A new fast and efficient active steganalysis based on combined geometrical blind source separation
暂无分享,去创建一个
[1] Christian Jutten,et al. A geometric approach for separating post non-linear mixtures , 2002, 2002 11th European Signal Processing Conference.
[2] Seungjin Choi,et al. Independent Component Analysis , 2009, Handbook of Natural Computing.
[3] Peng Liu,et al. Research on RTOS-Integrated TMR for Fault Tolerant Systems , 2007 .
[4] Jessica J. Fridrich,et al. Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.
[5] Tieniu Tan,et al. Reliable detection of BPCS-steganography in natural images , 2004, Third International Conference on Image and Graphics (ICIG'04).
[6] E. Oja,et al. Independent Component Analysis , 2013 .
[7] Aapo Hyvärinen,et al. Fast and robust fixed-point algorithms for independent component analysis , 1999, IEEE Trans. Neural Networks.
[8] Rajarathnam Chandramouli,et al. A mathematical framework for active steganalysis , 2003, Multimedia Systems.
[9] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[10] Sheldon M. Ross,et al. Stochastic Processes , 2018, Gauge Integral Structures for Stochastic Calculus and Quantum Electrodynamics.
[11] Nikos Paragios,et al. Uniform and Textured Regions Separation in Natural Images Towards MPM Adaptive Denoising , 2007, SSVM.
[12] Bo Xu,et al. Improved BSS Based Schemes for Active Steganalysis , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[13] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[14] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[15] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[16] J. E. Abate,et al. Linear and adaptive delta modulation , 1967 .
[17] Aruna Ambalavanan,et al. Blind source separation for steganalytic secret message estimation , 2007, Electronic Imaging.
[18] Christian Jutten,et al. A Geometrical algorithm for blind separation of sources , 1995 .
[19] Liu Xiaoqin,et al. An Active Steganalysis Method of Block-DCT Image Information Hiding , 2007, 2007 8th International Conference on Electronic Measurement and Instruments.
[20] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[21] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[22] Martin J. Wainwright,et al. Image denoising using scale mixtures of Gaussians in the wavelet domain , 2003, IEEE Trans. Image Process..
[23] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[24] C. Jutten,et al. SOURCE SEPARATION : PRINCIPLES , CURRENT ADVANCES AND APPLICATIONS , 2006 .
[25] J. Doob. Stochastic processes , 1953 .
[26] Yan Yan,et al. Study on Universal Steganalysis for BMP Images Based on Multi-Domain Features , 2013 .
[27] L. Vielva,et al. UNDERDETERMINED BLIND SOURCE SEPARATION USING A PROBABILISTIC SOURCE SPARSITY MODEL , 2001 .
[28] Robert D. Nowak,et al. Wavelet-based statistical signal processing using hidden Markov models , 1998, IEEE Trans. Signal Process..
[29] Lu Wenzhe,et al. Active Steganalysis with Only One Stego Image , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.