Breaking Steganography: Slight Modification with Distortion Minimization
暂无分享,去创建一个
Zhenxing Qian | Xinpeng Zhang | Guorui Feng | Zichi Wang | Xinpeng Zhang | Zhenxing Qian | Zichi Wang | Guorui Feng
[1] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[2] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[3] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[4] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[5] Jessica J. Fridrich,et al. Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.
[6] Marwan Omar,et al. Insider Threats: Detecting and Controlling Malicious Insiders , 2015 .
[7] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[8] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[9] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[10] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[11] Weiming Zhang,et al. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.
[12] Xinpeng Zhang,et al. Spatial Steganalysis Using Contrast of Residuals , 2016, IEEE Signal Processing Letters.
[13] Xinpeng Zhang,et al. Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain , 2018 .
[14] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[15] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[16] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[17] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.
[18] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[19] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[20] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[21] Johnny Nhan,et al. Policing of Movie and Music Piracy: The Utility of a Nodal Governance Security Framework , 2011 .
[22] Jiwu Huang,et al. Adaptive Steganalysis Based on Embedding Probabilities of Pixels , 2016, IEEE Transactions on Information Forensics and Security.
[23] Fusheng Yang,et al. An Overview on Passive Image Forensics Technology for Automatic Computer Forgery , 2016, Int. J. Digit. Crime Forensics.
[24] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[25] Xinpeng Zhang,et al. Hybrid distortion function for JPEG steganography , 2016, J. Electronic Imaging.
[26] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[27] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[28] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.