Performance analysis of image steganalysis techniques and future research directives
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[2] Cynthia E. Irvine,et al. Surmounting the Effects of Lossy Compression on Steganography , 1996 .
[3] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[4] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[5] R. Shreelekshmi,et al. Improved LSB stegananalysis based on analysis of adjacent pixel pairs , 2013, Signal Image Video Process..
[6] Te-Ming Tu,et al. A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing , 2008, J. Multim..
[7] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[8] Andrew D. Ker. A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.
[9] Cheng-Hsing Yang,et al. Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy , 2007 .
[10] 王朔中,et al. Steganography in binary image by checking data-carrying eligibility of boundary pixels , 2007 .
[11] Josef Pieprzyk,et al. Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography , 2010, 2010 International Conference on Availability, Reliability and Security.
[12] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[13] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[14] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[15] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[16] Reza Jafari,et al. Efficient steganalysis of images: learning is good for anticipation , 2012, Pattern Analysis and Applications.
[17] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[18] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[19] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[20] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[21] S. Samavi,et al. Steganalysis of Pixel-Value Differencing Steganographic Method , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[22] Nasir D. Memon,et al. On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.
[23] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[24] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[25] Rainer Böhme,et al. Assessment of Steganalytic Methods Using Multiple Regression Models , 2005, Information Hiding.
[26] Ali Hamzeh,et al. A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.
[27] Sorina Dumitrescu,et al. Steganalysis of LSB embedding in multimedia signals , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[28] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[29] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[30] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.