Is image steganography natural?
暂无分享,去创建一个
[1] David Mumford,et al. Statistics of natural images and models , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).
[2] H. Hotelling. Relations Between Two Sets of Variates , 1936 .
[3] A.N. Netravali,et al. Picture coding: A review , 1980, Proceedings of the IEEE.
[4] Pierre Moulin,et al. The parallel-Gaussian watermarking game , 2004, IEEE Transactions on Information Theory.
[5] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[6] Sergio Verdú,et al. Simulation of random processes and rate-distortion theory , 1996, IEEE Trans. Inf. Theory.
[7] Neri Merhav,et al. On universal simulation of information sources using training data , 2004, IEEE Transactions on Information Theory.
[8] A. G. Greenhill,et al. Handbook of Mathematical Functions with Formulas, Graphs, , 1971 .
[9] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[10] Gadiel Seroussi. On universal types , 2004, ISIT.
[11] Mamoru Hoshi,et al. Interval algorithm for random number generation , 1997, IEEE Trans. Inf. Theory.
[12] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .
[13] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[14] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[15] Pierre Moulin,et al. An information-theoretic model for image watermarking and data hiding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[16] Gadiel Seroussi,et al. Universal Types and Simulation of Individual Sequences , 2004, LATIN.
[17] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[18] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[19] Yann Gousseau,et al. Are Natural Images of Bounded Variation? , 2001, SIAM J. Math. Anal..
[20] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[21] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[22] André Kaup,et al. Steganographic system based on higher-order statistics , 2003, IS&T/SPIE Electronic Imaging.
[23] D. Owen. Handbook of Mathematical Functions with Formulas , 1965 .
[24] Gadiel Seroussi,et al. On universal types , 2004, IEEE Transactions on Information Theory.
[25] Anuj Srivastava,et al. Probability Models for Clutter in Natural Images , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[26] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[27] Ulf Grenander,et al. TOWARDS A THEORY OF NATURAL SCENES 1 , 2003 .
[28] Anuj Srivastava,et al. Universal Analytical Forms for Modeling Image Probabilities , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[29] Sergio Verdú,et al. Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.
[30] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[31] L. Rudin,et al. Nonlinear total variation based noise removal algorithms , 1992 .
[32] Bernd Girod,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[33] J. Morel,et al. The size of objects in natural , 1999 .