Single Actor Pooled Steganalysis
暂无分享,去创建一个
[1] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[2] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[3] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[4] Mi Wen,et al. Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.
[5] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[6] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[7] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[8] Xinpeng Zhang,et al. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.
[9] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[10] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[11] Bin Li,et al. New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.
[12] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[13] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[14] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[15] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[16] Andrew D. Ker,et al. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.
[17] Tomás Pevný,et al. A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.
[18] Rainer Bhme. Advanced Statistical Steganalysis , 2010 .
[19] Tomás Pevný,et al. Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[20] Tomás Pevný,et al. Identifying a steganographer in realistic and heterogeneous data sets , 2012, Other Conferences.