Feature Mining and Pattern Recognition in Multimedia Forensics—Detection of JPEG Image Based Steganography, Double-Compression, Interpolation and WAV Audio Based Steganography
暂无分享,去创建一个
Qingzhong Liu | Andrew H. Sung | Mengyu Qiao | Zhongxue Chen | Bernardete Ribeiro | B. Ribeiro | A. Sung | Qingzhong Liu | Zhongxue Chen | Mengyu Qiao
[1] Nasir D. Memon,et al. Image tamper detection based on demosaicing artifacts , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[2] Qingzhong Liu,et al. Feature Mining and Intelligent Computing for MP3 Steganalysis , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.
[3] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[4] Siwei Lyu,et al. Steganalysis of recorded speech , 2005, IS&T/SPIE Electronic Imaging.
[5] Jana Dittmann,et al. Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.
[6] Nikola K. Kasabov,et al. DENFIS: dynamic evolving neural-fuzzy inference system and its application for time-series prediction , 2002, IEEE Trans. Fuzzy Syst..
[7] Qingzhong Liu,et al. Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images , 2007, IJCAI.
[8] Alberto Leon-Garcia,et al. Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video , 1995, IEEE Trans. Circuits Syst. Video Technol..
[9] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[10] Qingzhong Liu,et al. Predicting embedding strength in audio steganography , 2010, 9th IEEE International Conference on Cognitive Informatics (ICCI'10).
[11] Thorsten Joachims,et al. Estimating the Generalization Performance of an SVM Efficiently , 2000, ICML.
[12] Jung-Hua Chou,et al. A Robust and Friendly Human-Robot Interface System Based on Natural Human Gestures , 2010, Int. J. Pattern Recognit. Artif. Intell..
[13] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[14] Sargur N. Srihari,et al. Image Pattern Recognition - Synthesis and Analysis in Biometrics , 2007, Image Pattern Recognition.
[15] Qingzhong Liu,et al. An improved approach to steganalysis of JPEG images , 2010, Inf. Sci..
[16] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[17] Noboru Babaguchi,et al. Breaking the YASS algorithm via pixel and DCT coefficients analysis , 2008, 2008 19th International Conference on Pattern Recognition.
[18] Patrick Shen-Pei Wang,et al. Biometric technologies and applications , 2007, Artificial Intelligence and Applications.
[19] Nasir D. Memon,et al. Tamper Detection Based on Regularity of Wavelet Transform Coefficients , 2007, 2007 IEEE International Conference on Image Processing.
[20] Wei Su,et al. A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.
[21] Thorsten Joachims,et al. Making large scale SVM learning practical , 1998 .
[22] Qingzhong Liu,et al. Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..
[23] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[24] Hyoung Joong Kim,et al. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.
[25] Qingzhong Liu,et al. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[26] Qingzhong Liu,et al. Neighboring joint density-based JPEG steganalysis , 2011, TIST.
[27] Darko Kirovski,et al. Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..
[28] Qingzhong Liu,et al. Novel stream mining for audio steganalysis , 2009, MM '09.
[29] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[30] Qingzhong Liu,et al. Improved detection and evaluation for JPEG steganalysis , 2009, ACM Multimedia.
[31] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[32] Wei Zeng,et al. A Novel Steganalysis Algorithm of Phase Coding in Audio Signal , 2007, Sixth International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007).
[33] Tien D. Bui,et al. Multivariate statistical modeling for image denoising using wavelet transforms , 2005, Signal Process. Image Commun..
[34] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..
[35] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[36] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[37] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[38] Yue Lu,et al. Face Recognition Using Scale Invariant Feature Transform and Support Vector Machine , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[39] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[40] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[41] Ruimin Hu,et al. An algorithm of echo steganalysis based on power cepstrum and pattern classification , 2008, 2008 International Conference on Audio, Language and Image Processing.
[42] Anindya Sarkar,et al. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.
[43] Qingzhong Liu,et al. A Method to Detect JPEG-Based Double Compression , 2011, ISNN.
[44] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[45] Qingzhong Liu,et al. Revealing real quality of double compressed MP3 audio , 2010, ACM Multimedia.
[46] Qingzhong Liu,et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..
[47] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[48] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[49] Qingzhong Liu,et al. Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[50] Thorsten Joachims,et al. Learning to classify text using support vector machines - methods, theory and algorithms , 2002, The Kluwer international series in engineering and computer science.
[51] Jens-Rainer Ohm. Multimedia Communication Technology: Representation,Transmission and Identification of Multimedia Signals , 2004 .
[52] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[53] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[54] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[55] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[56] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[57] Nasir D. Memon,et al. An Ensemble of Classifiers Approach to Steganalysis , 2010, 2010 20th International Conference on Pattern Recognition.
[58] Siwei Lyu,et al. How realistic is photorealistic , 2005 .
[59] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[60] Ingrid Daubechies,et al. Ten Lectures on Wavelets , 1992 .
[61] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[62] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[63] Yan Chen,et al. Dynamic Structural Statistical Model Based Online Signature Verification , 2009, Int. J. Digit. Crime Forensics.
[64] Nasir D. Memon,et al. Detection of audio covert channels using statistical footprints of hidden messages , 2006, Digit. Signal Process..
[65] Qingzhong Liu,et al. Steganalysis of MP3Stego , 2009, 2009 International Joint Conference on Neural Networks.
[66] Nasir D. Memon,et al. An efficient and robust method for detecting copy-move forgery , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.