Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition
暂无分享,去创建一个
Xinpeng Zhang | Mi Wen | Jiang Yu | Kui Wu | Jingsheng Lei | Fengyong Li | Xinpeng Zhang | Fengyong Li | M. Wen | Jingsheng Lei | Kui Wu | Jiang Yu
[1] Jessica Fridrich,et al. Steganography With Multiple JPEG Images of the Same Scene , 2017, IEEE Transactions on Information Forensics and Security.
[2] Bernhard Schölkopf,et al. A Kernel Method for the Two-Sample-Problem , 2006, NIPS.
[3] Jessica J. Fridrich,et al. Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.
[4] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[5] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[6] Tomás Pevný,et al. Batch steganography in the real world , 2012, MM&Sec '12.
[7] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[8] Tomás Pevný,et al. Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[9] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[10] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[11] Xinpeng Zhang,et al. Spatial Steganalysis Using Contrast of Residuals , 2016, IEEE Signal Processing Letters.
[12] Hai-Dong Yuan,et al. Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..
[13] Victor-Emil Neagoe,et al. Inversion of the Van der Monde matrix , 1996, IEEE Signal Processing Letters.
[14] Changjun Liu,et al. Embedding Strategy for Batch Adaptive Steganography , 2016, IWDW.
[15] Tomás Pevný,et al. The square root law of steganographic capacity , 2008, MM&Sec '08.
[16] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[17] Mi Wen,et al. Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.
[18] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[19] Jessica Fridrich,et al. Kernel methods in steganalysis , 2008 .
[20] Adi Shamir,et al. How to share a secret , 1979, CACM.
[21] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[22] Jessica J. Fridrich,et al. Practical strategies for content-adaptive batch steganography and pooled steganalysis , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Vojtöch Holub,et al. CONTENT ADAPTIVE STEGANOGRAPHY - DESIGN AND DETECTION , 2014 .
[24] Masoud Nikravesh,et al. Feature Extraction - Foundations and Applications , 2006, Feature Extraction.
[25] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[26] Changjun Liu,et al. Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain , 2017, Multimedia Tools and Applications.
[27] Tomás Pevný,et al. A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.
[28] Amal Said Khalifa,et al. Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.
[29] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[30] Xian-Da Zhang,et al. Matrix Analysis and Applications , 2017 .
[31] Andrew D. Ker. The Square Root Law of Steganography: Bringing Theory Closer to Practice , 2017, IH&MMSec.
[32] Hedieh Sajedi,et al. Adaptive batch steganography considering image embedding capacity , 2009 .
[33] KokSheik Wong,et al. An Overview of Information Hiding in H.264/AVC Compressed Video , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[34] Andrew D. Ker,et al. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.
[35] Weiming Zhang,et al. Efficient steganography based on a data decomposition mechanism , 2008, 2008 Third International Conference on Communications and Networking in China.