Modern steganalysis can detect YASS
暂无分享,去创建一个
[1] Noboru Babaguchi,et al. Breaking the YASS algorithm via pixel and DCT coefficients analysis , 2008, 2008 19th International Conference on Pattern Recognition.
[2] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[3] Jessica J. Fridrich,et al. Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.
[4] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Trans. Inf. Forensics Secur..
[5] Anindya Sarkar,et al. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.
[6] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[7] B. S. Manjunath,et al. Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.
[8] B. S. Manjunath,et al. Steganalysis of spread spectrum data hiding exploiting cover memory , 2005, IS&T/SPIE Electronic Imaging.
[9] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[10] Dariush Divsalar,et al. Coding theorems for 'turbo-like' codes , 1998 .
[11] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[12] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[13] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[14] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[15] Bernhard Schölkopf,et al. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.
[16] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[17] Chih-Jen Lin,et al. A Practical Guide to Support Vector Classication , 2008 .
[18] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[19] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[20] Jiwu Huang,et al. A study on security performance of YASS , 2008, 2008 15th IEEE International Conference on Image Processing.
[21] Anthony Widjaja,et al. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2003, IEEE Transactions on Neural Networks.
[22] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.