Towards digital video steganalysis using asymptotic memoryless detection
暂无分享,去创建一个
[1] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[2] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[3] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[4] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[5] Gary L. Wise,et al. Asymptotic memoryless detection of random signals in dependent noise , 1981 .
[6] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[7] B. S. Manjunath,et al. Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.
[8] Nasir D. Memon,et al. Steganalysis based on image quality metrics , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[9] Andrew G. Tescher,et al. Multimedia Systems and Applications IV , 2001 .
[10] Deepa Kundur,et al. Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain , 2006, IEEE Transactions on Information Forensics and Security.
[11] Joseph P. Romano,et al. Testing Statistical Hypotheses, Third Edition , 2008, Springer texts in statistics.
[12] Steven J. Murdoch,et al. Embedding Covert Channels into TCP/IP , 2005, Information Hiding.
[13] Yunfei Zheng,et al. Video error concealment based on implicit motion models , 2005, SPIE Optics East.
[14] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[15] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[16] Deepa Kundur,et al. Practical Data Hiding in TCP/IP , 2002 .
[17] G. L. Wise,et al. A Detection Scheme for Dependent Noise Processes , 1980 .