Block-based image steganalysis: Algorithm and performance evaluation
暂无分享,去创建一个
C.-C. Jay Kuo | Seongho Cho | Byung-Ho Cha | Martin Gawecki | Byung-Ho Cha | Seongho Cho | M. Gawecki
[1] Galina L. Rogova,et al. Combining the results of several neural network classifiers , 1994, Neural Networks.
[2] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[3] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[4] Jana Dittmann,et al. The impact of information fusion in steganalysis on the example of audio steganalysis , 2009, Electronic Imaging.
[5] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[6] C.-C. Jay Kuo,et al. Block-based image steganalysis for a multi-classifier , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[7] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[8] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[9] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[10] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[11] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[12] Sos S. Agaian,et al. Steganalysis Embedding Percentage Determination with Learning Vector Quantization , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[13] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[14] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[15] C.-C. Jay Kuo,et al. Performance study on block-based image steganalysis , 2011, 2011 IEEE International Symposium of Circuits and Systems (ISCAS).
[16] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[17] Arun Ross,et al. Handbook of Multibiometrics (International Series on Biometrics) , 2006 .
[18] Ying Wang,et al. Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.
[19] Pedro M. Domingos,et al. On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.
[20] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[21] Ludmila I. Kuncheva,et al. Using measures of similarity and inclusion for multiple classifier fusion by decision templates , 2001, Fuzzy Sets Syst..
[22] C.-C. Jay Kuo,et al. Block-based image steganalysis: Algorithm and performance evaluation , 2010, ISCAS.
[23] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[24] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[25] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.