Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results
暂无分享,去创建一个
Florent Retraint | Igor V. Nikiforov | Lionel Fillatre | Cathel Zitzmann | Rémi Cogranne | Philippe Cornu | I. Nikiforov | L. Fillatre | R. Cogranne | F. Retraint | Cathel Zitzmann | Philippe Cornu
[1] Florent Retraint,et al. An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection , 2013, IEEE Transactions on Information Forensics and Security.
[2] E. Lehmann. Testing Statistical Hypotheses , 1960 .
[3] Josef Kittler,et al. Locally linear discriminant analysis for multimodally distributed classes for face recognition with a single model image , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] Lionel Fillatre. Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.
[5] Florent Retraint,et al. Statistical decision by using quantized observations , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[6] Rainer Böhme,et al. Advanced Statistical Steganalysis , 2010, Information Security and Cryptography.
[7] Jessica J. Fridrich,et al. Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.
[8] Ingemar J. Cox,et al. A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[9] Andrew D. Ker. A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.
[10] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[11] T. H. Thai,et al. Statistical model of natural images , 2012, 2012 19th IEEE International Conference on Image Processing.
[12] Xiangyang Luo,et al. An Improved Sample Pairs Method for Detection of LSB Embedding , 2004, Information Hiding.
[13] Eric W. Weisstein,et al. The CRC concise encyclopedia of mathematics , 1999 .
[14] Jong-Sen Lee,et al. Digital Image Enhancement and Noise Filtering by Use of Local Statistics , 1980, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Stphane Mallat,et al. A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way , 2008 .
[16] Florent Retraint,et al. Statistical detection of information hiding based on adjacent pixels difference , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[17] Florent Retraint,et al. A Cover Image Model For Reliable Steganalysis , 2011, Information Hiding.
[18] Carlos Munuera,et al. Steganography and error-correcting codes , 2007, Signal Process..
[19] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[20] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[21] Sangjin Lee,et al. Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding , 2007, Information Hiding.
[22] Nira Dyn,et al. Low Bit-Rate Image Coding Using Adaptive Geometric Piecewise Polynomial Approximation , 2007, IEEE Transactions on Image Processing.
[23] P. Spreij. Probability and Measure , 1996 .
[24] Robert D. Nowak,et al. A Neyman-Pearson approach to statistical learning , 2005, IEEE Transactions on Information Theory.
[25] Louis L. Scharf,et al. Matched subspace detectors , 1994, IEEE Trans. Signal Process..
[26] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[27] S. Mallat. A wavelet tour of signal processing , 1998 .
[28] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[29] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[30] Florent Retraint,et al. Statistical Decision Methods in Hidden Information Detection , 2011, Information Hiding.
[31] Karen O. Egiazarian,et al. Practical Poissonian-Gaussian Noise Modeling and Fitting for Single-Image Raw-Data , 2008, IEEE Transactions on Image Processing.
[32] Florent Retraint,et al. Reliable detection of hidden information based on a non-linear local model , 2011, 2011 IEEE Statistical Signal Processing Workshop (SSP).
[33] Minh N. Do,et al. Rate-distortion optimized tree-structured compression algorithms for piecewise polynomial images , 2005, IEEE Transactions on Image Processing.
[34] W.E. Snyder,et al. Color image processing pipeline , 2005, IEEE Signal Processing Magazine.
[35] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[36] Rainer Bhme. Advanced Statistical Steganalysis , 2010 .
[37] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[38] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[39] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[40] Jessica J. Fridrich,et al. On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.
[41] Rafael C. González,et al. Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[42] Tomás Pevný,et al. Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.
[43] A. Sripad,et al. A necessary and sufficient condition for quantization errors to be uniform and white , 1977 .
[44] Glenn Healey,et al. Radiometric CCD camera calibration and noise estimation , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[45] Florent Retraint,et al. Application of hypothesis testing theory for optimal detection of LSB matching data hiding , 2013, Signal Process..
[46] Jaakko Astola,et al. Local Approximation Techniques in Signal and Image Processing (SPIE Press Monograph Vol. PM157) , 2006 .
[47] Bernard Widrow,et al. Quantization Noise: Roundoff Error in Digital Computation, Signal Processing, Control, and Communications , 2008 .
[48] Andrew D. Ker. Locating steganographic payload via ws residuals , 2008, MM&Sec '08.
[49] Florent Retraint,et al. $\varepsilon$ -Optimal Non-Bayesian Anomaly Detection for Parametric Tomography , 2008, IEEE Transactions on Image Processing.
[50] Andrew D. Ker. Fourth-order structural steganalysis and analysis of cover assumptions , 2006, Electronic Imaging.
[51] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..