Steganography Security: Principle and Practice
暂无分享,去创建一个
[1] Philip J. Corriveau,et al. Study of Rating Scales for Subjective Quality Assessment of High-Definition Video , 2011, IEEE Transactions on Broadcasting.
[2] Fernando Pérez-González,et al. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.
[3] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[4] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[5] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[6] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[7] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[8] Rainer Böhme,et al. A game-theoretic analysis of content-adaptive steganography with independent embedding , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).
[9] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[10] Michael Backes,et al. Public-Key Steganography with Active Attacks , 2005, TCC.
[11] David Pointcheval,et al. Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.
[12] Jia Liu,et al. Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks , 2017, ArXiv.
[13] Jiwu Huang,et al. Reversible data hiding in Paillier cryptosystem , 2016, J. Vis. Commun. Image Represent..
[14] Sam Kwong,et al. A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework , 2018, IEEE Transactions on Cybernetics.
[15] W. Marsden. I and J , 2012 .
[16] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[17] J. Nash,et al. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[18] Eric van Damme,et al. Non-Cooperative Games , 2000 .
[19] Minh N. Do,et al. Semantic Image Inpainting with Deep Generative Models , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[21] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[22] Tomás Pevný,et al. Benchmarking for Steganography , 2008, Information Hiding.
[23] Jessica J. Fridrich,et al. Further study on the security of S-UNIWARD , 2014, Electronic Imaging.
[24] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[25] Jing Dong,et al. Learning and transferring representations for image steganalysis using convolutional neural network , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[27] Leon A. Gatys,et al. Texture Synthesis Using Convolutional Neural Networks , 2015, NIPS.
[28] Jessica J. Fridrich,et al. Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[29] Xiaoyuan Yang,et al. A multilevel reversible data hiding scheme in encrypted domain based on LWE , 2018, J. Vis. Commun. Image Represent..
[30] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[31] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[32] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[33] Nan Jiang,et al. LSB Based Quantum Image Steganography Algorithm , 2015, International Journal of Theoretical Physics.
[34] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[35] Donghui Hu,et al. Coverless Information Hiding Based on Robust Image Hashing , 2017, ICIC.
[36] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[37] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[38] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[39] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[40] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[41] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[42] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[43] Shen Wang,et al. Least significant qubit (LSQb) information hiding algorithm for quantum image , 2015 .
[44] François Cayre,et al. Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.