Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics
暂无分享,去创建一个
[1] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Antoine Joux,et al. Fast Correlation Attacks: An Algorithmic Point of View , 2002, EUROCRYPT.
[3] Xinpeng Zhang,et al. Stego-Encoding with Error Correction Capability , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[4] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[5] Anindya Sarkar,et al. Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[6] Yun Q. Shi,et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[7] B. S. Manjunath,et al. Robust Image-Adaptive Data Hiding : Modeling , Source Coding and Channel Coding ∗ , 2003 .
[8] Horst Bischof,et al. Efficient Maximally Stable Extremal Region (MSER) Tracking , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[9] Benoit M. Macq,et al. Geometrically invariant watermarking using feature points , 2002, IEEE Trans. Image Process..
[10] Jessica J. Fridrich,et al. Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.
[11] Thierry Pun,et al. Multibit digital watermarking robust against local nonlinear geometrical distortions , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[12] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[13] B. S. Manjunath,et al. Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.
[14] Jiying Zhao,et al. LPM-based RST invariant digital image watermarking , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[15] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.
[16] Aliazam Abbasfar. Turbo-like Codes: Design for High Speed Decoding , 2007 .
[17] Abdulmotaleb El-Saddik,et al. A Survey of RST Invariant Image Watermarking Algorithms , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[18] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[19] M. Kutter. Watermaking resisting to translation, rotation, and scaling , 1998 .
[20] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[21] Andrew C. Gallagher. Detection of linear and cubic interpolation in JPEG compressed images , 2005, The 2nd Canadian Conference on Computer and Robot Vision (CRV'05).
[22] Anindya Sarkar,et al. Steganographic capacity estimation for the statistical restoration framework , 2008, Electronic Imaging.
[23] Anindya Sarkar,et al. Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[24] Tomás Pevný,et al. Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.
[25] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[26] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[27] Michael G. Strintzis,et al. Robust image watermarking based on generalized Radon transformations , 2003, IEEE Trans. Circuits Syst. Video Technol..
[28] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[29] Thierry Pun,et al. Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..
[30] Anindya Sarkar,et al. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.
[31] Thierry Pun,et al. Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.
[32] R. Crandall,et al. Some Notes on Steganography , 1999 .
[33] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[34] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[35] P. P. Vaidyanathan,et al. Optimal histogram modification with MSE metric , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[36] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[37] B. S. Manjunath,et al. Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.
[38] Anindya Sarkar,et al. Adding Gaussian noise to “denoise” JPEG for detecting image resizing , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[39] Jessica J. Fridrich,et al. Minimizing the embedding impact in steganography , 2006, MM&Sec '06.
[40] B. S. Manjunath,et al. High-volume data hiding in images: Introducing perceptual criteria into quantization based embedding , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[41] Leonidas J. Guibas,et al. The Earth Mover's Distance as a Metric for Image Retrieval , 2000, International Journal of Computer Vision.
[42] Noboru Babaguchi,et al. Breaking the YASS algorithm via pixel and DCT coefficients analysis , 2008, 2008 19th International Conference on Pattern Recognition.
[43] Ariel Shamir,et al. Seam Carving for Content-Aware Image Resizing , 2007, ACM Trans. Graph..
[44] H. W. Park,et al. Blocking effect reduction of JPEG images by signal adaptive filtering , 1998, IEEE Trans. Image Process..
[45] Ioannis Pitas,et al. Region-based image watermarking , 2001, IEEE Trans. Image Process..
[46] Thierry Pun,et al. Method for the estimation and recovering from general affine transforms in digital watermarking applications , 2002, IS&T/SPIE Electronic Imaging.
[47] X. Jin. Factor graphs and the Sum-Product Algorithm , 2002 .
[48] T. Aaron Gulliver,et al. Design of Rate-Compatible Punctured Repeat-Accumulate Codes , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[49] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[50] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[51] Aria Nosratinia. Denoising JPEG images by re-application of JPEG , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[52] Hany Farid,et al. Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.
