Quantitative steganalysis of digital images: estimating the secret message length
暂无分享,去创建一个
Jessica J. Fridrich | Miroslav Goljan | David Soukal | Dorin Hogea | J. Fridrich | M. Goljan | D. Hogea | D. Soukal
[1] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[2] Ralph B. D'Agostino,et al. Goodness-of-Fit-Techniques , 2020 .
[3] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[4] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[5] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[6] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[7] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[8] Nasir D. Memon,et al. A distributed detection framework for Steganalysis , 2000, MULTIMEDIA '00.
[9] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[10] Jessica J. Fridrich,et al. Distortion-Free Data Embedding for Images , 2001, Information Hiding.
[11] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[12] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[13] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[14] Andreas Westfeld. Detecting Low Embedding Rates , 2002, Information Hiding.
[15] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[16] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[17] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[18] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[19] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[20] Nasir D. Memon,et al. On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.
[21] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .
[22] Jessica J. Fridrich,et al. Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.