Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system
暂无分享,去创建一个
[1] Deli Yang,et al. A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter , 2002, IEEE Pacific Rim Conference on Multimedia.
[2] Rajarathnam Chandramouli,et al. Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.
[3] Naokazu Yokoya,et al. Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[4] Carl E. Halford,et al. Developing operational performance metrics using image comparison metrics and the concept of degradation space , 1999 .
[5] Thomas S. Huang,et al. An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..
[6] Andrew D. Ker. A Weighted Stego Image Detector for Sequential LSB Replacement , 2007 .
[7] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[8] Jiwu Huang,et al. Adaptive image watermarking scheme based on visual masking , 1998 .
[9] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[10] Chin-Chen Chang,et al. A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..
[11] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[12] Scott J. Daly,et al. Visible differences predictor: an algorithm for the assessment of image fidelity , 1992, Electronic Imaging.
[13] O-Hyung Kwon,et al. Wavelet based watermarking method for digital images using the human visual system , 1999 .
[14] Thierry Pun,et al. StegoWall: blind statistical detection of hidden data , 2002, IS&T/SPIE Electronic Imaging.
[15] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[16] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[17] Nasir D. Memon,et al. A distributed detection framework for Steganalysis , 2000, MULTIMEDIA '00.
[18] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[19] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[20] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[21] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[22] Fang Min. A Novel Intrusion Detection Method Based on Combining Ensemble Learning With Induction-Enhanced Particle Swarm Algorithm , 2007, Third International Conference on Natural Computation (ICNC 2007).
[23] Maurice Maes,et al. Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.
[24] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[25] Andrew W. Moore,et al. X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.
[26] Zheng Zhang,et al. Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[27] Guo-Shiang Lin,et al. Robust image watermarking on the DCT domain , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[28] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[29] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[30] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[31] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[32] David G. Stork,et al. Pattern Classification , 1973 .
[33] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[34] Andrew B. Watson,et al. Digital images and human vision , 1993 .