Decomposing Joint Distortion for Adaptive Steganography
暂无分享,去创建一个
Weiming Zhang | Nenghai Yu | Lili Zhang | Zhuo Zhang | Hanyi Li | Nenghai Yu | Weiming Zhang | Zhuo Zhang | Lili Zhang | Hanyi Li
[1] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[2] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[3] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[4] Jessica J. Fridrich,et al. Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[5] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[6] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[7] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[8] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[9] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[10] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[11] Jessica J. Fridrich,et al. Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.
[12] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[13] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[14] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[15] Jessica J. Fridrich,et al. Toss that BOSSbase, Alice! , 2016, Media Watermarking, Security, and Forensics.
[16] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[17] Xinpeng Zhang,et al. Efficient double-layered steganographic embedding , 2007 .
[18] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[19] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[20] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[21] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[22] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.