Efficient stego key recovery based on distribution differences of extracting message bits
暂无分享,去创建一个
[1] Liu Jiu-fen,et al. Chosen-key extracting attack to random LSB steganography , 2010 .
[2] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[3] E. Lehmann. Testing Statistical Hypotheses , 1960 .
[4] Chin-Chen Chang,et al. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.
[5] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[6] Weiming Zhang,et al. Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes , 2016, Multimedia Tools and Applications.
[7] Dimitrios Hatzinakos,et al. Watermark detection for noisy interpolated images , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.
[8] Tomás Pevný,et al. Steganographic key leakage through payload metadata , 2014, IH&MMSec '14.
[9] Tao Han,et al. Stego key searching for LSB steganography on JPEG decompressed image , 2015, Science China Information Sciences.
[10] Xinfeng Zhang,et al. Joint Feature and Texture Coding: Toward Smart Video Representation via Front-End Intelligence , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[11] Xiangyu Li,et al. Transmission frequency-band hidden technology in physical layer security , 2015, Science China Information Sciences.
[12] Xiangyang Luo,et al. Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[13] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[14] Xinpeng Zhang,et al. Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.
[15] Fenlin Liu,et al. Reliable steganalysis of HUGO steganography based on partially known plaintext , 2017, Multimedia Tools and Applications.
[16] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[17] Jessica J. Fridrich,et al. Forensic steganalysis: determining the stego key in spatial domain steganography , 2005, IS&T/SPIE Electronic Imaging.
[18] Jessica J. Fridrich,et al. Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.
[19] Jessica J. Fridrich,et al. Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.
[20] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[21] Chin-Chen Chang,et al. An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism , 2013, IEEE Transactions on Circuits and Systems for Video Technology.
[22] Xiangyang Luo,et al. Stego key recovery based on the optimal hypothesis test , 2017, Multimedia Tools and Applications.
[23] Shaocheng Tong,et al. Adaptive neural network tracking design for a class of uncertain nonlinear discrete-time systems with dead-zone , 2012, Science China Information Sciences.
[24] Jing Liu,et al. Stego Key Estimation in LSB Steganography , 2012, J. Multim..