A further study of large payloads matrix embedding
暂无分享,去创建一个
Xiaolong Li | Bin Yang | Weiming Zhang | Siren Cai | Xiaolong Li | Bin Yang | Weiming Zhang | Siren Cai
[1] Chi-Yuan Lin,et al. A Suboptimal Embedding Algorithm for Binary Matrix Embedding , 2012, 2012 International Symposium on Computer, Consumer and Control.
[2] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[3] Petr Lisonek,et al. Linear codes for high payload steganography , 2009, Discret. Appl. Math..
[4] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[5] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[6] Jessica J. Fridrich,et al. Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.
[7] Jessica J. Fridrich,et al. Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..
[8] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[9] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[10] Jessica J. Fridrich,et al. On Steganographic Embedding Efficiency , 2006, Information Hiding.
[11] Weiming Zhang,et al. Adaptive ±1 Steganography in Extended Noisy Region , 2014, Comput. J..
[12] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[13] Nameer N. El-Emam,et al. New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm , 2013, J. Syst. Softw..
[14] Jyun-Jie Wang,et al. A suboptimal embedding algorithm with low complexity for binary data hiding , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[15] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[16] Oscar C. Au,et al. Data Hiding with Tree Based Parity Check , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[17] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[18] Yunkai Gao,et al. Constructing specific matrix for efficient matrix embedding , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[19] Yunkai Gao,et al. Employing Optimal Matrix for Efficient Matrix Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[20] Florent Retraint,et al. Application of hypothesis testing theory for optimal detection of LSB matching data hiding , 2013, Signal Process..
[21] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[22] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[23] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[24] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[25] Wien Hong,et al. Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique , 2013, Inf. Sci..
[26] Weiming Zhang,et al. Fast Matrix Embedding by Matrix Extending , 2012, IEEE Transactions on Information Forensics and Security.
[27] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[28] Yunkai Gao,et al. Improving embedding efficiency via matrix embedding: A case study , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[29] Wen-Guey Tzeng,et al. An Optimal Data Hiding Scheme With Tree-Based Parity Check , 2011, IEEE Transactions on Image Processing.
[30] Weiwei Liu,et al. Adaptive steganography based on block complexity and matrix embedding , 2013, Multimedia Systems.
[31] Xinpeng Zhang,et al. Efficient Data Hiding With Plus-Minus One or Two , 2010, IEEE Signal Processing Letters.
[32] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[33] Tao Zhang,et al. Steganalysis of LSB matching based on statistical modeling of pixel difference distributions , 2010, Inf. Sci..
[34] Weiming Zhang,et al. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.
[35] Marten van Dijk,et al. Embedding Information in Grayscale Images , 2001 .
[36] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[37] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[38] Chao-Tsun Chang,et al. A compact covering method to exploit embedding capacity for matrix encoding , 2012, Inf. Sci..
[39] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[40] Chin-Chen Chang,et al. Optimizing least-significant-bit substitution using cat swarm optimization strategy , 2012, Inf. Sci..
[41] Fenlin Liu,et al. A review on blind detection for image steganography , 2008, Signal Process..
[42] Der-Chyuan Lou,et al. A novel adaptive steganography based on local complexity and human vision sensitivity , 2010, J. Syst. Softw..
[43] Qian Mao,et al. A fast algorithm for matrix embedding steganography , 2014, Digit. Signal Process..