Highly accurate real-time image steganalysis based on GPU
暂无分享,去创建一个
Xianfeng Zhao | Qingxiao Guan | Chao Xia | Chengduo Zhao | Xianfeng Zhao | Qingxiao Guan | Chao Xia | Chengduo Zhao
[1] Longkun Guo,et al. A parallel SRM feature extraction algorithm for steganalysis based on GPU architecture , 2015, Comput. Sci. Inf. Syst..
[2] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[3] Steven W. Smith,et al. The Scientist and Engineer's Guide to Digital Signal Processing , 1997 .
[4] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[5] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[6] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[7] Jack J. Purdum,et al. C programming guide , 1983 .
[8] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[9] Yun Q. Shi,et al. Textural Features for Steganalysis , 2012, Information Hiding.
[10] Victor Podlozhnyuk,et al. Image Convolution with CUDA , 2007 .
[11] Andrew D. Ker. Implementing the projected spatial rich features on a GPU , 2014, Electronic Imaging.
[12] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[13] Jessica J. Fridrich,et al. Steganalysis of Content-Adaptive Steganography in Spatial Domain , 2011, Information Hiding.
[14] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[15] Andreas Kopmann,et al. UFO: A Scalable GPU-based Image Processing Framework for On-line Monitoring , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.
[16] Jessica J. Fridrich,et al. Phase-aware projection model for steganalysis of JPEG images , 2015, Electronic Imaging.
[17] Qingzhong Liu,et al. Steganalysis of DCT-embedding based adaptive steganography and YASS , 2011, MM&Sec '11.
[18] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[19] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[20] Anton Obukhov,et al. Discrete Cosine Transform for 8x8 Blocks with CUDA , 2008 .
[21] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[22] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[23] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[24] Jiwu Huang,et al. Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.
[25] S. A. Khayam. The Discrete Cosine Transform ( DCT ) : Theory and Application 1 , 2003 .
[26] Takeo Kanade,et al. GPU-accelerated real-time 3D tracking for humanoid locomotion and stair climbing , 2007, 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[27] Jessica J. Fridrich,et al. Random projections of residuals as an alternative to co-occurrences in steganalysis , 2013, Electronic Imaging.