Modified YASS algorithm with virtual host block selection and model based embedding
暂无分享,去创建一个
[1] Anindya Sarkar,et al. Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[2] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[3] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[4] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[5] J. Fridrich,et al. Attacking the OutGuess , 2002 .
[6] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[7] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[8] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..
[9] Rainer Böhme,et al. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.
[10] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[11] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Transactions on Information Forensics and Security.
[12] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[13] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[14] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[15] Yao Zhao,et al. A high-performance YASS-like scheme using randomized big-blocks , 2010, 2010 IEEE International Conference on Multimedia and Expo.