ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Toss that BOSSbase, Alice! , 2016, Media Watermarking, Security, and Forensics.
[2] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[3] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[4] Mauro Barni,et al. The first BOWS contest: Break Our Watermarking System , 2007, Electronic Imaging.
[5] Quoc V. Le,et al. EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks , 2019, ICML.
[6] Teddy Furon,et al. Broken Arrows , 2008, EURASIP J. Inf. Secur..
[7] J. Fridrich,et al. ImageNet Pre-trained CNNs for JPEG Steganalysis , 2020, 2020 IEEE International Workshop on Information Forensics and Security (WIFS).
[8] Tomás Pevný,et al. Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[9] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[10] Kaizaburo Chubachi. An Ensemble Model using CNNs on Different Domains for ALASKA2 Image Steganalysis , 2020, 2020 IEEE International Workshop on Information Forensics and Security (WIFS).
[11] Rémi Cogranne,et al. Selection-Channel-Aware Reverse JPEG Compatibility for Highly Reliable Steganalysis of JPEG Images , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Patrick Bas,et al. The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis , 2019, IH&MMSec.
[13] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[14] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[15] Jessica J. Fridrich,et al. Practical strategies for content-adaptive batch steganography and pooled steganalysis , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[17] Dirk Borghys,et al. Effects and solutions of Cover-Source Mismatch in image steganalysis , 2020, Signal Process. Image Commun..
[18] Jessica Fridrich,et al. An Intriguing Struggle of CNNs in JPEG Steganalysis and the OneHot Solution , 2020, IEEE Signal Processing Letters.
[19] Enhua Wu,et al. Squeeze-and-Excitation Networks , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[20] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[21] Seong Joon Oh,et al. CutMix: Regularization Strategy to Train Strong Classifiers With Localizable Features , 2019, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[22] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[23] Rémi Cogranne,et al. Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images , 2020, IH&MMSec.