Universal Detection of JPEG Steganography
暂无分享,去创建一个
Eric Filiol | Johann Barbier | Kichenakoumar Mayoura | E. Filiol | Johann Barbier | Kichenakoumar Mayoura
[1] Jessica J. Fridrich,et al. New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.
[2] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[3] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[4] Eric Filiol,et al. New Features for Specific JPEG Steganalysis , 2008 .
[5] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[6] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[7] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[8] William A. Pearlman,et al. Kernel Fisher discriminant for steganalysis of JPEG hiding methods , 2004, IS&T/SPIE Electronic Imaging.
[9] Nasir D. Memon,et al. Steganalysis based on image quality metrics , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[10] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[11] Eric Filiol,et al. Universal JPEG Steganalysis in the Compressed Frequency Domain , 2006, IWDW.
[12] C. Wayne Brown. Graphics File Formats , 1994 .
[13] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[14] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[15] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[16] Barry J. Shepherd,et al. Graphics file formats - reference and guide , 1994 .
[17] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[18] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[19] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[20] Tomás Pevný,et al. Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.
[21] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[22] H. Feistel. Cryptography and Computer Privacy , 1973 .
[23] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[24] Chia-Hung Yeh,et al. Data hiding domain classification for blind image steganalysis , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).