暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[2] Li Lin,et al. Tackling Android Stego Apps in the Wild , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[3] Hal S. Stern. Statistical Issues in Forensic Science , 2017 .
[4] Li Lin,et al. Domain Adaptation in Steganalysis for the Spatial Domain , 2018, Media Watermarking, Security, and Forensics.
[5] Giulia Boato,et al. RAISE: a raw images dataset for digital image forensics , 2015, MMSys.
[6] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[7] Jill Slay,et al. Digital Forensics: Validation and Verification in a Dynamic Work Environment , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[8] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[9] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[10] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[11] Rainer Böhme,et al. The Dresden Image Database for Benchmarking Digital Image Forensics , 2010, J. Digit. Forensic Pract..
[12] Jessica J. Fridrich,et al. Toss that BOSSbase, Alice! , 2016, Media Watermarking, Security, and Forensics.
[13] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[14] Li Lin,et al. The Impact of Exposure Settings in Digital Image Forensics , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[15] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[16] Alice J. O'Toole,et al. FRVT 2006 and ICE 2006 Large-Scale Experimental Results , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] R. Crandall,et al. Some Notes on Steganography , 1999 .
[18] Li Lin,et al. Forensic Analysis of Android Steganography Apps , 2018, IFIP Int. Conf. Digital Forensics.
[19] Rainer Böhme,et al. An Epistemological Approach to Steganography , 2009, Information Hiding.
[20] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[21] Gary C. Kessler,et al. An Overview of Steganography for the Computer Forensics Examiner , 2004 .
[22] Timothy K Lu,et al. Encryption and steganography of synthetic gene circuits , 2018, Nature Communications.
[23] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[24] Rob. The Complete Works of William Shakespeare (Abridged) , 2013 .
[25] Frank Adelstein,et al. FAUST: Forensic artifacts of uninstalled steganography tools , 2009, Digit. Investig..
[26] C. Barden,et al. Proficiency Testing Trends Following the 2009 National Academy of Sciences Report, “Strengthening Forensic Science in the United States: A Path Forward” , 2016 .
[27] Anil K. Jain,et al. Unconstrained face recognition: Establishing baseline human performance via crowdsourcing , 2014, IEEE International Joint Conference on Biometrics.
[28] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.