YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
暂无分享,去创建一个
[1] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[2] B. S. Manjunath,et al. Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.
[3] B. S. Manjunath,et al. Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.
[4] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[5] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[6] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[7] Tomás Pevný,et al. Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.
[8] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[9] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[10] Yun Q. Shi,et al. Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function , 2006, 2006 International Conference on Image Processing.
[11] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[12] Brendan J. Frey,et al. Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.
[13] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[14] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.
[15] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[16] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[17] Dariush Divsalar,et al. Coding theorems for 'turbo-like' codes , 1998 .
[18] Nasir D. Memon,et al. Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.
[19] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[20] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[21] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[22] Bernie Mulgrew,et al. IEEE Workshop on Statistical Signal Processing , 2005 .
[23] Yun Q. Shi,et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[24] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[25] Robin Milner. A calculus for the mathematical theory of computation , 1972, International Sympoisum on Theoretical Programming.
[26] Gerhard Zimmermann,et al. GI-NTG Fachtagung Struktur und Betrieb von Rechensystemen, Kiel, 19.-21. März 1980, Proceedings , 1980, ARCS.
[27] B. S. Manjunath,et al. Statistical restoration for robust and secure steganography , 2005, IEEE International Conference on Image Processing 2005.
[28] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[29] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[30] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[31] Ying Wang,et al. Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.