Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization
暂无分享,去创建一个
[1] Xinpeng Zhang,et al. Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.
[2] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[3] Andrew D. Ker. Steganographic strategies for a square distortion function , 2008, Electronic Imaging.
[4] Xinpeng Zhang,et al. Behavior Steganography in Social Network , 2017 .
[5] Hedieh Sajedi,et al. Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.
[6] Weiming Zhang,et al. A New Rule for Cost Reassignment in Adaptive Steganography , 2017, IEEE Transactions on Information Forensics and Security.
[7] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[8] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[9] Nasir D. Memon,et al. Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.
[10] Yan Liu,et al. What makes the stego image undetectable? , 2015, ICIMCS '15.
[11] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[12] Tomás Pevný,et al. Batch steganography in the real world , 2012, MM&Sec '12.
[13] Andrew D. Ker,et al. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.
[14] Changjun Liu,et al. Embedding Strategy for Batch Adaptive Steganography , 2016, IWDW.
[15] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[16] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[17] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[18] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[19] Mi Wen,et al. Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.
[20] Hedieh Sajedi,et al. Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[21] Andrew D. Ker. A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.
[22] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[23] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[24] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[25] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.