Adaptive steganography based on block complexity and matrix embedding
暂无分享,去创建一个
[1] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[2] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[3] Sergio A. Velastin,et al. Intelligent Multimedia Analysis for Security Applications , 2012, Intelligent Multimedia Analysis for Security Applications.
[4] Xiaolong Li,et al. A Secure Steganography: Noisy Region Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[5] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[6] HwangMin-Shiang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008 .
[7] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[8] Jessica J. Fridrich,et al. Minimizing embedding impact in steganography using trellis-coded quantization , 2010, Electronic Imaging.
[9] Qingzhong Liu,et al. Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..
[10] Eiji Kawaguchi,et al. Principles and applications of BPCS steganography , 1999, Other Conferences.
[11] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[12] Sorina Dumitrescu,et al. An efficient high payload ±1 data embedding scheme , 2011, Multimedia Tools and Applications.
[13] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[14] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[15] Yuewei Dai,et al. Data Hiding in Neural Network Prediction Errors , 2006, ISNN.
[16] Bin Li,et al. Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting , 2012, IEEE Signal Processing Letters.
[17] S. Samavi,et al. Steganalysis of Pixel-Value Differencing Steganographic Method , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[18] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.
[19] Bin Li,et al. Steganalysis of Multiple-Base Notational System Steganography , 2008, IEEE Signal Processing Letters.
[20] Weiming Zhang,et al. Generalization of the ZZW Embedding Construction for Steganography , 2009, IEEE Transactions on Information Forensics and Security.
[21] Ja-Chen Lin,et al. Image hiding by base-oriented algorithm , 2006 .
[22] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[23] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[24] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[25] Yuewei Dai,et al. Improved LSB-matching Steganography for Preserving Second-order Statistics , 2010, J. Multim..
[26] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[27] Marten van Dijk,et al. Capacity and codes for embedding information in gray-scale signals , 2005, IEEE Transactions on Information Theory.
[28] Carlos Munuera,et al. Steganography and error-correcting codes , 2007, Signal Process..
[29] Jessica J. Fridrich,et al. Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.
[30] Xinpeng Zhang,et al. Efficient double-layered steganographic embedding , 2007 .
[31] R. Crandall,et al. Some Notes on Steganography , 1999 .
[32] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).