"Break Our Steganographic System": The Ins and Outs of Organizing BOSS
暂无分享,去创建一个
Tomás Pevný | Patrick Bas | Tomás Filler | P. Bas | T. Pevný | Tomás Filler
[1] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[2] Mauro Barni,et al. The first BOWS contest: Break Our Watermarking System , 2007, Electronic Imaging.
[3] Jessica J. Fridrich,et al. On completeness of feature spaces in blind steganalysis , 2008, MM&Sec '08.
[4] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[5] Fatih Kurugollu,et al. A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO) , 2011, Information Hiding.
[6] Jessica J. Fridrich,et al. Steganalysis of Content-Adaptive Steganography in Spatial Domain , 2011, Information Hiding.
[7] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[8] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[9] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[10] J. Gower. Some distance properties of latent root and vector methods used in multivariate analysis , 1966 .
[11] Jessica J. Fridrich,et al. Breaking HUGO - The Process Discovery , 2011, Information Hiding.