Steganography in animated emoji using self-reference
暂无分享,去创建一个
[1] Rinaldi Munir. Chaos-based modified “EzStego” algorithm for improving security of message hiding in GIF image , 2015, 2015 International Conference on Computer, Control, Informatics and its Applications (IC3INA).
[2] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[3] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[4] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[5] Jessica J. Fridrich,et al. Model Based Steganography with Precover , 2017, Media Watermarking, Security, and Forensics.
[6] Xinpeng Zhang,et al. Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition , 2018, IEEE Access.
[7] Jessica Fridrich,et al. Steganography With Multiple JPEG Images of the Same Scene , 2017, IEEE Transactions on Information Forensics and Security.
[8] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[9] Lei Zhang,et al. Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising , 2016, IEEE Transactions on Image Processing.
[10] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[11] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[12] Rinaldi Munir. Visual Cryptography of Animated GIF Image Based on XOR Operation , 2017, 2017 International Conference on Advanced Computing and Applications (ACOMP).
[13] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[14] Rinaldi Munir,et al. Message hiding in animated GIF using multibit assignment method , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).
[15] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[16] Stefan Winkler,et al. A vision-based masking model for spread-spectrum image watermarking , 2002, IEEE Trans. Image Process..
[17] Xinpeng Zhang,et al. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.
[18] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[19] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[20] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[21] Distortion Function for Emoji Image Steganography , 2019 .
[22] S.G.K. Samaratunge. New steganography technique for palette based images , 2007, 2007 International Conference on Industrial and Information Systems.
[23] Zhenxing Qian,et al. On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.
[24] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[25] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[26] Kousik Dasgupta,et al. Steganography in Grey Scale Animated GIF using Hash based Pixel Value Differencing , 2018, 2018 Fourth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
[27] Xinpeng Zhang,et al. Distortion function based on residual blocks for JPEG steganography , 2017, Multimedia Tools and Applications.
[28] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[29] Jessica J. Fridrich,et al. Side-informed steganography with additive distortion , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[30] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[31] Rinaldi Munir. Application of the modified EzStego algorithm for hiding secret messages in the animated GIF images , 2016, 2016 2nd International Conference on Science in Information Technology (ICSITech).