Steganography via cover-source switching
暂无分享,去创建一个
[1] Standard for Characterization of Image Sensors and Cameras Release 3 . 1 , 2010 .
[2] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[3] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[4] Jessica J. Fridrich,et al. Side-informed steganography with additive distortion , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[5] K. Egiazarian,et al. Noise Measurement for Raw-Data of Digital Imaging Sensors by Automatic Segmentation of Nonuniform Targets , 2007, IEEE Sensors Journal.
[6] Elke Franz,et al. Pre-processing for Adding Noise Steganography , 2005, Information Hiding.
[7] Karen O. Egiazarian,et al. Practical Poissonian-Gaussian Noise Modeling and Fitting for Single-Image Raw-Data , 2008, IEEE Transactions on Image Processing.
[8] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[9] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[10] Marc Chaumont,et al. Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[11] Patrick Bas. Natural Steganography: cover-source switching for better steganography , 2016, ArXiv.
[12] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[13] Xianfeng Zhao,et al. Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography , 2016, IH&MMSec.
[14] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[15] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[16] Florent Retraint,et al. Source camera device identification based on raw images , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[17] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[18] Florent Retraint,et al. Camera Model Identification Based on the Heteroscedastic Noise Model , 2014, IEEE Transactions on Image Processing.
[19] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[20] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[21] Andreas Pfitzmann,et al. Steganography Secure against Cover-Stego-Attacks , 1999, Information Hiding.
[22] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[23] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..