Video Steganography Based on Optimized Motion Estimation Perturbation
暂无分享,去创建一个
Hong Zhang | Xianfeng Zhao | Haibo Yu | Yun Cao | Hong Zhang | Xianfeng Zhao | Yun Cao | Haibo Yu
[1] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[2] Zahir Tari,et al. Security and Privacy in Cloud Computing , 2014, IEEE Cloud Computing.
[3] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[4] Zhong Wei-Dong,et al. A novel steganography algorithm based on motion vector and matrix encoding , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[5] Lina Wang,et al. Video steganalysis based on subtractive probability of optimal matching feature , 2014, IH&MMSec '14.
[6] Weiming Zhang,et al. Defining embedding distortion for motion vector-based video steganography , 2014, Multimedia Tools and Applications.
[7] Hong Zhao,et al. Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value , 2014, IEEE Transactions on Information Forensics and Security.
[8] Xinpeng Zhang,et al. Efficient double-layered steganographic embedding , 2007 .
[9] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[10] Tao Zhang,et al. Steganography in Compressed Video Stream , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[11] Long-Wen Chang,et al. Data hiding for digital video with phase of motion vector , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[12] Dengguo Feng,et al. Video Steganography with Perturbed Motion Estimation , 2011, Information Hiding.
[13] Li Xiang,et al. Video steganography using motion vector and linear block codes , 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences.
[14] H. A. Aly,et al. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error , 2011, IEEE Transactions on Information Forensics and Security.
[15] Dengguo Feng,et al. Video Steganalysis Exploiting Motion Vector Reversion-Based Features , 2012, IEEE Signal Processing Letters.
[16] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.