Detection-and Information-Theoretic Analysis of Steganography and Fingerprinting
暂无分享,去创建一个
[1] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[2] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[3] Mung Chiang,et al. Duality between channel capacity and rate distortion with two-sided state information , 2002, IEEE Trans. Inf. Theory.
[4] S. Katzenbeisser,et al. A survey of steganographic techniques , .
[5] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[6] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[7] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[8] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..
[9] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[10] Jessica J. Fridrich,et al. Stochastic approach to secret message length estimation in ±k embedding steganography , 2005, IS&T/SPIE Electronic Imaging.
[11] Ying Wang,et al. Statistical modeling and steganalysis of DFT-based image steganography , 2006, Electronic Imaging.
[12] Eero P. Simoncelli,et al. Random Cascades on Wavelet Trees and Their Use in Analyzing and Modeling Natural Images , 2001 .
[13] Neri Merhav,et al. On the capacity game of private fingerprinting systems under collusion attacks , 2003, IEEE Transactions on Information Theory.
[14] Pierre Moulin,et al. The parallel-Gaussian watermarking game , 2004, IEEE Transactions on Information Theory.
[15] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[16] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[17] Ying Wang,et al. Error exponents for channel coding with side information , 2004, Information Theory Workshop.
[18] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[19] Zixiang Xiong,et al. Optimal number of features as a function of sample size for various classification rules , 2005, Bioinform..
[20] Jelena Kovacevic,et al. Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.
[21] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[22] Pierre Moulin,et al. Analysis of Multiresolution Image Denoising Schemes Using Generalized Gaussian and Complexity Priors , 1999, IEEE Trans. Inf. Theory.
[23] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[24] Yun Q. Shi,et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[25] Richard E. Blahut,et al. Principles and practice of information theory , 1987 .
[26] N. Merhav,et al. On the capacity game of public watermarking systems , 2002, Proceedings IEEE International Symposium on Information Theory,.
[27] N. Ushakov. Selected Topics in Characteristic Functions , 1999 .
[28] Yuichi Mori,et al. Handbook of Computational Statistics , 2004 .
[29] Josef Kittler,et al. Floating search methods in feature selection , 1994, Pattern Recognit. Lett..
[30] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[31] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[32] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[33] Ying Wang,et al. Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.
[34] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[35] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[36] Michael T. Orchard,et al. Image coding based on mixture modeling of wavelet coefficients and a fast estimation-quantization framework , 1997, Proceedings DCC '97. Data Compression Conference.
[37] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[38] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[39] Ying Wang,et al. Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.
[40] Anil K. Jain,et al. Feature Selection: Evaluation, Application, and Small Sample Performance , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[41] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[42] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[43] David L. Donoho,et al. Implications for Image Watermarking of Recent Work in Image Analysis and Representation , 2002, IWDW.
[44] Abbas El Gamal,et al. On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.
[45] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[46] Jeffrey H. Shapiro. Bounds on the area under the ROC curve , 1999 .
[47] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[48] R. Zamir,et al. On lattice quantization noise , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[49] B. S. Manjunath,et al. Determining Achievable Rates for Secure, Zero Divergence, Steganography , 2006, 2006 International Conference on Image Processing.
[50] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[51] Pierre Moulin,et al. New results on steganographic capacity , 2004 .
[52] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[53] Ece Dept,et al. A STOCHASTIC QIM ALGORITHM FOR ROBUST, UNDETECTABLE IMAGE WATERMARKING , 2004 .
[54] Kannan Ramchandran,et al. Duality between source coding and channel coding and its extension to the side information case , 2003, IEEE Trans. Inf. Theory.
[55] Jean Dickinson Gibbons,et al. Nonparametric Statistical Inference , 1972, International Encyclopedia of Statistical Science.
[56] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[57] Shlomo Shamai,et al. Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.
[58] Gregory W. Wornell,et al. The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.
[59] B. S. Manjunath,et al. Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.
[60] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[61] Eero P. Simoncelli,et al. On Advances in Statistical Modeling of Natural Images , 2004, Journal of Mathematical Imaging and Vision.
[62] Neri Merhav,et al. On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.
[63] Eero P. Simoncelli. Higher-order statistical models of visual images , 1999, Proceedings of the IEEE Signal Processing Workshop on Higher-Order Statistics. SPW-HOS '99.
[64] Robert V. Brill,et al. Applied Statistics and Probability for Engineers , 2004, Technometrics.
[65] Prakash Narayan,et al. Reliable communication under channel uncertainty (invited paper) , 2000 .
[66] Neri Merhav,et al. Achievable Error Exponents for the Private Fingerprinting Game , 2007, IEEE Transactions on Information Theory.
[67] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[68] Moshe Ben-Bassat,et al. 35 Use of distance measures, information measures and error bounds in feature evaluation , 1982, Classification, Pattern Recognition and Reduction of Dimensionality.
[69] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[70] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[71] Neri Merhav,et al. On the random coding error exponents of the single-user and the multiple-access Gel'fand-Pinsker channels , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[72] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[73] B. Picinbono. Introduction to Detection and Estimation , 1977 .
[74] Gregory Kipper,et al. Investigator's Guide to Steganography , 2003 .
[75] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[76] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[77] David G. Stork,et al. Pattern Classification , 1973 .
[78] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[79] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[80] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[81] Min Wu,et al. Collusion-resistant fingerprinting for multimedia , 2004 .
[82] Mauro Barni,et al. Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.
[83] Katalin Marton,et al. A coding theorem for the discrete memoryless broadcast channel , 1979, IEEE Trans. Inf. Theory.
[84] E. Lukács. CERTAIN ENTIRE CHARACTERISTIC FUNCTIONS , 2005 .
[85] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[86] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[87] Grigory Kabatiansky,et al. Steganography via covering codes , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..