An Information Theoretic Image Steganalysis for LSB Steganography
暂无分享,去创建一个
[1] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[2] David Megías,et al. LSB Matching Steganalysis Based on Patterns of Pixel Differences and Random Embedding , 2017, ArXiv.
[3] Lei Guo,et al. Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[4] B. S. Manjunath,et al. Steganalysis of quantization index modulation data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[5] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[6] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[7] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[8] T.A. Hawi,et al. Steganalysis attacks on stego-images using stego-signatures and statistical image properties , 2004, 2004 IEEE Region 10 Conference TENCON 2004..
[9] Hideki Noda,et al. Intensity histogram steganalysis in BPCS-steganography , 2001, IS&T/SPIE Electronic Imaging.
[10] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[11] Gilbert L. Peterson,et al. A new blind method for detecting novel steganography , 2005, Digit. Investig..
[12] Wen Gao,et al. Steganalysis of data hiding techniques in wavelet domain , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[13] Minh N. Do,et al. Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance , 2002, IEEE Trans. Image Process..
[14] Lionel Fillatre. Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.
[15] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[16] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[17] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[18] Rajarathnam Chandramouli,et al. Active steganalysis of sequential steganography , 2003, IS&T/SPIE Electronic Imaging.
[19] Jessica J. Fridrich,et al. Effect of Image Downsampling on Steganographic Security , 2014, IEEE Transactions on Information Forensics and Security.
[20] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[21] Yun Q. Shi,et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[22] Karim Faez,et al. Entropy-Based Video Steganalysis of Motion Vectors , 2018, Entropy.