Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019, Chengdu, China, November 2–4, 2019, Revised Selected Papers
暂无分享,去创建一个
Alessandro Piva | Hyoung Joong Kim | Xianfeng Zhao | Hongxia Wang | Yunqing Shi | Y. Shi | Xianfeng Zhao | A. Piva | Hongxia Wang | Hyoung-Joong Kim
[1] Linna Zhou,et al. Text Steganography Based on Online Chat , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[2] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[3] Jiwu Huang,et al. Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.
[4] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[5] Donald E. Knuth,et al. Digital halftones by dot diffusion , 1987, TOGS.
[6] Tomás Pevný,et al. Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[7] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Tuomas Virtanen,et al. TUT database for acoustic scene classification and sound event detection , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).
[9] Yao Zhao,et al. Robust median filtering detection based on the difference of frequency residuals , 2018, Multimedia Tools and Applications.
[10] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[11] B. Pompe,et al. Permutation entropy: a natural complexity measure for time series. , 2002, Physical review letters.
[12] Kuo-Liang Chung,et al. An error propagation free data hiding algorithm in HEVC intra-coded frames , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.
[13] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[14] Jan P. Allebach,et al. Clustered-Dot Halftoning With Direct Binary Search , 2013, IEEE Transactions on Image Processing.
[15] Yi Dong,et al. Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model , 2017, IWDW.
[16] Weiming Zhang,et al. Decomposing Joint Distortion for Adaptive Steganography , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[17] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[18] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[19] Qingzhong Liu,et al. Derivative-based audio steganalysis , 2011, TOMCCAP.
[20] Jessica J. Fridrich,et al. Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.
[21] Lei Zhu,et al. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..
[22] Ke Niu,et al. A Novel Video Reversible Data Hiding Algorithm Using Motion Vector for H.264/AVC , 2017 .
[23] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[24] Asad Malik,et al. Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image , 2019, Int. J. Digit. Crime Forensics.
[25] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[26] Yao Zhao,et al. Detection of image sharpening based on histogram aberration and ringing artifacts , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[27] Oscar C. Au,et al. Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..
[28] John Langford,et al. The arbitrariness of reviews, and advice for school administrators , 2015, Commun. ACM.
[29] Sos S. Agaian,et al. Fractal steganography using artificially generated images , 2006, 2006 IEEE Region 5 Conference.
[30] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[31] Xinpeng Zhang,et al. Detection of double JPEG compression using modified DenseNet model , 2018, Multimedia Tools and Applications.
[32] Gang Xiong,et al. Image resampling detection based on texture classification , 2013, Multimedia Tools and Applications.
[33] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[34] Chao Jin,et al. Steganalysis of MP3Stego with low embedding-rate using Markov feature , 2017, Multimedia Tools and Applications.
[35] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[36] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[37] Jiwu Huang,et al. New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.
[38] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[39] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[40] Peng Liu,et al. Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec , 2017, Multimedia Systems.
[41] Jana Dittmann,et al. Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.
[42] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[43] Oscar C. Au,et al. Halftone image data hiding with intensity selection and connection selection , 2001, Signal Process. Image Commun..
[44] Neil F. Johnson,et al. Detection of Hidden Information, Covert Channels and Information Flows , 2009 .
[45] Ali Ahmadi,et al. Quantization-Unaware Double JPEG Compression Detection , 2016, Journal of Mathematical Imaging and Vision.
[46] Bin Ma,et al. Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.
[47] Catherine A. Theohary,et al. Terrorist Use of the Internet: Information Operations in Cyberspace , 2011 .
[48] Gaobo Yang,et al. Referenceless Measure of Blocking Artifacts by Tchebichef Kernel Analysis , 2014, IEEE Signal Processing Letters.
[49] Christos Faloutsos,et al. VolTime: Unsupervised Anomaly Detection on Users' Online Activity Volume , 2017, SDM.
[50] Ton Kalker,et al. Issues with digital watermarking and perceptual hashing , 2001, SPIE ITCom.
[51] Yide Ma,et al. Robust unsupervised feature selection via matrix factorization , 2017, Neurocomputing.
[52] Lina Wang,et al. An AMR adaptive steganography algorithm based on minimizing distortion , 2017, Multimedia Tools and Applications.
[53] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[54] Apurva N. Mahajan,et al. Detect Covert Channels in TCP/IP Header using Naive Bayes , 2015 .
[55] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[56] Kuang-Shyr Wu. A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..
[57] Qin Zhang,et al. Downscaling Factor Estimation on Pre-JPEG Compressed Images , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[58] Jessica J. Fridrich,et al. On detection of median filtering in digital images , 2010, Electronic Imaging.
[59] Xiangyang Luo,et al. Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[60] Minoru Kuribayashi,et al. Improved DM-QIM Watermarking Scheme for PDF Document , 2019, IWDW.
