Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model
暂无分享,去创建一个
Jessica Fridrich | Jiangqun Ni | Wenkang Su | Xianglei Hu | J. Fridrich | Wenkang Su | J. Ni | Xianglei Hu
[1] Xinpeng Zhang,et al. Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[2] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[3] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[4] Weiming Zhang,et al. Decomposing Joint Distortion for Adaptive Steganography , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[6] Hang Zhou,et al. Defining Cost Functions for Adaptive JPEG Steganography at the Microscale , 2019, IEEE Transactions on Information Forensics and Security.
[7] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[8] Louis F. Williams,et al. A modification to the half-interval search (binary search) method , 1976, ACM-SE 14.
[9] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[10] Jiangqun Ni,et al. A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[11] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[12] Bin Li,et al. A New Payload Partition Strategy in Color Image Steganography , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[13] Jessica J. Fridrich,et al. Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.
[14] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[15] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[16] Bin Li,et al. Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[17] Kejiang Chen,et al. JPEG Steganography With Estimated Side-Information , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[18] J. Besag. Spatial Interaction and the Statistical Analysis of Lattice Systems , 1974 .
[19] L. Isserlis. ON A FORMULA FOR THE PRODUCT-MOMENT COEFFICIENT OF ANY ORDER OF A NORMAL FREQUENCY DISTRIBUTION IN ANY NUMBER OF VARIABLES , 1918 .
[20] Jessica J. Fridrich,et al. Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[21] Jiangqun Ni,et al. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy , 2018, IEEE Signal Processing Letters.
[22] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[23] Jessica J. Fridrich,et al. Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.
[24] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[25] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[26] Andrew D. Ker. Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.
[27] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[28] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[29] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.