MBNS Steganogram Detection and Payload Capacity Estimation Exploiting the Statistical Moments of Entropy Measure
暂无分享,去创建一个
[1] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[2] A. Touir,et al. A New Image Steganography Technique , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[3] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[4] John Langford,et al. Provably Secure Steganography , 2002, IEEE Transactions on Computers.
[5] Ling-di Ping,et al. A New Steganography Algorithm Based on Spatial Domain , 2009, 2009 Second International Symposium on Information Science and Engineering.
[6] M. S. Sutaone,et al. Image based steganography using LSB insertion technique , 2008 .
[7] Weiguo Gong,et al. A novel steganography algorithm based on Curvelet transform against JPEG attacks , 2010, 2010 8th World Congress on Intelligent Control and Automation.
[8] Thomas J. Watson,et al. An empirical study of the naive Bayes classifier , 2001 .
[9] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[10] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[11] Sushil Kumar,et al. Secure image steganography based on Slantlet transform , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).
[12] Xinpeng Zhang,et al. Multibit Assignment Steganography in Palette Images , 2008, IEEE Signal Processing Letters.
[13] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[14] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[15] Tung-Shou Chen,et al. Lossless Steganography for AMBTC-Compressed Images , 2008, 2008 Congress on Image and Signal Processing.
[16] Leonardo Noriega,et al. Multilayer Perceptron Tutorial , 2005 .
[17] Adnan Abdul-Aziz Gutub,et al. RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[18] Bin Li,et al. Steganalysis of Multiple-Base Notational System Steganography , 2008, IEEE Signal Processing Letters.
[19] Mahdi Ramezani,et al. Adaptive Image Steganography with Mod-4 Embedding Using Image Contrast , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[20] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[21] M. S. Sutaone,et al. Image based steganography using LSB insertion , 2008 .
[22] Liang Zhang,et al. A High-Capacity Steganography Scheme for JPEG2000 Baseline System , 2009, IEEE Transactions on Image Processing.
[23] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[24] Adnan Abdul-Aziz Gutub,et al. Triple-A: Secure RGB image steganography based on randomization , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[25] Anjali A. Shejul,et al. A DWT Based Approach for Steganography Using Biometrics , 2010, 2010 International Conference on Data Storage and Data Engineering.
[26] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[27] B. Luo,et al. A Color Images Steganography Method by Multiple Embedding Strategy Based on Sobel Operator , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[28] Lior Rokach,et al. Top-down induction of decision trees classifiers - a survey , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[29] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[30] R. Shreelekshmi,et al. Cover Image Preprocessing for More Reliable LSB Replacement Steganography , 2010, 2010 International Conference on Signal Acquisition and Processing.
[31] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[32] D. Lakshmi Narayana,et al. High Capacity Image Steganography in Wavelet Domain , 2022 .