LSB and DCT steganographic detection using compressive sensing
暂无分享,去创建一个
[1] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .
[2] Karen O. Egiazarian,et al. Video denoising by sparse 3D transform-domain collaborative filtering , 2007, 2007 15th European Signal Processing Conference.
[3] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[4] S Rakesh,et al. Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping , 2012 .
[5] Wei Sun,et al. Detect LSB Steganography with Bit Plane Randomness Tests , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[6] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[7] Gilbert L. Peterson,et al. Detecting Steganography Using Multi-Class Classification , 2007, IFIP Int. Conf. Digital Forensics.
[8] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[9] Xiaolin Wu,et al. A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.
[10] C.E. Shannon,et al. Communication in the Presence of Noise , 1949, Proceedings of the IRE.
[11] Sorina Dumitrescu,et al. LSB steganalysis based on high-order statistics , 2005, MM&Sec '05.
[12] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[13] Karen O. Egiazarian,et al. Image denoising with block-matching and 3D filtering , 2006, Electronic Imaging.
[14] Henry Chu,et al. Soft computing approach to steganalysis of LSB embedding in digital images , 2005, ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005..
[15] Jessica J. Fridrich,et al. New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.
[16] Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.
[17] B. M. Imran,et al. An efficient steganographic technique based on chaotic maps and adpative PPM embedding , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.
[18] Tomás Pevný,et al. From Blind to Quantitative Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[19] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[20] Chia-Chen Lin,et al. HighCapacity Data Hiding Scheme for DCT-based Images , 2010, J. Inf. Hiding Multim. Signal Process..
[21] Constantinos Patsakis,et al. A DCT Steganographic Classifier Based on Compressive Sensing , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[22] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[23] J. Fridrich,et al. Attacking the OutGuess , 2002 .
[24] R. Marks. Introduction to Shannon Sampling and Interpolation Theory , 1990 .
[25] William A. Pearlman,et al. Kernel Fisher discriminant for steganalysis of JPEG hiding methods , 2004, IS&T/SPIE Electronic Imaging.
[26] Constantinos Patsakis,et al. LSB Steganographic Detection Using Compressive Sensing , 2011 .
[27] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[28] Karen O. Egiazarian,et al. Image restoration by sparse 3D transform-domain collaborative filtering , 2008, Electronic Imaging.
[29] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[30] E. Candès,et al. Stable signal recovery from incomplete and inaccurate measurements , 2005, math/0503066.
[31] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[32] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[33] Alessandro Foi,et al. JOINT IMAGE SHARPENING AND DENOISING BY 3 D TRANSFORM-DOMAIN COLLABORATIVE FILTERING , 2007 .
[34] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[35] S. Frick,et al. Compressed Sensing , 2014, Computer Vision, A Reference Guide.
[36] Qingzhong Liu,et al. Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[37] Bin Li,et al. Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels , 2007, 2007 IEEE International Conference on Image Processing.
[38] Josef Pieprzyk,et al. Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis , 2010, ISPEC.
[39] Rajarathnam Chandramouli,et al. Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.
[40] Alessandro Foi,et al. Image Denoising by Sparse 3-D Transform-Domain Collaborative Filtering , 2007, IEEE Transactions on Image Processing.
[41] Gregg H. Gunsch,et al. Blind Stenanography Detection Using a Computational Immune System: A Work in Progress , 2003, Int. J. Digit. EVid..
[42] Tomás Pevný,et al. Novelty detection in blind steganalysis , 2008, MM&Sec '08.
[43] Qingzhong Liu,et al. Building resilient classifiers for LSB matching steganography , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[44] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .