On the probability density function and characteristic function moments of image steganalysis in the log prediction error wavelet subband
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[2] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[3] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[4] Zhihua Xia,et al. Steganalysis of least significant bit matching based on image histogram and correlation , 2013, J. Electronic Imaging.
[5] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[6] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[7] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[8] Zhihua Xia,et al. Fingerprint liveness detection using gradient-based texture features , 2016, Signal, Image and Video Processing.
[9] Pedro Comesaña Alfaro,et al. Improving Selection-Channel-Aware Steganalysis Features , 2016, Media Watermarking, Security, and Forensics.
[10] Hassan Qjidaa,et al. Image analysis using separable discrete moments of Charlier-Hahn , 2014, Multimedia Tools and Applications.
[11] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[12] Stefanos Gritzalis,et al. On the Typical Statistic Features for Image Blind Steganalysis , 2011, IEEE Journal on Selected Areas in Communications.
[13] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[14] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[15] Jessica J. Fridrich,et al. Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.
[16] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[17] Xiaofeng Song,et al. Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysis , 2016, SpaCCS Workshops.
[18] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[19] Bo Li,et al. Preestimation-Based Array Interpolation Approach to Coherent Source Localization Using Multiple Sparse Subarrays , 2009, IEEE Signal Processing Letters.
[20] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[21] Dimitris E. Koulouriotis,et al. A Unified Methodology for Computing Accurate Quaternion Color Moments and Moment Invariants , 2014, IEEE Transactions on Image Processing.
[22] Jordan B. L. Smith,et al. Audio Properties of Perceived Boundaries in Music , 2014, IEEE Transactions on Multimedia.
[23] Gang Xiong,et al. Image textural features for steganalysis of spatial domain steganography , 2012, J. Electronic Imaging.
[24] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[25] Chengyun Yang,et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[26] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[27] Hong-Xia Wang,et al. Pseudo-zernike moments-based audio content authentication algorithm robust against feature-analysed substitution attack , 2012, Multimedia Tools and Applications.
[28] Bin Li,et al. Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[29] Jiasong Wu,et al. Fast Computation of Sliding Discrete Tchebichef Moments and Its Application in Duplicated Regions Detection , 2015, IEEE Transactions on Signal Processing.
[30] Bin Li,et al. Steganalysis of a PVD-based content adaptive image steganography , 2013, Signal Process..
[31] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[32] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[33] Onkar Dikshit,et al. Spectral–Spatial Classification of Hyperspectral Imagery Based on Moment Invariants , 2015, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.
[34] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[35] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[36] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[37] Bin Gu,et al. Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[38] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[39] Mohammad Rahmati,et al. New framework for using image contents in blind steganalysis systems , 2011, J. Electronic Imaging.
[40] Weiming Zhang,et al. Matrix embedding in finite abelian group , 2015, Signal Process..
[41] Bin Li,et al. Textural features based universal steganalysis , 2008, Electronic Imaging.
[42] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.