Towards Improved Steganalysis: When Cover Selection is Used in Steganography
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[2] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[3] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[4] Xinpeng Zhang,et al. Secure Cover Selection for Steganography , 2019, IEEE Access.
[5] Vijay H. Mankar,et al. Curvelet transform and cover selection for secure steganography , 2018, Multimedia Tools and Applications.
[6] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[7] Xinpeng Zhang,et al. Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.
[8] Zhenxing Qian,et al. Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[9] Xinpeng Zhang,et al. Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.
[10] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[11] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[12] Mi Wen,et al. Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.
[13] Yang Ren-e. Cover selection for image steganography based on image characteristics , 2014 .
[14] Hedieh Sajedi,et al. Cover Selection Steganography Method Based on Similarity of Image Blocks , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[15] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[16] Adrian G. Bors,et al. Selection of robust features for the Cover Source Mismatch problem in 3D steganalysis , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).
[17] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[18] Yan Liu,et al. What makes the stego image undetectable? , 2015, ICIMCS '15.
[19] Fei Peng,et al. Robust Coverless Image Steganography Based on DCT and LDA Topic Classification , 2018, IEEE Transactions on Multimedia.
[20] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[21] Xinpeng Zhang,et al. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.
[22] Andrew D. Ker,et al. Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.
[23] Hedieh Sajedi,et al. Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.
[24] Nasir D. Memon,et al. Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.
[25] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[26] Marc Chaumont,et al. Steganalysis with cover-source mismatch and a small learning database , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[27] Zhenxing Qian,et al. Single Actor Pooled Steganalysis , 2018, ICGEC.
[28] Bin Li,et al. New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.
[29] Tomás Pevný,et al. A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.
[30] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[31] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[32] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[33] Andrew D. Ker,et al. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.
[34] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[35] Jing Dong,et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.
[36] Roman V. Meshcheryakov,et al. Approach to the selection of the best cover image for information embedding in JPEG images based on the principles of the optimality , 2018, J. Decis. Syst..
[37] Jiwu Huang,et al. Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.
[38] Jessica J. Fridrich,et al. Study of cover source mismatch in steganalysis and ways to mitigate its impact , 2014, Electronic Imaging.
[39] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[40] Tomás Pevný,et al. Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[41] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[42] Marc Chaumont,et al. Technical points about adaptive steganography by oracle (ASO) , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).