A Secure Steganography: Noisy Region Embedding
暂无分享,去创建一个
Xiaolong Li | Bin Yang | Yifeng Lu | Xiaolong Li | Bin Yang | Yifeng Lu
[1] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[2] Frank Y. Shih,et al. Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .
[3] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[4] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[5] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[6] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[7] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[8] Andrew D. Ker. A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.
[9] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[10] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[11] Xiaolin Wu,et al. A new framework of LSB steganalysis of digital media , 2005, IEEE Transactions on Signal Processing.
[12] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[13] Andrew D. Ker. A Fusion of Maximum Likelihood and Structural Steganalysis , 2007, Information Hiding.
[14] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[15] Weiming Zhang,et al. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.
[16] Bin Li,et al. Textural features based universal steganalysis , 2008, Electronic Imaging.
[17] Weiming Zhang,et al. Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.
[18] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[19] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[20] Min Wu,et al. Noise Features for Image Tampering Detection and Steganalysis , 2007, 2007 IEEE International Conference on Image Processing.
[21] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.