Efficient large payloads ternary matrix embedding
暂无分享,去创建一个
[1] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[2] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[3] Yunkai Gao,et al. Employing Optimal Matrix for Efficient Matrix Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[4] Marten van Dijk,et al. Embedding Information in Grayscale Images , 2001 .
[5] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[6] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[7] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[8] Xiaolong Li,et al. A further study of large payloads matrix embedding , 2015, Inf. Sci..
[9] Jun Yu,et al. Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.
[10] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[11] XiongNaixue,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016 .
[12] Wen-Chung Kuo,et al. A Formula Diamond Encoding Data Hiding Scheme , 2015, J. Inf. Hiding Multim. Signal Process..
[13] Jessica J. Fridrich,et al. On Steganographic Embedding Efficiency , 2006, Information Hiding.
[14] Yunkai Gao,et al. Improving embedding efficiency via matrix embedding: A case study , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[15] Wen-Chung Kuo,et al. Binary power data hiding scheme , 2015 .
[16] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[17] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[18] Yen-Ping Chu,et al. A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..
[19] Chun-Cheng Wang,et al. Signed digit data hiding scheme , 2016, Inf. Process. Lett..
[20] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[21] Reza Safabakhsh,et al. Reducing the embedding impact in steganography using Hamiltonian paths and writing on wet paper , 2014, Multimedia Tools and Applications.
[22] Weiming Zhang,et al. Fast Matrix Embedding by Matrix Extending , 2012, IEEE Transactions on Information Forensics and Security.
[23] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[24] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[25] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[26] Bo Li,et al. Preestimation-Based Array Interpolation Approach to Coherent Source Localization Using Multiple Sparse Subarrays , 2009, IEEE Signal Processing Letters.
[27] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[28] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.
[29] Bin Li,et al. Steganalysis of a PVD-based content adaptive image steganography , 2013, Signal Process..
[30] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[31] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[32] Jessica J. Fridrich,et al. Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..
[33] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[34] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[35] Jun Li,et al. A game-theoretic method for designing distortion function in spatial steganography , 2017, Multimedia Tools and Applications.