Fast projections of spatial rich model feature for digital image steganalysis
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[2] Nasir D. Memon,et al. Steganalysis of watermarking techniques using image quality metrics , 2001, IS&T/SPIE Electronic Imaging.
[3] Jessica J. Fridrich,et al. Further study on the security of S-UNIWARD , 2014, Electronic Imaging.
[4] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[5] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[6] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[7] Rainer Bhme. Advanced Statistical Steganalysis , 2010 .
[8] Heikki Mannila,et al. Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.
[9] Jiwu Huang,et al. New Channel Selection Rule for JPEG Steganography , 2012, IEEE Transactions on Information Forensics and Security.
[10] Alfredo De Santis,et al. E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[11] Bo Li,et al. Text split-based steganography in OOXML format documents for covert communication , 2012, Secur. Commun. Networks.
[12] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[13] Jessica J. Fridrich,et al. CFA-aware features for steganalysis of color images , 2015, Electronic Imaging.
[14] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[15] Robert Wille,et al. Foreword: Special Issue on Reversible Computation , 2012, J. Multiple Valued Log. Soft Comput..
[16] Francesco Palmieri,et al. New Steganographic Techniques for the OOXML File Format , 2011, ARES.
[17] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[18] Alfredo De Santis,et al. Steganography and Secure Communication on Online Social Networks and Online Photo Sharing , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[19] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[20] Alfredo De Santis,et al. An asynchronous covert channel using spam , 2012, Comput. Math. Appl..
[21] Jessica J. Fridrich,et al. Rich model for Steganalysis of color images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[22] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[23] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[24] Mazdak Zamani,et al. An overview on audio steganography techniques , 2012 .
[25] Pengfei Wang,et al. Pure spatial rich model features for digital image steganalysis , 2015, Multimedia Tools and Applications.
[26] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[27] Marco Botta,et al. Fragile watermarking using Karhunen–Loève transform: the KLT-F approach , 2015, Soft Comput..
[28] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[29] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[30] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[31] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[32] Andrew D. Ker. Implementing the projected spatial rich features on a GPU , 2014, Electronic Imaging.
[33] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[34] Benjamin Recht,et al. Random Features for Large-Scale Kernel Machines , 2007, NIPS.
[35] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[36] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[37] Kenli Li,et al. Adaptive energy-efficient scheduling for real-time tasks on DVS-enabled heterogeneous clusters , 2012, J. Parallel Distributed Comput..
[38] Eghbal G. Mansoori,et al. GACH: a grid-based algorithm for hierarchical clustering of high-dimensional data , 2014, Soft Comput..
[39] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[40] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.