Passive steganalysis based on higher order image statistics of curvelet transform
暂无分享,去创建一个
[1] E. Candès,et al. New tight frames of curvelets and optimal representations of objects with piecewise C2 singularities , 2004 .
[2] D. Donoho,et al. Translation-Invariant De-Noising , 1995 .
[3] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[4] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[5] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[6] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[7] Peng Liu,et al. Research on RTOS-Integrated TMR for Fault Tolerant Systems , 2007 .
[8] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[9] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[10] E. Candès,et al. Curvelets: A Surprisingly Effective Nonadaptive Representation for Objects with Edges , 2000 .
[11] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[12] Jiwu Huang,et al. Adaptive image watermarking scheme based on visual masking , 1998 .
[13] O-Hyung Kwon,et al. Wavelet based watermarking method for digital images using the human visual system , 1999 .
[14] Zheng Zhang,et al. Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[15] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[16] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[17] S. Geetha,et al. A neuro-genetic based short-term forecasting framework for network intrusion prediction system , 2009, Int. J. Autom. Comput..
[18] S. T. Buckland,et al. An Introduction to the Bootstrap. , 1994 .
[19] Jun Wu,et al. A feature-based robust digital image watermarking against desynchronization attacks , 2007, Int. J. Autom. Comput..
[20] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[21] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[22] Emmanuel J. Candès,et al. The curvelet transform for image denoising , 2002, IEEE Trans. Image Process..
[23] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[24] Chengyun Yang,et al. Effective steganalysis based on statistical moments of wavelet characteristic function , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[25] N. Kamaraj,et al. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system , 2009, Comput. Secur..
[26] Thomas S. Huang,et al. An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..
[27] Nick G. Kingsbury,et al. Redundant representation with complex wavelets: how to achieve sparsity , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[28] N. Kamaraj,et al. Stego-Breaker: Defeating the Steganographic Systems through Genetic-X-Means approach using Image Quality Metrics , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[29] Wei Tang,et al. Ensembling neural networks: Many could be better than all , 2002, Artif. Intell..
[30] N. Kamaraj,et al. Close Color Pair Signature ensemble Adaptive Threshold based Steganalsis for LSB Embedding in Digital Images , 2008, Trans. Data Priv..
[31] Bo Xu,et al. Improved BSS Based Schemes for Active Steganalysis , 2007 .
[32] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[33] Rajarathnam Chandramouli,et al. Mathematical approach to steganalysis , 2002, IS&T/SPIE Electronic Imaging.
[34] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[35] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[36] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[37] Zhi-Hua Zhou,et al. Hybrid decision tree , 2002, Knowl. Based Syst..
[38] N. Kamaraj,et al. StegoHunter: Steganalysis of LSB Embedded Images Based on Stego-Sensitive Threshold Close Color Pair Signature , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[39] Guo-Shiang Lin,et al. Robust image watermarking on the DCT domain , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[40] Zhi-Hua Zhou,et al. NeC4.5: Neural Ensemble Based C4.5 , 2004, IEEE Trans. Knowl. Data Eng..
[41] Naokazu Yokoya,et al. Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[42] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[43] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..