A high-performance YASS-like scheme using randomized big-blocks
暂无分享,去创建一个
Yao Zhao | Rongrong Ni | Yun Q. Shi | Lifang Yu | Yao Zhao | Y. Shi | R. Ni | Lifang Yu
[1] J. Wade Davis,et al. Statistical Pattern Recognition , 2003, Technometrics.
[2] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[3] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[4] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..
[5] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[6] Rainer Böhme,et al. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.
[7] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[8] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[9] Anindya Sarkar,et al. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.
[10] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[11] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[12] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[13] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[14] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[15] Dariush Divsalar,et al. Coding theorems for 'turbo-like' codes , 1998 .
[16] J. Fridrich,et al. Attacking the OutGuess , 2002 .