
[9] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[10] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[11] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[12] Wen-hua Zhang,et al. Effective Steganalysis of YASS Based on Statistical Moments of Wavelet Characteristic Function and Markov Process , 2012 .
[13] Deepa D. Shankar,et al. Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics , 2010, 2010 International Conference on Advances in Computer Engineering.
[14] Xinpeng Zhang,et al. JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier , 2013, IEEE Signal Processing Letters.
[15] Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.
[16] N. Vincent,et al. Compressed image quality and Zipf law , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.
[17] Guoming Chen,et al. Particle Swarm Optimization Feature Selection for Image Steganalysis , 2012, 2012 Fourth International Conference on Digital Home.
[18] George Kingsley Zipf,et al. Human behavior and the principle of least effort , 1949 .
[19] Laimeche Lakhdar,et al. A Novel Technique of Steganalysis in Uncompressed Image through Zipf's Law , 2012 .
[20] Stefanos Gritzalis,et al. On the Typical Statistic Features for Image Blind Steganalysis , 2011, IEEE Journal on Selected Areas in Communications.
[21] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[22] Jerome M. Shapiro,et al. Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..
[23] Jessica J. Fridrich,et al. JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts , 2012, Information Hiding.
[24] Gerard Leng,et al. On the power law relationship of the critical transmitting range and the number of nodes of ad hoc networks , 2010, Int. J. Sens. Networks.
[25] G. J. Burton,et al. Color and spatial structure in natural scenes. , 1987, Applied optics.
[26] Nicole Vincent,et al. A method for detecting artificial objects in natural environments , 2002, Object recognition supported by user interaction for service robots.
[27] Mostafa Mehdipour-Ghazi,et al. Universal Steganalysis Based on Local Prediction Error in Wavelet Domain , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[28] Laimeche Lakhdar,et al. The power laws: Zipf and inverse Zipf for automated segmentation and classification of masses within mammograms , 2015, Evol. Syst..
[29] Chengyun Yang,et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[30] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[31] Rajesh Kumar Tiwari,et al. Secure image transmission using steganographic methodologies , 2010, Int. J. Multim. Intell. Secur..
[32] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[33] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[34] N. Vincent,et al. A medical acoustic signal analysis method based on Zipf law , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).
[35] Markus G. Kuhn,et al. Information hiding-A survey : Identification and protection of multimedia information , 1999 .
[36] A. C. Rencher. Methods of multivariate analysis , 1995 .
[37] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[38] Nicole Vincent,et al. Use of power law models in detecting region of interest , 2007, Pattern Recognit..
[39] Mansour Sheikhan,et al. Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.
[40] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[41] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[42] Hong-Bin Zhang,et al. Blind Steganalysis using Wavelet Statistics and ANOVA , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[43] Fenlin Liu,et al. Image universal steganalysis based on wavelet packet transform , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[44] G. Cocho,et al. Universality of Rank-Ordering Distributions in the Arts and Sciences , 2009, PloS one.
[45] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[46] Omed Khalind,et al. Single-mismatch 2LSB embedding steganography , 2013, IEEE International Symposium on Signal Processing and Information Technology.
[47] Lin Ma,et al. Universal Steganalysis Based on Statistical Models Using Reorganization of Block-based DCT Coefficients , 2009, 2009 Fifth International Conference on Information Assurance and Security.