Steganalysis by Subtractive Pixel Adjacency Matrix
暂无分享,去创建一个
[1] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[2] Kannan Ramchandran,et al. Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.
[3] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[4] Mauro Barni,et al. A Comparative Study of ±1 Steganalyzers , 2008 .
[5] Masoud Nikravesh,et al. Feature Extraction: Foundations and Applications (Studies in Fuzziness and Soft Computing) , 2006 .
[6] David Mumford,et al. Statistics of natural images and models , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).
[7] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[8] Masoud Nikravesh,et al. Feature Extraction - Foundations and Applications , 2006, Feature Extraction.
[9] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[10] Jessica J. Fridrich,et al. Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.
[11] Edward J. Delp,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[12] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[13] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[14] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..
[15] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[16] Ingemar J. Cox,et al. A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[17] Ingemar J. Cox,et al. Detection of ±1 LSB steganography based on the amplitude of histogram local extrema , 2008, 2008 15th IEEE International Conference on Image Processing.
[18] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[19] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[20] Vladimir Vapnik,et al. The Nature of Statistical Learning , 1995 .
[21] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[22] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[23] Amaury Lendasse,et al. Reliable Steganalysis Using a Minimum Set of Samples and Features , 2009, EURASIP J. Inf. Secur..
[24] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[25] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[26] Andrew D. Ker. A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.
[27] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[28] Le Song,et al. Supervised feature selection via dependence estimation , 2007, ICML '07.
[29] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[30] Andrew D. Ker. A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.
[31] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[32] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[33] Andrew D. Ker,et al. Feature reduction and payload location with WAM steganalysis , 2009, Electronic Imaging.
[34] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.
[35] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[36] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[37] Tomás Pevný,et al. From Blind to Quantitative Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[38] Tieyong Zeng,et al. Detecting LSB matching by applying calibration technique for difference image , 2008, MM&Sec '08.
[39] Yoshua Bengio,et al. The Curse of Dimensionality for Local Kernel Machines , 2005 .
[40] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[41] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[42] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[43] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[44] B. S. Manjunath,et al. Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.
[45] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[46] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.