Robust steganography resisting JPEG compression by improving selection of cover element

[1]  Hong Zhang,et al.  Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching , 2019, IEEE Transactions on Information Forensics and Security.

[2]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[3]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Chuan Qin,et al.  Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Zhaoxia Yin,et al.  Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-Compression , 2020, IEEE Transactions on Signal and Information Processing over Networks.

[6]  Chuan Qin,et al.  Dither modulation based adaptive steganography resisting jpeg compression and statistic detection , 2017, Multimedia Tools and Applications.

[7]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[9]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[10]  Weiming Zhang,et al.  Decomposing Joint Distortion for Adaptive Steganography , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[13]  Jessica J. Fridrich,et al.  Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.

[14]  Kejiang Chen,et al.  Robust adaptive steganography based on generalized dither modulation and expanded embedding domain , 2020, Signal Process..

[15]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[16]  Xiangyang Luo,et al.  A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients , 2019, Journal of Ambient Intelligence and Humanized Computing.

[17]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Fenlin Liu,et al.  Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection , 2017, Multimedia Tools and Applications.

[19]  Jessica Fridrich,et al.  Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model , 2021, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[21]  Florent Retraint,et al.  Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters , 2014, IH&MMSec '14.

[22]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Jessica J. Fridrich,et al.  Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.

[24]  Florent Retraint,et al.  Steganalysis of JSteg algorithm using hypothesis testing theory , 2015, EURASIP J. Inf. Secur..

[25]  Chuan Qin,et al.  Anti-compression JPEG steganography over repetitive compression networks , 2020, Signal Process..

[26]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[27]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[28]  Tong Qiao,et al.  Robust Steganography by Modifying Sign of DCT Coefficients , 2019, IEEE Access.

[29]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[30]  Xiangyang Luo,et al.  Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images , 2021, IEEE Transactions on Dependable and Secure Computing.

[31]  Fenlin Liu,et al.  A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[32]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.