PSW statistical LSB image steganalysis
暂无分享,去创建一个
Akram M. Zeki | Mazdak Zamani | Azizah Bt Abdul Manaf | Saman Shojae Chaeikar | M. Zamani | A. Manaf | A. Zeki
[1] S. Selvakumar,et al. Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation , 2014, Digit. Investig..
[2] Ting Ting Zhu,et al. JPEG Steganalysis Based on Locality Preserving Projection Dimensionality Reduction Method , 2013 .
[3] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[4] G. Kerns,et al. Introduction to Probability and Statistics Using R , 2011 .
[5] João Gama,et al. Linear tree , 1999, Intell. Data Anal..
[6] Florent Retraint,et al. Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.
[7] Azizah Bt Abdul Manaf,et al. Azizah technique for efficiency measurement in steganography , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).
[8] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[9] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[10] David Megías,et al. LSB matching steganalysis based on patterns of pixel differences and random embedding , 2013, Comput. Secur..
[11] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[12] C.-C. Jay Kuo,et al. Block-based image steganalysis: Algorithm and performance evaluation , 2010, ISCAS.
[13] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[14] Mazdak Zamani,et al. Current problems of substitution techniques of audio steganography , 2009 .
[15] Mahendra Kumar,et al. Steganography and Steganalysis of JPEG Images , 2011 .
[16] Jiri Fridrich,et al. Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[17] A. Murat Tekalp,et al. Universal image steganalysis using rate-distortion curves , 2004, IS&T/SPIE Electronic Imaging.
[18] Akram M. Zeki,et al. Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.
[19] Gilbert L. Peterson,et al. A new blind method for detecting novel steganography , 2005, Digit. Investig..
[20] Xiangyang Luo,et al. An Improved Sample Pairs Method for Detection of LSB Embedding , 2004, Information Hiding.
[21] Jessica J. Fridrich,et al. Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.
[22] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[23] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.
[24] Earl Bogdanoff. Introduction to descriptive statistics: a sequential approach , 1970 .
[25] Bernhard Schölkopf,et al. A tutorial on support vector regression , 2004, Stat. Comput..
[26] Akram M. Zeki,et al. An approach to improve the robustness of substitution techniques of audio steganography , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[27] Hao Zhang,et al. Multi-class Markov models for JPEG steganalysis , 2013, Other Conferences.
[28] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[29] Fenlin Liu,et al. Blind image steganalysis based on wavelet coefficient correlation , 2012, Digit. Investig..
[30] Hossein Rouhani Zeidanloo,et al. Genetic substitution-based audio steganography for high capacity applications , 2011 .
[31] Earl W. Kooker. Introduction to Descriptive Statistics , 1982 .
[32] E. Lin,et al. LSB steganalysis using support vector regression , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[33] Mohammad Rahmati,et al. A Model-Based Image Steganography Method Using Watson’s Visual Model , 2014 .
[34] Mazdak Zamani,et al. Capacity and quality improvement in reversible image watermarking approach , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[35] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[36] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[37] Jaya Sil,et al. Perceptually adaptive MC-SS image watermarking using GA-NN hybridization in fading gain , 2014, Eng. Appl. Artif. Intell..
[38] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[39] Qingzhong Liu,et al. MP3 audio steganalysis , 2013, Inf. Sci..
[40] Ali Kanso,et al. A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..
[41] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[42] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[43] Tao Zhang,et al. Reliable detection of LSB steganography based on the difference image histogram , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[44] Il Kyu Eom,et al. Performance improvement of LSB-based steganalysis using bit-plane decomposition of images , 2016 .
[45] M. Zamani,et al. An Introduction to Image Steganography Techniques , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[46] Hossein Rouhani Zeidanloo,et al. Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.
[47] Mohammad Saniee Abadeh,et al. Image steganalysis using a bee colony based feature selection algorithm , 2014, Eng. Appl. Artif. Intell..
[48] Wei Sun,et al. Detect LSB Steganography with Bit Plane Randomness Tests , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[49] Henry Chu,et al. Soft computing approach to steganalysis of LSB embedding in digital images , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..
[50] Andreas Westfeld. Detecting Low Embedding Rates , 2002, Information Hiding.
[51] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[52] Mazdak Zamani,et al. An overview on audio steganography techniques , 2012 .
[53] Jessica J. Fridrich,et al. Quantitative steganalysis using rich models , 2013, Electronic Imaging.
[54] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[55] Li Zhi,et al. A LSB steganography detection algorithm , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[56] David Megías,et al. Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..
[57] Jean-Marc Chassery,et al. Improving LSB steganalysis using marginal and joint probabilistic distributions , 2004, MM&Sec '04.
[58] Hossein Rouhani Zeidanloo,et al. Genetic Audio Watermarking , 2010, BAIP.
[59] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[60] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[61] Jing Dong,et al. An effective image steganalysis method based on neighborhood information of pixels , 2011, 2011 18th IEEE International Conference on Image Processing.
[62] Xiaolin Wu,et al. A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.
[63] Ahmad Reza Naghsh-Nilchi,et al. A novel joint secret image sharing and robust steganography method using wavelet , 2013, Multimedia Systems.
[64] Jiri Fridrich,et al. Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[65] Shahidan M. Abdullah,et al. Mazdak Technique for PSNR Estimation in Audio Steganography , 2012 .
[66] Mazdak Zamani,et al. Genetic algorithm for fragile audio watermarking , 2014, Telecommunication Systems.
[67] Andrew D. Ker. Quantitative evaluation of pairs and RS steganalysis , 2004, IS&T/SPIE Electronic Imaging.
[68] 金田 重郎,et al. C4.5: Programs for Machine Learning (書評) , 1995 .
[69] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[70] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[71] Sos S. Agaian,et al. Steganalysis Embedding Percentage Determination with Learning Vector Quantization , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[72] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[73] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .