CBS: Contourlet-Based Steganalysis Method
暂无分享,去创建一个
[1] Yue Lu. A Directional Extension for Multidimensional Wavelet Transforms , 2005 .
[2] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[3] P. Subbanna Bhat,et al. Contourlet Based Multiresolution Texture Segmentation Using Contextual Hidden Markov Models , 2004, CIT.
[4] Richard Baraniuk,et al. The Dual-tree Complex Wavelet Transform , 2007 .
[5] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[6] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[7] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[8] Hedieh Sajedi,et al. ContSteg: Contourlet-Based Steganography Method , 2009, Wirel. Sens. Netw..
[9] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[10] Minh N. Do,et al. Contourlets: a directional multiresolution image representation , 2002, Proceedings. International Conference on Image Processing.
[11] Zhiling Long,et al. Contourlet Spectral Histogram for Texture Classification , 2006, 2006 IEEE Southwest Symposium on Image Analysis and Interpretation.
[12] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[13] D. D.-Y. Po,et al. Directional multiscale modeling of images using the contourlet transform , 2006, IEEE Transactions on Image Processing.
[14] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[15] Richard Baraniuk,et al. The dual-tree complex wavelet transform , 2005, IEEE Signal Processing Magazine.
[16] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[17] Thomas S. Huang,et al. Image processing , 1971 .
[18] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[19] Hedieh Sajedi,et al. Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.