Secure Binary Image Steganography Based on Fused Distortion Measurement
暂无分享,去创建一个
Wei Lu | Bingwen Feng | Hongmei Liu | Yuileong Yeung | Yingjie Xue | Liyu He | Wei Lu | Hongmei Liu | Bingwen Feng | Yingjie Xue | Yuileong Yeung | Liyu He
[1] Jian Weng,et al. Steganalysis of content-adaptive binary image data hiding , 2017, J. Vis. Commun. Image Represent..
[2] Alex ChiChung Kot,et al. Objective Distortion Measure for Binary Text Image Based on Edge Line Segment Similarity , 2007, IEEE Transactions on Image Processing.
[3] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[4] Alex ChiChung Kot,et al. Steganalysis of data hiding in binary text images , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[5] Josef Pieprzyk,et al. Blind Steganalysis: A Countermeasure for Binary Image Steganography , 2010, 2010 International Conference on Availability, Reliability and Security.
[6] Yu-Chee Tseng,et al. A secure data hiding scheme for binary images , 2002, IEEE Trans. Commun..
[7] Nasir D. Memon,et al. Data hiding in binary text documents , 2001, IS&T/SPIE Electronic Imaging.
[8] Hongbin Zhang,et al. High Capacity Data Hiding for Binary Image Authentication , 2010, 2010 20th International Conference on Pattern Recognition.
[9] Wei Lu,et al. Binary image steganalysis based on pixel mesh Markov transition matrix , 2015, J. Vis. Commun. Image Represent..
[10] B. Ripley,et al. Pattern Recognition , 1968, Nature.
[11] Min Wu,et al. Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.
[12] Haiping Lu,et al. Secure data hiding in binary document images for authentication , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[13] Josef Pieprzyk,et al. Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography , 2010, 2010 International Conference on Availability, Reliability and Security.
[14] Josef Pieprzyk,et al. Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis , 2010, ISPEC.
[15] Huifang Sun,et al. Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards , 1999 .
[16] Alex ChiChung Kot,et al. Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving , 2007, IEEE Transactions on Multimedia.
[17] Haiping Lu,et al. Distance-reciprocal distortion measure for binary document images , 2004, IEEE Signal Processing Letters.
[18] Susanto Rahardja,et al. Orthogonal Data Embedding for Binary Images in Morphological Transform Domain- A High-Capacity Approach , 2008, IEEE Transactions on Multimedia.
[19] Alex ChiChung Kot,et al. On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding , 2013, IEEE Transactions on Information Forensics and Security.
[20] Wei Lu,et al. Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.