Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory
暂无分享,去创建一个
[1] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[2] Florent Retraint,et al. An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection , 2013, IEEE Transactions on Information Forensics and Security.
[3] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[4] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[5] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[6] Qionghai Dai,et al. Similarity-based online feature selection in content-based image retrieval , 2006, IEEE Transactions on Image Processing.
[7] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[8] L. L. Cam,et al. Asymptotic Methods In Statistical Decision Theory , 1986 .
[9] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[10] Florent Retraint,et al. Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.
[11] Wen Gao,et al. Hierarchical Ensemble of Global and Local Classifiers for Face Recognition , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[12] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[13] Tomás Pevný. Detecting messages of unknown length , 2011, Electronic Imaging.
[14] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[15] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[16] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[17] Tomás Pevný,et al. Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[18] Tamás Szántai,et al. Computing Multivariate Normal Probabilities: A New Look , 2002 .
[19] A. Genz,et al. Computation of Multivariate Normal and t Probabilities , 2009 .
[20] Jessica J. Fridrich,et al. Theoretical model of the FLD ensemble classifier based on hypothesis testing theory , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Stephen E. Fienberg,et al. Testing Statistical Hypotheses , 2005 .
[22] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[23] Florent Retraint,et al. Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.
[24] Tomás Pevný,et al. A mishmash of methods for mitigating the model mismatch mess , 2014, Electronic Imaging.
[25] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[26] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[27] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[28] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[29] Florent Retraint,et al. A Cover Image Model For Reliable Steganalysis , 2011, Information Hiding.
[30] Tomás Pevný,et al. From Blind to Quantitative Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[31] Gerald S. Rogers,et al. Mathematical Statistics: A Decision Theoretic Approach , 1967 .
[32] John A. Nelder,et al. A Simplex Method for Function Minimization , 1965, Comput. J..
[33] Alfred O. Hero,et al. Optimal simultaneous detection and estimation under a false alarm constraint , 1995, IEEE Trans. Inf. Theory.
[34] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[35] Matthias O. Franz,et al. Simple algorithmic modifications for improving blind steganalysis performance , 2010, MM&Sec '10.
[36] Carl W. Helstrom,et al. Elements of signal detection and estimation , 1994 .
[37] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.
[38] A. Gualtierotti. H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .
[39] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[40] Florent Retraint,et al. A local adaptive model of natural images for almost optimal detection of hidden data , 2014, Signal Process..
[41] Florent Retraint,et al. Statistical detection of data hidden in least significant bits of clipped images , 2014, Signal Process..
[42] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[43] John Bowman Thomas,et al. An introduction to statistical communication theory , 1969 .
[44] Florent Retraint,et al. Hidden information detection based on quantized Laplacian distribution , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[45] FridrichJessica,et al. Rich Models for Steganalysis of Digital Images , 2012 .
[46] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[47] Jianping Fan,et al. Integrating Concept Ontology and Multitask Learning to Achieve More Effective Classifier Training for Multilevel Image Annotation , 2008, IEEE Transactions on Image Processing.
[48] Marc Chaumont,et al. Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features , 2012, 2012 19th IEEE International Conference on Image Processing.
[49] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.