Distortion Function for Steganography in Texture Synthesized Images
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[2] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[3] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[4] Hang Zhou,et al. Targeted attack and security enhancement on texture synthesis based steganography , 2018, J. Vis. Commun. Image Represent..
[5] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.
[6] Alexei A. Efros,et al. Image quilting for texture synthesis and transfer , 2001, SIGGRAPH.
[7] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[8] Xinpeng Zhang,et al. Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.
[9] Oliver Deussen,et al. Wang Tiles for image and texture generation , 2003, ACM Trans. Graph..
[10] Zhenxing Qian,et al. Robust Steganography Using Texture Synthesis , 2017 .
[11] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[12] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[13] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[14] Shigeru Kuriyama,et al. Texture Synthesis for Mobile Data Communications , 2009, IEEE Computer Graphics and Applications.
[15] Weiming Zhang,et al. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.
[16] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[17] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[18] Zhenxing Qian,et al. Constructive Steganography Using Texture Synthesis , 2018 .
[19] Kuo-Chen Wu,et al. Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.
[20] Jun Yu,et al. Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.
[21] Shigeru Kuriyama,et al. Data-Embeddable Texture Synthesis , 2007, Smart Graphics.
[22] David A. Forsyth,et al. Generalizing motion edits with Gaussian processes , 2009, ACM Trans. Graph..