Steganalysis Using Partially Ordered Markov Models
暂无分享,去创建一个
[1] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[2] Edward J. Delp,et al. Media Forensics and Security , 2009 .
[3] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[4] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[5] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[6] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[7] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[8] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[9] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[10] Laveen N. Kanal,et al. Classification of binary random patterns , 1965, IEEE Trans. Inf. Theory.
[11] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[12] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[13] Ingemar J. Cox,et al. Steganalysis for LSB Matching in Images with High-frequency Noise , 2007, 2007 IEEE 9th Workshop on Multimedia Signal Processing.
[14] N. Cressie,et al. Image analysis with partially ordered Markov models , 1998 .
[15] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[16] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[17] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[18] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[19] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[20] Noel Cressie,et al. Optimal closed boundary identification in gray-scale imagery , 2005, Journal of Mathematical Imaging and Vision.
[21] Jana Dittmann,et al. Proceedings of the 10th ACM workshop on Multimedia and security , 2008 .
[22] Noel Cressie,et al. Texture synthesis and pattern recognition for partially ordered Markov models , 1999, Pattern Recognit..
[23] Andrew D. Ker,et al. Feature reduction and payload location with WAM steganalysis , 2009, Electronic Imaging.