Multiclass Detector of Current Steganographic Methods for JPEG Format
暂无分享,去创建一个
[1] J. Fridrich,et al. Detection of double-compression for applications in steganography , 2007 .
[2] William A. Pearlman,et al. Capacity of Steganographic Channels , 2005, IEEE Transactions on Information Theory.
[3] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[4] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[5] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[6] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[7] Tomás Pevný,et al. Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.
[8] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[9] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[10] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[11] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[12] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[13] Tomás Pevný,et al. Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.
[14] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[15] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[16] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[17] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[18] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[19] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[20] Ying Wang,et al. Statistical modeling and steganalysis of DFT-based image steganography , 2006, Electronic Imaging.
[21] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[22] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[23] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[24] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[25] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[26] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[27] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[28] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[29] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[30] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[31] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[32] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.
[33] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[34] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[35] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[36] Jessica Fridrich,et al. Determining the stego algorithm for JPEG images , 2006 .
[37] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.