Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters
暂无分享,去创建一个
[1] Florent Retraint,et al. Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients , 2013, 2013 IEEE International Conference on Image Processing.
[2] Sergio Verdú,et al. Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[3] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[4] Sangjin Lee,et al. Category Attack for LSB Steganalysis of JPEG Images , 2006, IWDW.
[5] F. Muller. Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .
[6] Florent Retraint,et al. A Cover Image Model For Reliable Steganalysis , 2011, Information Hiding.
[7] Florent Retraint,et al. An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection , 2013, IEEE Transactions on Information Forensics and Security.
[8] Florent Retraint,et al. A local adaptive model of natural images for almost optimal detection of hidden data , 2014, Signal Process..
[9] Jessica J. Fridrich,et al. On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.
[10] Joseph W. Goodman,et al. A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..
[11] Florent Retraint,et al. Statistical detection of data hidden in least significant bits of clipped images , 2014, Signal Process..
[12] Florent Retraint,et al. Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results , 2014, Digit. Signal Process..
[13] Rainer Böhme,et al. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.
[14] Junichi Nakamura,et al. Image Sensors and Signal Processing for Digital Still Cameras , 2005 .
[15] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[16] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[17] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[18] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[19] Rainer Böhme,et al. Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.
[20] Jessica J. Fridrich,et al. Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.
[21] Sanjit K. Mitra,et al. Image probability distribution based on generalized gamma function , 2005, IEEE Signal Processing Letters.
[22] Florent Retraint,et al. Hidden information detection based on quantized Laplacian distribution , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[24] Florent Retraint,et al. Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.
[25] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[26] Deepa Kundur,et al. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain , 2006, IEEE Transactions on Information Forensics and Security.
[27] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[28] Florent Retraint,et al. Statistical decision by using quantized observations , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[29] Rainer Bhme. Advanced Statistical Steganalysis , 2010 .
[30] T. H. Thai,et al. Statistical model of natural images , 2012, 2012 19th IEEE International Conference on Image Processing.
[31] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[32] Florent Retraint,et al. Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.
[33] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.
[34] E. Lehmann. Testing Statistical Hypotheses , 1960 .
[35] Jianhua Li,et al. A study of on/off timing channel based on packet delay distribution , 2009, Comput. Secur..