Pre-processing for Adding Noise Steganography
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[2] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[3] Regina Storm,et al. Wahrscheinlichkeitsrechnung mathematische Statistik und statistische Qualitätskontrolle , 1969 .
[4] Dieter Gollmann,et al. Computer Security – ESORICS 2004 , 2004, Lecture Notes in Computer Science.
[5] E. Bukovics,et al. R. Storm, Wahrscheinlichkeitsrechnung, mathematische Statistik und statistische Qualitätskontrolle. 284 S. m. 66 Bildern, 53 Tab. u. 17 Tafeln. Leipzig 1965. Fachbuchverlag. Preis geb. MDN 17,50 , 1966 .
[6] Lisa M. Marvel,et al. Reliable Blind Information Hiding for Images , 1998, Information Hiding.
[7] Michel K. Ochi,et al. Applied probability and stochastic processes in engineering and physical sciences , 1990 .
[8] Rainer Böhme,et al. Exploiting Preserved Statistics for Steganalysis , 2004, Information Hiding.
[9] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[10] Ioannis Pitas,et al. Digital Image Processing Algorithms and Applications , 2000 .
[11] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[12] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[13] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[14] Rainer Böhme,et al. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.
[15] Andreas Pfitzmann,et al. Steganography Secure against Cover-Stego-Attacks , 1999, Information Hiding.
[16] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[17] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[18] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[19] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.