Effective Steganalysis of YASS Based on Statistical Moments of Wavelet Characteristic Function and Markov Process
暂无分享,去创建一个
[1] Veena H. Bhat,et al. Steganalysis of YASS Using Huffman Length Statistics , 2011 .
[2] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[3] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[4] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[5] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[6] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[7] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[8] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[9] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[10] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[11] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[12] Jessica J. Fridrich,et al. Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.
[13] Mauro Barni,et al. A Comparative Study of ±1 Steganalyzers , 2008 .
[14] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[15] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[16] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..
[17] Noboru Babaguchi,et al. Breaking the YASS algorithm via pixel and DCT coefficients analysis , 2008, 2008 19th International Conference on Pattern Recognition.
[18] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .