An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection
暂无分享,去创建一个
[1] Michael Elad,et al. Image Denoising Via Sparse and Redundant Representations Over Learned Dictionaries , 2006, IEEE Transactions on Image Processing.
[2] Andrew D. Ker. A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.
[3] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[4] Florent Retraint,et al. Statistical decision by using quantized observations , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[5] Eric W. Weisstein,et al. The CRC concise encyclopedia of mathematics , 1999 .
[6] Florent Retraint,et al. Statistical Detection of LSB Matching Using Hypothesis Testing Theory , 2012, Information Hiding.
[7] Ingemar J. Cox,et al. Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[8] Lionel Fillatre. Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.
[9] Mauro Barni,et al. A Comparative Study of ±1 Steganalyzers , 2008 .
[10] Glenn Healey,et al. Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[12] Jessica J. Fridrich,et al. Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.
[13] Karen O. Egiazarian,et al. Practical Poissonian-Gaussian Noise Modeling and Fitting for Single-Image Raw-Data , 2008, IEEE Transactions on Image Processing.
[14] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[15] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[16] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[17] Florent Retraint,et al. Statistical detection of LSB matching in the presence of nuisance parameters , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).
[18] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[19] Jaakko Astola,et al. Local Approximation Techniques in Signal and Image Processing (SPIE Press Monograph Vol. PM157) , 2006 .
[20] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[21] Bernard Widrow,et al. Quantization Noise: Roundoff Error in Digital Computation, Signal Processing, Control, and Communications , 2008 .
[22] Michael Elad,et al. Stable recovery of sparse overcomplete representations in the presence of noise , 2006, IEEE Transactions on Information Theory.
[23] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[24] Florent Retraint,et al. A Cover Image Model For Reliable Steganalysis , 2011, Information Hiding.
[25] Carlos Munuera,et al. Steganography and error-correcting codes , 2007, Signal Process..
[26] Clayton Scott,et al. Performance Measures for Neyman–Pearson Classification , 2007, IEEE Transactions on Information Theory.
[27] Jianqin Zhou,et al. On discrete cosine transform , 2011, ArXiv.
[28] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[29] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[30] Ingemar J. Cox,et al. A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[31] Ingemar J. Cox,et al. Detection of ±1 LSB steganography based on the amplitude of histogram local extrema , 2008, 2008 15th IEEE International Conference on Image Processing.
[32] T. H. Thai,et al. Statistical model of natural images , 2012, 2012 19th IEEE International Conference on Image Processing.
[33] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[34] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[35] Jessica J. Fridrich,et al. On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.
[36] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[37] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[38] Jessica J. Fridrich,et al. Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.
[39] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[40] Florent Retraint,et al. Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.
[41] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[42] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[43] Anil K. Jain,et al. Random field models in image analysis , 1989 .