Practical strategies for content-adaptive batch steganography and pooled steganalysis
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[2] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[3] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[4] Tomás Pevný,et al. Batch steganography in the real world , 2012, MM&Sec '12.
[5] Rainer Böhme,et al. A two-factor error model for quantitative steganalysis , 2006, Electronic Imaging.
[6] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[7] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[8] Andrew D. Ker. Perturbation Hiding and the Batch Steganography Problem , 2008, Information Hiding.
[9] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[10] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[11] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[12] Jessica J. Fridrich,et al. Effect of saturated pixels on security of steganographic schemes for digital images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[13] Andrew D. Ker,et al. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.
[14] Rémi Cogranne,et al. A sequential method for online steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[15] Andrew D. Ker. Batch steganography and the threshold game , 2007, Electronic Imaging.
[16] Tomás Pevný,et al. Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[17] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[18] Tomás Pevný,et al. Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[19] Jessica Fridrich,et al. Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory , 2015, IEEE Transactions on Information Forensics and Security.
[20] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[21] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[22] Tomás Pevný,et al. Rethinking Optimal Embedding , 2016, IH&MMSec.