Minimizing embedding impact in steganography using trellis-coded quantization
暂无分享,去创建一个
Jessica J. Fridrich | Tomás Filler | Jan Judas | J. Fridrich | Tomás Filler | Jan Judas | Tomáš Filler
[1] Hyoung Joong Kim,et al. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.
[2] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[3] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[4] Marten van Dijk,et al. Embedding Information in Grayscale Images , 2001 .
[5] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[6] Andrew J. Viterbi,et al. Trellis Encoding of memoryless discrete-time sources with a fidelity criterion , 1974, IEEE Trans. Inf. Theory.
[7] Jessica J. Fridrich,et al. Constructing Good Covering Codes for Applications in Steganography , 2008, Trans. Data Hiding Multim. Secur..
[8] Weiming Zhang,et al. Generalization of the ZZW Embedding Construction for Steganography , 2009, IEEE Transactions on Information Forensics and Security.
[9] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[10] Jessica J. Fridrich,et al. Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.
[11] Neri Merhav,et al. On the error exponent of trellis source coding , 2005, IEEE Transactions on Information Theory.
[12] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[13] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[14] Weiming Zhang,et al. Improving the Embedding Efficiency of Wet Paper Codes by Paper Folding , 2009, IEEE Signal Processing Letters.
[15] Yuhong Yang,et al. Information Theory, Inference, and Learning Algorithms , 2005 .
[16] Vladimir Sidorenko,et al. Decoding of convolutional codes using a syndrome trellis , 1994, IEEE Trans. Inf. Theory.
[17] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[18] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[19] Jessica J. Fridrich,et al. Wet ZZW construction for steganography , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[20] Antje Winkler,et al. Embedding with syndrome coding based on BCH codes: The corrected version of this paper is now available as full text. To view the original document as presented in the printed proceedings (with its errors), download the supplemental file , 2006, MM&Sec '06.
[21] Aaron D. Wyner,et al. Coding Theorems for a Discrete Source With a Fidelity CriterionInstitute of Radio Engineers, International Convention Record, vol. 7, 1959. , 1993 .
[22] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[23] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[24] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[25] Jessica J. Fridrich,et al. Asymptotic Behavior of the ZZW Embedding Construction , 2009, IEEE Transactions on Information Forensics and Security.
[26] R. Crandall,et al. Some Notes on Steganography , 1999 .
[27] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[28] Jessica J. Fridrich,et al. Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.
[29] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[30] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.