Neighboring joint density-based JPEG steganalysis
暂无分享,去创建一个
[1] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[2] Noboru Babaguchi,et al. Breaking the YASS algorithm via pixel and DCT coefficients analysis , 2008, 2008 19th International Conference on Pattern Recognition.
[3] Alberto Leon-Garcia,et al. Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video , 1995, IEEE Trans. Circuits Syst. Video Technol..
[4] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[5] Tien D. Bui,et al. Multivariate statistical modeling for image denoising using wavelet transforms , 2005, Signal Process. Image Commun..
[6] Qingzhong Liu,et al. An improved approach to steganalysis of JPEG images , 2010, Inf. Sci..
[7] Qingzhong Liu,et al. Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images , 2007, IJCAI.
[8] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[9] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[10] Siwei Lyu,et al. How realistic is photorealistic , 2005 .
[11] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[12] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[13] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[14] Siwei Lyu,et al. How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.
[15] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[16] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..
[17] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[18] Qingzhong Liu,et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..
[19] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[20] Qingzhong Liu,et al. Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[21] Thorsten Joachims,et al. Estimating the Generalization Performance of an SVM Efficiently , 2000, ICML.
[22] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[23] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[24] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[25] Hyoung Joong Kim,et al. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.
[26] Qingzhong Liu,et al. Steganalysis of multi-class JPEG images based on expanded Markov features and polynomial fitting , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).
[27] Jens-Rainer Ohm,et al. Multimedia Communication Technology , 2004 .
[28] Qingzhong Liu,et al. Novel stream mining for audio steganalysis , 2009, MM '09.
[29] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[30] Jason Weston,et al. Gene Selection for Cancer Classification using Support Vector Machines , 2002, Machine Learning.
[31] Nikola K. Kasabov,et al. DENFIS: dynamic evolving neural-fuzzy inference system and its application for time-series prediction , 2002, IEEE Trans. Fuzzy Syst..
[32] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[33] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[34] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[35] Qingzhong Liu,et al. A new approach for JPEG resize and image splicing detection , 2009, MiFor '09.
[36] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[37] Roberto Basili,et al. Learning to Classify Text Using Support Vector Machines: Methods, Theory, and Algorithms by Thorsten Joachims , 2003, Comput. Linguistics.
[38] Anindya Sarkar,et al. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.
[39] William A. Pearlman,et al. Kernel Fisher discriminant for steganalysis of JPEG hiding methods , 2004, IS&T/SPIE Electronic Imaging.
[40] Qingzhong Liu,et al. Improved detection and evaluation for JPEG steganalysis , 2009, ACM Multimedia.
[41] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[42] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[43] Qingzhong Liu,et al. Derivative-based audio steganalysis , 2011, TOMCCAP.
[44] Qingzhong Liu,et al. Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..
[45] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[46] Thorsten Joachims,et al. Making large scale SVM learning practical , 1998 .
[47] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[48] Jens-Rainer Ohm. Multimedia Communication Technology: Representation,Transmission and Identification of Multimedia Signals , 2004 .
[49] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[50] Vladimir Vapnik,et al. Statistical learning theory , 1998 .