Detection of Double-Compression in JPEG Images for Applications in Steganography
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[2] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[3] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[4] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[5] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[6] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[7] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[8] Weihong Wang,et al. Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.
[9] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[10] Jessica Fridrich,et al. Determining the stego algorithm for JPEG images , 2006 .
[11] Ricardo L. de Queiroz,et al. Identification of bitmap compression history: JPEG detection and quantizer estimation , 2003, IEEE Trans. Image Process..
[12] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[13] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[14] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[15] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[16] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .