Distortion function based on residual blocks for JPEG steganography
暂无分享,去创建一个
[1] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[2] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[3] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[4] Chin-Chen Chang,et al. An adaptive reversible steganographic scheme based on the just noticeable distortion , 2013, Multimedia Tools and Applications.
[5] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[6] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[7] Xinpeng Zhang,et al. Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.
[8] Hang Zhou,et al. Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.
[9] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[10] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[11] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[12] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[13] Shiguo Lian,et al. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.
[14] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[15] Chin-Chen Chang,et al. Reversible data hiding scheme based on exploiting modification direction with two steganographic images , 2014, Multimedia Tools and Applications.
[16] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[17] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[18] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[19] Chuan Qin,et al. Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism , 2016, Signal Process..
[20] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[21] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[22] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[23] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[24] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Trans. Inf. Forensics Secur..