[53] Young Huh,et al. Wavelet transforms in a JPEG-like image coder , 1994, Other Conferences.
[54] Bernd Girod,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[55] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[56] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[57] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[58] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005 .
[59] Qiong Wu,et al. Detection of digital doctoring in exemplar-based inpainted images , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[60] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[61] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[62] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[63] M. Hemahlathaa,et al. A feature-based robust digital image watermarking scheme , 2012, 2012 International Conference on Computing, Communication and Applications.
[64] Alin C. Popescu,et al. Exposing digital forgeries in color filter array interpolated images , 2005, IEEE Transactions on Signal Processing.
[65] Jiying Zhao,et al. A Rectification Scheme for RST Invariant Image Watermarking , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[66] Ying Wang,et al. Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.
[67] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[68] Dan Wang,et al. A Novel Geometrical Robust Image Data Hiding Scheme , 2007, Eighth International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS '07).
[69] Anindya Sarkar,et al. Detection of seam carving and localization of seam insertions in digital images , 2009, MM&Sec '09.
[70] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[71] Jun Wu,et al. A feature-based robust digital image watermarking against desynchronization attacks , 2007, Int. J. Autom. Comput..
[72] Ying Wang,et al. Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.
[73] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..
[74] B. S. Manjunath,et al. Statistical restoration for robust and secure steganography , 2005, IEEE International Conference on Image Processing 2005.
[75] Pierre Duhamel,et al. Applied public-key steganography , 2002, IS&T/SPIE Electronic Imaging.
[76] Sviatoslav Voloshynovskiy,et al. Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.
[77] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[78] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[79] C. D. McGillem,et al. Multitemporal Geometric Distortion Correction Utilizing the Affine Transformation , 1973 .
[80] Soo-Chang Pei,et al. Image normalization for pattern recognition , 1995, Image Vis. Comput..
[81] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[82] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[83] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[84] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[85] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[86] Shih-Fu Chang,et al. Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[87] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[88] Dariush Divsalar,et al. Coding theorems for 'turbo-like' codes , 1998 .
[89] Xiaojun Qi,et al. Towards a Robust Feature-Based Watermarking Scheme , 2006, 2006 International Conference on Image Processing.
[90] Dan Wang,et al. A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization , 2007, Information Hiding.
[91] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[92] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[93] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[94] Babak Mahdian,et al. Ieee Transactions on Information Forensics and Security 1 Blind Authentication Using Periodic Properties of Interpolation , 2022 .
[95] Thierry Pun,et al. Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..
[96] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[97] Shiyan Hu,et al. Geometric-Invariant Image Watermarking by Key-Dependent Triangulation , 2008, Informatica.
[98] Michael Backes,et al. Public-Key Steganography with Active Attacks , 2005, TCC.
[99] Ahmed H. Tewfik,et al. Geometric Invariance in image watermarking , 2004, IEEE Transactions on Image Processing.
[100] Matthias Kirchner. On the detectability of local resampling in digital images , 2008, Electronic Imaging.
[101] Heung-Kyu Lee,et al. Robust image watermarking using local invariant features , 2006 .
[102] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[103] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[104] B. S. Manjunath,et al. Determining Achievable Rates for Secure, Zero Divergence, Steganography , 2006, 2006 International Conference on Image Processing.
[105] Christopher G. Harris,et al. A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.
[106] Anindya Sarkar,et al. Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation , 2007, 2007 IEEE International Conference on Image Processing.
[107] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[108] Chi-Keung Tang,et al. Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis , 2009, Pattern Recognit..
[109] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[110] B. S. Manjunath,et al. Image adaptive high volume data hiding based on scalar quantization , 2002, MILCOM 2002. Proceedings.
[111] Husrev T. Sencar,et al. Image Steganography: Concepts and Practice , 2004 .
[112] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[113] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[114] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[115] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[116] Mike Fisk,et al. Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.