Steganalysis for Markov cover data with applications to images
暂无分享,去创建一个
B. S. Manjunath | Upamanyu Madhow | Shivkumar Chandrasekaran | Kenneth Sullivan | S. Chandrasekaran | Upamanyu Madhow | Kenneth Mark Sullivan
[1] Rajarathnam Chandramouli,et al. A Bayesian image steganalysis approach to estimate the embedded secret message , 2005, MM&Sec '05.
[2] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[3] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[4] Nasir D. Memon,et al. Benchmarking steganographic and steganalysis techniques , 2005, IS&T/SPIE Electronic Imaging.
[5] Neil J. Hurley,et al. ML detection of steganography , 2005, IS&T/SPIE Electronic Imaging.
[6] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[7] Jessica J. Fridrich,et al. On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.
[8] Maxim Sidorov,et al. Hidden Markov models and steganalysis , 2004, MM&Sec '04.
[9] Tomás Pevný,et al. Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.
[10] B. S. Manjunath,et al. Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.
[11] Jean-Marc Chassery,et al. Improving LSB steganalysis using marginal and joint probabilistic distributions , 2004, MM&Sec '04.
[12] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[13] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[14] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[15] Bernd Girod,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[16] Rajarathnam Chandramouli,et al. A mathematical framework for active steganalysis , 2003, Multimedia Systems.
[17] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[18] B. S. Manjunath,et al. Steganalysis of quantization index modulation data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[19] Andrew D. Ker. Resampling and the detection of LSB matching in color bitmaps , 2005, IS&T/SPIE Electronic Imaging.
[20] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[21] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[22] Thorsten Joachims,et al. Making large scale SVM learning practical , 1998 .
[23] A. Habibi. Comparison of nth-Order DPCM Encoder With Linear Transformations and Block Quantization Techniques , 1971 .
[24] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[25] J. Fridrich,et al. Attacking the OutGuess , 2002 .
[26] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[27] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[28] A. Murat Tekalp,et al. Universal image steganalysis using rate-distortion curves , 2004, IS&T/SPIE Electronic Imaging.
[29] Venkat Anantharam. A large deviations approach to error exponents in source coding and hypothesis testing , 1990, IEEE Trans. Inf. Theory.
[30] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[31] Tao Zhang,et al. A new approach to reliable detection of LSB steganography in natural images , 2003, Signal Process..
[32] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[33] Kai Lai Chung,et al. Markov Chains with Stationary Transition Probabilities , 1961 .
[34] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[35] Ying Wang,et al. Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.
[36] S. Natarajan,et al. Large deviations, hypotheses testing, and source coding for finite Markov chains , 1985, IEEE Trans. Inf. Theory.
[37] Ying Wang,et al. Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.
[38] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[39] Pierre Moulin,et al. New results on steganographic capacity , 2004 .
[40] I. D. Longstaff,et al. Improving Co-occurrence Matrix Feature Discrimination , 1995 .
[41] Michael A. Arbib,et al. The handbook of brain theory and neural networks , 1995, A Bradford book.
[42] N. D. Memon,et al. Steganography capacity: a steganalysis perspective , 2003, IS&T/SPIE Electronic Imaging.
[43] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[44] Edward J. Delp,et al. A Review of Data Hiding in Digital Images , 1999, PICS.
[45] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[46] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[47] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[48] Tuomas Aura,et al. Practical Invisibility in Digital Communication , 1996, Information Hiding.
[49] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[50] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[51] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[52] Edward J. Delp,et al. Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.
[53] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[54] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.