A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics
暂无分享,去创建一个
Jie Zhu | Xianfeng Zhao | Yun Cao | Gong Chen | Qingxiao Guan | Xianfeng Zhao | Yun Cao | Jie Zhu | Qingxiao Guan | Gong Chen
[1] Jie Zhu,et al. On More Paradigms of Steganalysis , 2016, Int. J. Digit. Crime Forensics.
[2] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[3] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[4] Jessica J. Fridrich,et al. Rich model for Steganalysis of color images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[5] Jessica J. Fridrich,et al. Study of cover source mismatch in steganalysis and ways to mitigate its impact , 2014, Electronic Imaging.
[6] Tomás Pevný,et al. A mishmash of methods for mitigating the model mismatch mess , 2014, Electronic Imaging.
[7] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[8] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[9] Jessica J. Fridrich,et al. Steganalysis in resized images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[10] Jessica J. Fridrich,et al. Effect of Cover Quantization on Steganographic Fisher Information , 2012, IEEE Transactions on Information Forensics and Security.
[11] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[12] Andrew D. Ker,et al. Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.
[13] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[14] Yun Q. Shi,et al. Textural Features for Steganalysis , 2012, Information Hiding.
[15] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[16] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[17] Jessica J. Fridrich,et al. Breaking HUGO - The Process Discovery , 2011, Information Hiding.
[18] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[19] Mauro Barni,et al. Forensics aided steganalysis of heterogeneous images , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[20] J. Fridrich. Steganography in Digital Media: Principles, Algorithms, and Applications , 2009 .
[21] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[22] Tomás Pevný,et al. The square root law of steganographic capacity , 2008, MM&Sec '08.
[23] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[24] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[25] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[26] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[27] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[28] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[29] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[30] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[31] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..