Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model

[1]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[3]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Weiming Zhang,et al.  Decomposing Joint Distortion for Adaptive Steganography , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Hang Zhou,et al.  Defining Cost Functions for Adaptive JPEG Steganography at the Microscale , 2019, IEEE Transactions on Information Forensics and Security.

[7]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Louis F. Williams,et al.  A modification to the half-interval search (binary search) method , 1976, ACM-SE 14.

[9]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[10]  Jiangqun Ni,et al.  A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[12]  Bin Li,et al.  A New Payload Partition Strategy in Color Image Steganography , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Jessica J. Fridrich,et al.  Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.

[14]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[15]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[16]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[17]  Kejiang Chen,et al.  JPEG Steganography With Estimated Side-Information , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[18]  J. Besag Spatial Interaction and the Statistical Analysis of Lattice Systems , 1974 .

[19]  L. Isserlis ON A FORMULA FOR THE PRODUCT-MOMENT COEFFICIENT OF ANY ORDER OF A NORMAL FREQUENCY DISTRIBUTION IN ANY NUMBER OF VARIABLES , 1918 .

[20]  Jessica J. Fridrich,et al.  Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[21]  Jiangqun Ni,et al.  Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy , 2018, IEEE Signal Processing Letters.

[22]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Jessica J. Fridrich,et al.  Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.

[24]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[25]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[26]  Andrew D. Ker Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.

[27]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[28]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[29]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.