Critical review of image steganalysis techniques
暂无分享,去创建一个
R. Ramesh | J. Anita Christaline | D. Vaishali | Anita Christaline Johnvictor | D. Vaishali | R. Ramesh
[1] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[2] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[3] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[4] Deng Qian-lan,et al. The blind detection of information hiding in color image , 2010, 2010 2nd International Conference on Computer Engineering and Technology.
[5] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[6] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[7] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[8] Deepa D. Shankar,et al. Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics , 2010, 2010 International Conference on Advances in Computer Engineering.
[9] T. Gireesh Kumar,et al. Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine , 2010, ICT.
[10] Minh N. Do,et al. Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance , 2002, IEEE Trans. Image Process..
[12] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[13] Zhuo Li,et al. Steganalysis Algorithm Based on the D Reduction of Improved Differential Matrix in Images , 2010, 2010 Chinese Conference on Pattern Recognition (CCPR).
[14] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[15] Azman Samsudin,et al. Digital steganalysis: Computational intelligence approach , 2009 .
[16] Rahul Agrawal,et al. Performance Evaluation of Exponential Discriminant Analysis with Feature Selection for Steganalysis , 2012 .
[17] Ziwen Sun,et al. An image steganalysis method based on characteristic function moments and PCA , 2011, Proceedings of the 30th Chinese Control Conference.
[18] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[19] Chao Guan,et al. Steganalysis Based on Co-occurrence Matrix of Differential Image , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[20] Jing Dong,et al. Blind image steganalysis based on run-length histogram analysis , 2008, 2008 15th IEEE International Conference on Image Processing.
[21] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[22] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[23] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[24] Hong-Bin Zhang,et al. Blind Steganalysis using Wavelet Statistics and ANOVA , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[25] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[26] Patrick P. K. Chan,et al. Blind steganalysis with high generalization capability for different image databases using L-GEM , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[27] Fenlin Liu,et al. Image universal steganalysis based on wavelet packet transform , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[28] Xinpeng Zhang,et al. JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier , 2013, IEEE Signal Processing Letters.
[29] Qingzhong Liu,et al. Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images , 2008, Pattern Recognit..
[30] Jessica J. Fridrich,et al. Random projections of residuals as an alternative to co-occurrences in steganalysis , 2013, Electronic Imaging.
[31] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[32] N. Kamaraj,et al. Optimized Image Steganalysis through Feature Selection using MBEGA , 2010, ArXiv.
[33] Amaury Lendasse,et al. Reliable Steganalysis Using a Minimum Set of Samples and Features , 2009, EURASIP J. Inf. Secur..
[34] Chengyun Yang,et al. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[35] Mansour Sheikhan,et al. Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform , 2010, 2010 10th International Conference on Intelligent Systems Design and Applications.
[36] Shaohui Liu,et al. Steganalysis based on wavelet texture analysis and neural network , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[37] Mostafa Mehdipour-Ghazi,et al. Universal Steganalysis Based on Local Prediction Error in Wavelet Domain , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[38] Hedieh Sajedi,et al. A Steganalysis Method Based on Contourlet Transform Coefficients , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[39] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[40] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[41] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[42] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[43] Stefanos Gritzalis,et al. On the Typical Statistic Features for Image Blind Steganalysis , 2011, IEEE Journal on Selected Areas in Communications.
[44] Guoming Chen,et al. Particle Swarm Optimization Feature Selection for Image Steganalysis , 2012, 2012 Fourth International Conference on Digital Home.
[45] Jessica J. Fridrich,et al. JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts , 2012, Information Hiding.
[46] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[47] Jing-Qu Lin,et al. JPEG image steganalysis method based on binary similarity measures , 2009, 2009 International Conference on Machine Learning and Cybernetics.