Effect of Cover Quantization on Steganographic Fisher Information
暂无分享,去创建一个
[1] Jiwu Huang,et al. New JPEG Steganographic Scheme with High Security Performance , 2010, IWDW.
[2] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[3] Tomás Pevný,et al. The square root law of steganographic capacity , 2008, MM&Sec '08.
[4] Andrew D. Ker. Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.
[5] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[6] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[7] Ying Wang,et al. Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.
[8] Andrew D. Ker. The ultimate steganalysis benchmark? , 2007, MM&Sec.
[9] D. Hazarika,et al. Comparison of Generalized Gaussian and Cauchy distributions in modeling of dyadic rearranged 2D DCT coefficients , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.
[10] Rainer Böhme,et al. A Game-Theoretic Approach to Content-Adaptive Steganography , 2012, Information Hiding.
[11] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[12] Andrew D. Ker. A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.
[13] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[14] Andrew D. Ker. A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.
[15] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[16] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[17] Jessica J. Fridrich,et al. Optimizing pixel predictors for steganalysis , 2012, Other Conferences.
[18] Jessica J. Fridrich,et al. Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.
[19] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[20] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[21] Andrew D. Ker. The Square Root Law in Stegosystems with Imperfect Information , 2010, Information Hiding.
[22] Jessica J. Fridrich,et al. Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.
[23] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[24] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[26] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[27] Florent Retraint,et al. Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.
[28] Ying Wang,et al. Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.
[29] W. Marsden. I and J , 2012 .
[30] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[31] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.