Information capacity of quantization steganography in the presence of active attack
暂无分享,去创建一个
[1] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[2] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[3] Mike Fisk,et al. Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.
[4] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[5] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[6] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[7] Xinpeng Zhang,et al. Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation , 2003, MMM-ACNS.
[8] Mark Ettinger,et al. Steganalysis and Game Equilibria , 1998, Information Hiding.
[9] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.