Classification Method of Jsteg Stego-Images and F5 Stego-Image
暂无分享,去创建一个
[1] Tao Zhang,et al. A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.
[2] Gilbert L. Peterson,et al. Multi-class classification fusion using boosting for identifying steganography methods , 2008, SPIE Defense + Commercial Sensing.
[3] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[4] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[5] Fenlin Liu,et al. Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods , 2006, Communications and Multimedia Security.
[6] Kevin Curran,et al. Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).
[7] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[8] Fenlin Liu,et al. A review on blind detection for image steganography , 2008, Signal Process..