Forensic steganalysis: determining the stego key in spatial domain steganography
暂无分享,去创建一个
Jessica J. Fridrich | Miroslav Goljan | David Soukal | Taras Holotyak | J. Fridrich | M. Goljan | D. Soukal | T. Holotyak
[1] Murray R. Spiegel,et al. Schaum's outline of theory and problems of statistics. , 1961 .
[2] Jessica J. Fridrich,et al. Stochastic approach to secret message length estimation in ±k embedding steganography , 2005, IS&T/SPIE Electronic Imaging.
[3] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[4] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[5] Nasir D. Memon,et al. On sequential watermark detection , 2003, IEEE Trans. Signal Process..
[6] Jessica J. Fridrich,et al. Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.
[7] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[8] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[9] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[10] Rajarathnam Chandramouli,et al. Locally most-powerful detector for secret key estimation in spread spectrum image steganography , 2004, IS&T/SPIE Electronic Imaging.
[11] Kannan Ramchandran,et al. Low-complexity image denoising based on statistical modeling of wavelet coefficients , 1999, IEEE Signal Processing Letters.
[12] Michael T. Orchard,et al. Image coding based on mixture modeling of wavelet coefficients and a fast estimation-quantization framework , 1997, Proceedings DCC '97. Data Compression Conference.
[13] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[14] R. Chandramouli,et al. Secret key estimation in sequential steganography , 2005 .
[15] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[16] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[17] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.