A Graph-theoretic Model to Steganography on Social Networks
暂无分享,去创建一个
[1] Yun Q. Shi,et al. Ensemble of CNNs for Steganalysis: An Empirical Study , 2016, IH&MMSec.
[2] Fabrizio Grandoni,et al. An improved LP-based approximation for steiner tree , 2010, STOC '10.
[3] Jan Kodovsky,et al. Steganalysis of digital images using rich image representations and ensemble classifiers , 2012 .
[4] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[5] Hong Zhao,et al. Multi-layer assignment steganography using graph-theoretic approach , 2014, Multimedia Tools and Applications.
[6] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[7] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[8] Hongxia Wang,et al. Multibit Color-Mapping Steganography Using Depth-First Search , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[9] Marek Karpinski,et al. 1.25-Approximation Algorithm for Steiner Tree Problem with Distances 1 and 2 , 2009, WADS.
[10] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[11] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[12] Daniel Jackoway. Wherefore Art Thou R 3579 X ? Anonymized Social Networks , Hidden Patterns , and Structural , 2014 .
[13] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[14] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[15] Xinpeng Zhang,et al. Behavior Steganography in Social Network , 2017 .
[16] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[17] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[18] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[19] Guanshuo Xu,et al. Deep Convolutional Neural Network to Detect J-UNIWARD , 2017, IH&MMSec.
[20] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[21] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[22] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[23] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[24] Miroslav Chlebík,et al. The Steiner tree problem on graphs: Inapproximability results , 2008, Theor. Comput. Sci..
[25] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[26] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).