A Steganalysis Algorithm Based on Denoising of Source Image Using ICA and SVM
暂无分享,去创建一个
Soodeh Bakhshandeh | Bahram Zahir Azami | Javad RavanJamJah | Soodeh Bakhshandeh | Javad RavanJamJah
[1] Nikos Paragios,et al. Uniform and Textured Regions Separation in Natural Images Towards MPM Adaptive Denoising , 2007, SSVM.
[2] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[3] Pierre Comon,et al. Independent component analysis, A new concept? , 1994, Signal Process..
[4] Thai Duy Hien,et al. RDWT/ICA for image authentication , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[5] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[6] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[7] Erkki Oja,et al. Independent component analysis: algorithms and applications , 2000, Neural Networks.
[8] Martin J. Wainwright,et al. Image denoising using scale mixtures of Gaussians in the wavelet domain , 2003, IEEE Trans. Image Process..
[9] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[10] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[11] Kiyoshi Tanaka,et al. StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Y. Shi,et al. STEGANALYSIS BASED ON MOMENTS OF CHARACTERISTIC FUNCTIONS USING WAVELET DECOMPOSITION, PREDICTION-ERROR IMAGE, AND NEURAL NETWORK , 2005 .
[13] Anil Kumar,et al. A Robust Watermarking using Blind Source Separation , 2008 .
[14] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[15] Fenlin Liu,et al. A review on blind detection for image steganography , 2008, Signal Process..
[16] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[17] Peng Liu,et al. Research on RTOS-Integrated TMR for Fault Tolerant Systems , 2007 .
[18] Erkki Oja,et al. Independent Component Analysis , 2001 .
[19] Chengyun Yang,et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[20] Bo Xu,et al. Improved BSS Based Schemes for Active Steganalysis , 2007 .
[21] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[22] Mostafa Kaveh,et al. Fourth-order partial differential equations for noise removal , 2000, IEEE Trans. Image Process..
[23] Tapio Seppänen,et al. Increasing robustness of LSB audio steganography using a novel embedding method , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[24] Ingemar J. Cox,et al. A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.