Effect of Image Downsampling on Steganographic Security
暂无分享,去创建一个
[1] Yuan-Gen Wang,et al. Security Analysis on Spatial $\pm$1 Steganography for JPEG Decompressed Images , 2011, IEEE Signal Processing Letters.
[2] Sylvain Meignen,et al. On the modeling of small sample distributions with generalized Gaussian density in a maximum likelihood framework , 2006, IEEE Transactions on Image Processing.
[3] Matthew C. Stamm. Digital Multimedia Forensics and Anti-Forensics , 2012 .
[4] Jessica J. Fridrich,et al. JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts , 2012, Information Hiding.
[5] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[6] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[7] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[8] Jessica J. Fridrich,et al. Effect of Cover Quantization on Steganographic Fisher Information , 2012, IEEE Transactions on Information Forensics and Security.
[9] Jessica J. Fridrich,et al. Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.
[10] Jessica J. Fridrich,et al. Optimizing pixel predictors for steganalysis , 2012, Other Conferences.
[11] Jessica J. Fridrich,et al. Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.
[12] S. Kullback,et al. Information Theory and Statistics , 1959 .
[13] R. Keys. Cubic convolution interpolation for digital image processing , 1981 .
[14] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[15] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[16] Ingemar J. Cox,et al. A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[17] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[18] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[19] Mauro Barni,et al. A Comparative Study of ±1 Steganalyzers , 2008 .
[20] Andrew S. Glassner,et al. Graphics Gems , 1990 .
[21] Rainer Böhme,et al. Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.
[22] Leonie Moench,et al. Graphics Gems I , 2016 .
[23] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[24] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[25] Tomás Pevný,et al. The square root law of steganographic capacity , 2008, MM&Sec '08.
[26] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[27] Jessica J. Fridrich,et al. Steganalysis in resized images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[28] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.