New framework for using image contents in blind steganalysis systems
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[2] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[3] Wei Liang,et al. JPEG image steganalysis using joint discrete cosine transform domain features , 2010, J. Electronic Imaging.
[4] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[5] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[6] Hedieh Sajedi,et al. Adaptive batch steganography considering image embedding capacity , 2009 .
[7] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[8] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[9] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[10] Fenlin Liu,et al. A review on blind detection for image steganography , 2008, Signal Process..
[11] Gregg H. Gunsch,et al. Wavelet-based steganalysis using a computational immune system approach , 2003, Visual Communications and Image Processing.
[12] B. S. Manjunath,et al. Steganalysis of quantization index modulation data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[13] Yun Q. Shi,et al. Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) , 2006, IWDW.
[14] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Transactions on Information Forensics and Security.
[15] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[16] Sangjin Lee,et al. Category Attack for LSB Steganalysis of JPEG Images , 2006, IWDW.
[17] Hany Farid,et al. Detecting Steganographic Messages in Digital Images , 2001 .
[18] Ming Guo,et al. Image Steganalysis Based on Spatial Domain and DWT Domain Features , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[19] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[20] Yao Zhao,et al. PM1 steganography in JPEG images using genetic algorithm , 2008, Soft Comput..
[21] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[22] Christian Ullerich,et al. Weaknesses of MB2 , 2007, IWDW.
[23] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[24] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[25] Nasir D. Memon,et al. Steganalysis of watermarking techniques using image quality metrics , 2001, IS&T/SPIE Electronic Imaging.
[26] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[27] Yun Q. Shi,et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[28] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[29] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[30] Bülent Sankur,et al. Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.
[31] Chiang-Lung Liu,et al. High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..
[32] Lei Guo,et al. Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[33] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[34] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[35] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[36] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.