An Improved Steganalysis Method Using Feature Combinations
暂无分享,去创建一个
[1] Xinpeng Zhang,et al. Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation , 2019, Int. J. Digit. Crime Forensics.
[2] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[3] Xinpeng Zhang,et al. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.
[4] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[5] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[6] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[7] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[8] Xinpeng Zhang,et al. Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain , 2018 .
[9] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[10] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[11] Xinpeng Zhang,et al. Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.
[12] Xinpeng Zhang,et al. Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change , 2016, IWDW.
[13] Ruohan Meng. A fusion steganographic algorithm based on Faster R-CNN , 2018 .
[14] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[15] Amaury Lendasse,et al. A Feature Selection Methodology for Steganalysis , 2006, MRCS.
[16] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[17] Jun Yu,et al. Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.
[18] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[19] Yue Zhang,et al. APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT , 2019, J. Netw. Comput. Appl..
[20] Zhenxing Qian,et al. On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.
[21] Xinpeng Zhang,et al. Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.
[22] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[23] Mi Wen,et al. Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.
[24] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[25] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[26] Jianhua Li,et al. Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks , 2018, IEEE Transactions on Network and Service Management.
[27] Bin Li,et al. Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography , 2017, IEEE Transactions on Information Forensics and Security.
[28] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[29] Mohammad Saniee Abadeh,et al. Image steganalysis using a bee colony based feature selection algorithm , 2014, Eng. Appl. Artif. Intell..
[30] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[31] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[32] Xintao Duan,et al. Coverless Steganography for Digital Images Based on a Generative Model , 2018 .