Steganalysis of least significant bit matching using multi-order differences
暂无分享,去创建一个
Zhihua Xia | Xingming Sun | Xinhui Wang | Baowei Wang | Xingming Sun | Baowei Wang | Zhihua Xia | Xinhui Wang | Xingming Sun
[1] Jun Zhang,et al. Detection of LSB Matching Steganography using the Envelope of Histogram , 2009, J. Comput..
[2] Bin Li,et al. Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels , 2007, 2007 IEEE International Conference on Image Processing.
[3] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[4] Tieyong Zeng,et al. Reliable histogram features for detecting LSB matching , 2010, 2010 IEEE International Conference on Image Processing.
[5] Ingemar J. Cox,et al. Detection of ±1 LSB steganography based on the amplitude of histogram local extrema , 2008, 2008 15th IEEE International Conference on Image Processing.
[6] Qingzhong Liu,et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..
[7] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[8] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[9] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[10] Tao Zhang,et al. Steganalysis of LSB matching based on statistical modeling of pixel difference distributions , 2010, Inf. Sci..
[11] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[12] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[13] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[14] Gang Xiong,et al. Image textural features for steganalysis of spatial domain steganography , 2012, J. Electronic Imaging.
[15] Fenlin Liu,et al. A review on blind detection for image steganography , 2008, Signal Process..
[16] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[17] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[18] Noboru Babaguchi,et al. Run length based steganalysis for LSB matching steganography , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[19] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[20] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[21] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[22] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.