[61] Chien-Chang Chen,et al. A Geometry-Based Secret Image Sharing Approach , 2008, J. Inf. Sci. Eng..
[62] Z. Jane Wang,et al. Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.
[63] Jessica Fridrich,et al. Steganography With Multiple JPEG Images of the Same Scene , 2017, IEEE Transactions on Information Forensics and Security.
[64] Weisi Lin,et al. GridSAR: Grid strength and regularity for robust evaluation of blocking artifacts in JPEG images , 2015, J. Vis. Commun. Image Represent..
[65] Jessica J. Fridrich,et al. Distortion-Free Data Embedding for Images , 2001, Information Hiding.
[66] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[67] Weiming Zhang,et al. Defining embedding distortion for motion vector-based video steganography , 2014, Multimedia Tools and Applications.
[68] Chi-Man Pun,et al. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..
[69] Graham Rawlinson,et al. The Significance of Letter Position in Word Recognition , 2007, IEEE Aerospace and Electronic Systems Magazine.
[70] Nashirah Abu Bakar,et al. Cryptocurrency Framework Diagnostics from Islamic Finance Perspective: A New Insight of Bitcoin System Transaction , 2017 .
[71] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[72] Raphaël Couturier,et al. Blind digital watermarking in PDF documents using Spread Transform Dither Modulation , 2015, Multimedia Tools and Applications.
[73] Guanshuo Xu,et al. Deep Convolutional Neural Network to Detect J-UNIWARD , 2017, IH&MMSec.
[74] Chin-Chen Chang,et al. Perceptual hashing for color images based on hybrid extraction of structural features , 2018, Signal Process..
[75] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[76] Hsiu-Feng Lin,et al. A COPYRIGHT PROTECTION SCHEME BASED ON PDF , 2012 .
[77] H. Sebastian Seung,et al. Learning the parts of objects by non-negative matrix factorization , 1999, Nature.
[78] Vojtech Holub,et al. On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.
[79] Ramarathnam Venkatesan,et al. Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[80] M. Iansiti,et al. The Truth about Blockchain , 2017 .
[81] Yongfeng Huang,et al. A Fast and Efficient Text Steganalysis Method , 2019, IEEE Signal Processing Letters.
[82] Davide Cozzolino,et al. Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[83] Shiguang Liu,et al. Robustness and Discrimination Oriented Hashing Combining Texture and Invariant Vector Distance , 2018, ACM Multimedia.
[84] Soo-Chang Pei,et al. High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter , 2006, IEEE Transactions on Image Processing.
[85] Seyed Reza Shahamiri,et al. Artificial neural networks as speech recognisers for dysarthric speech: Identifying the best-performing set of MFCC parameters and studying a speaker-independent approach , 2014, Adv. Eng. Informatics.
[86] Yu Zhang,et al. A Steganography Scheme Based on Fractal Images , 2011, 2011 Second International Conference on Networking and Distributed Computing.
[87] Brian K. Lien,et al. Improved Halftone Data Hiding Scheme Using Hilbert Curve Neighborhood Toggling , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[88] Iryna Gurevych,et al. Is it Time to Swish? Comparing Deep Learning Activation Functions Across NLP tasks , 2018, EMNLP.
[89] Tamer Shanableh. Matrix encoding for data hiding using multilayer video coding and transcoding solutions , 2012, Signal Process. Image Commun..
[90] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[91] Sen Bai,et al. Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.
[92] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[93] Eric Gilbert,et al. VADER: A Parsimonious Rule-Based Model for Sentiment Analysis of Social Media Text , 2014, ICWSM.
[94] Ketan Anand,et al. Anomaly detection in online social network: A survey , 2017, 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT).
[95] Pawel Korus,et al. Adaptive Self-Embedding Scheme With Controlled Reconstruction Performance , 2014, IEEE Transactions on Information Forensics and Security.
[96] Geoffrey E. Hinton,et al. Dynamic Routing Between Capsules , 2017, NIPS.
[97] Saylee Gharge,et al. Review on Various Visual Cryptography Schemes , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).
[98] Xianfeng Zhao,et al. Pitch Delay Based Adaptive Steganography for AMR Speech Stream , 2018, IWDW.
[99] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[100] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[101] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[102] Chen Gong,et al. Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position , 2019, IH&MMSec.
[103] Diqun Yan,et al. Audio Steganalysis with Improved Convolutional Neural Network , 2019, IH&MMSec.
[104] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[105] Olivier Déforges,et al. Design and security analysis of two robust keyed hash functions based on chaotic neural networks , 2019, Journal of Ambient Intelligence and Humanized Computing.
[106] Kai Chen,et al. Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification , 2018, Secur. Commun. Networks.
[107] Ling Shao,et al. Binary Multi-View Clustering , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[108] Jean-Luc Dugelay,et al. