Effects of double JPEG compression on steganalysis
暂无分享,去创建一个
[1] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[2] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[3] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[4] Daniel S. Yeung,et al. Localized Generalization Error Model and Its Application to Architecture Selection for Radial Basis Function Neural Network , 2007, IEEE Transactions on Neural Networks.
[5] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[6] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.
[7] Fangjun Huang,et al. Detecting Double JPEG Compression With the Same Quantization Matrix , 2010, IEEE Transactions on Information Forensics and Security.
[8] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[9] Wei Su,et al. A machine learning based scheme for double JPEG compression detection , 2008, 2008 19th International Conference on Pattern Recognition.
[10] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[11] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[12] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[13] Dai Meng. Steganalysis Based on Double JPEG Compression , 2007 .
[14] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[15] Patrick P. K. Chan,et al. Blind steganalysis with high generalization capability for different image databases using L-GEM , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[16] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.