A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm
暂无分享,去创建一个
[1] Elke Franz,et al. Adaptive steganography based on dithering , 2004, MM&Sec '04.
[2] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[3] Jessica Fridrich,et al. Determining the stego algorithm for JPEG images , 2006 .
[4] Frank Y. Shih,et al. Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[5] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[6] Zheng Zhang,et al. Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[7] Thomas S. Huang,et al. An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..
[8] D. Janaki Ram,et al. Parallel Simulated Annealing Algorithms , 1996, J. Parallel Distributed Comput..
[9] Milan Sonka,et al. Image Processing, Analysis and Machine Vision , 1993, Springer US.
[10] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[11] Shih-Kun Huang,et al. Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..
[12] Deli Yang,et al. A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter , 2002, IEEE Pacific Rim Conference on Multimedia.
[13] Shih-Fu Chang,et al. Watermarking capacity of digital images based on domain-specific masking effects , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[14] Nasir D. Memon,et al. PSTEG: steganographic embedding through patching [image steganography] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[15] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[16] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[17] M. Barni,et al. Data hiding for fighting piracy , 2004, IEEE Signal Processing Magazine.
[18] Guo-Shiang Lin,et al. Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques , 2006, IEEE Transactions on Information Forensics and Security.
[19] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[20] Tao Zhang,et al. A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.
[21] Rajarathnam Chandramouli,et al. Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.
[22] Naokazu Yokoya,et al. Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[23] Deepa Kundur,et al. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain , 2006, IEEE Transactions on Information Forensics and Security.
[24] Bin Li,et al. Steganalysis of Multiple-Base Notational System Steganography , 2008, IEEE Signal Processing Letters.
[25] Masaaki Fujiyoshi,et al. Quantization-based image steganography without data hiding position memorization , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[26] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[27] Wilson S. Geisler,et al. Image quality assessment based on a degradation model , 2000, IEEE Trans. Image Process..
[28] Sang-Hui Park,et al. Digital Watermarking For Copyright Protection Of Mpeg2 Compressed Video , 1998, International 1998 Conference on Consumer Electronics.
[29] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[30] Gregory L. Heileman,et al. Fast and robust watermarking of JPEG files , 2002, Proceedings Fifth IEEE Southwest Symposium on Image Analysis and Interpretation.
[31] Ingemar J. Cox,et al. Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.
[32] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[33] Albert J. Ahumada,et al. Improved detection model for DCT coefficient quantization , 1993, Electronic Imaging.
[34] Fernando Pérez-González,et al. Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks , 2007, EURASIP J. Inf. Secur..
[35] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[36] D. Levicky,et al. Human Visual System Models in Digital Image Watermarking , 2004 .
[37] Nasir D. Memon,et al. A Distribution Detection Framework for Watermark Analysis , 2000 .
[38] Min Wu,et al. Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..
[39] Qing Chen,et al. Reliable image/video watermark retrieval in the presence of lossy compression , 2005, 2005 13th European Signal Processing Conference.
[40] Der-Chyuan Lou,et al. Adaptive digital watermarking using fuzzy logic techniques , 2002 .
[41] Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.
[42] Ja-Ling Wu,et al. Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques , 2008, IEEE Transactions on Multimedia.
[43] Nasir D. Memon,et al. Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.
[44] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.