The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis
暂无分享,去创建一个
[1] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[2] Andrew D. Ker. The Square Root Law in Stegosystems with Imperfect Information , 2010, Information Hiding.
[3] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[4] Jiwu Huang,et al. A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.
[5] Dirk Borghys. Special Session 2: ALASKA steganalysis challenge 'Into the wild' , 2019 .
[6] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[7] Fernando Pérez-González,et al. The blind Newton sensitivity attack , 2006, Electronic Imaging.
[8] Teddy Furon,et al. Better security levels for broken arrows , 2010, Electronic Imaging.
[9] Tomás Pevný,et al. Towards dependable steganalysis , 2015, Electronic Imaging.
[10] Davide Cozzolino,et al. Noiseprint: A CNN-Based Camera Model Fingerprint , 2018, IEEE Transactions on Information Forensics and Security.
[11] Tomás Pevný,et al. The square root law of steganographic capacity , 2008, MM&Sec '08.
[12] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[13] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[14] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[15] Andreas Westfeld. A regression-based restoration technique for automated watermark removal , 2008, MM&Sec '08.
[16] Rainer Böhme,et al. “Steganalysis in Technicolor” Boosting WS detection of stego images from CFA-interpolated covers , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[17] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[18] Jessica Fridrich,et al. Payload Scaling for Adaptive Steganography: An Empirical Study , 2019, IEEE Signal Processing Letters.
[19] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[20] Davide Cozzolino,et al. Image forgery detection through residual-based local descriptors and block-matching , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[21] Davide Cozzolino,et al. Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[22] Mauro Barni,et al. The first BOWS contest: Break Our Watermarking System , 2007, Electronic Imaging.
[23] Teddy Furon,et al. Broken Arrows , 2008, EURASIP J. Inf. Secur..
[24] Jessica J. Fridrich,et al. Rich model for Steganalysis of color images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[25] Tomás Pevný,et al. Identifying a steganographer in realistic and heterogeneous data sets , 2012, Other Conferences.
[26] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[27] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[28] Patrick Bas,et al. An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain , 2018, IWDW.
[29] Fatih Kurugollu,et al. A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO) , 2011, Information Hiding.
[30] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[31] Patrick Bas,et al. Steganalysis into the Wild: How to Define a Source? , 2018, Media Watermarking, Security, and Forensics.
[32] Jessica J. Fridrich,et al. Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain , 2019, IH&MMSec.
[33] Andrew D. Ker. On the Relationship Between Embedding Costs and Steganographic Capacity , 2018, IH&MMSec.
[34] Patrick Bas,et al. Two key estimation techniques for the broken arrows watermarking scheme , 2009, MM&Sec '09.
[35] Dirk Borghys,et al. Facing the Cover-Source Mismatch on JPHide using Training-Set Design , 2018, IH&MMSec.
[36] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[37] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[38] Michael Geiger. 2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge , 2018 .
[39] Jessica J. Fridrich,et al. Toss that BOSSbase, Alice! , 2016, Media Watermarking, Security, and Forensics.
[40] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[41] Tomás Pevný,et al. Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[42] Jessica J. Fridrich,et al. Steganalyzing Images of Arbitrary Size with CNNs , 2018, Media Watermarking, Security, and Forensics.