Steganalysis of JSteg algorithm using hypothesis testing theory
暂无分享,去创建一个
[1] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[2] Marc Lebrun,et al. An Analysis and Implementation of the BM3D Image Denoising Method , 2012, Image Process. Line.
[3] F. Muller. Distribution shape of two-dimensional DCT coefficients of natural images , 1993 .
[4] Florent Retraint,et al. Statistical detection of Jsteg steganography using hypothesis testing theory , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[5] Jean-Michel Morel,et al. A non-local algorithm for image denoising , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[6] Florent Retraint,et al. Hidden information detection based on quantized Laplacian distribution , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[7] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[8] Florent Retraint,et al. Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.
[9] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.
[10] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[11] Sanjit K. Mitra,et al. Image probability distribution based on generalized gamma function , 2005, IEEE Signal Processing Letters.
[12] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[13] Florent Retraint,et al. Statistical decision by using quantized observations , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[14] Florent Retraint,et al. Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.
[15] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[16] Jiwu Huang,et al. Adaptive steganalysis against WOW embedding algorithm , 2014, IH&MMSec '14.
[17] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[18] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[19] Florent Retraint,et al. Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters , 2014, IH&MMSec '14.
[20] Florent Retraint,et al. Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results , 2014, Digit. Signal Process..
[21] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[22] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[23] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[24] Rainer Böhme,et al. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.
[25] Junichi Nakamura,et al. Image Sensors and Signal Processing for Digital Still Cameras , 2005 .
[26] E. Lehmann. Testing Statistical Hypotheses , 1960 .
[27] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[28] Florent Retraint,et al. A local adaptive model of natural images for almost optimal detection of hidden data , 2014, Signal Process..
[29] Jessica J. Fridrich,et al. On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.
[30] Joseph W. Goodman,et al. A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..
[31] T. H. Thai,et al. Statistical model of natural images , 2012, 2012 19th IEEE International Conference on Image Processing.
[32] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[33] Florent Retraint,et al. An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection , 2013, IEEE Transactions on Information Forensics and Security.
[34] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[35] Tao Zhang,et al. A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.
[36] Rainer Bhme. Advanced Statistical Steganalysis , 2010 .
[37] Florent Retraint,et al. A Cover Image Model For Reliable Steganalysis , 2011, Information Hiding.
[38] Marc Lebrun,et al. An Implementation and Detailed Analysis of the K-SVD Image Denoising Algorithm , 2012, Image Process. Line.
[39] Rainer Böhme,et al. Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.
[40] Jessica J. Fridrich,et al. Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.
[41] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[42] Jessica J. Fridrich,et al. Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.
[43] Florent Retraint,et al. Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients , 2013, 2013 IEEE International Conference on Image Processing.
[44] Sangjin Lee,et al. Category Attack for LSB Steganalysis of JPEG Images , 2006, IWDW.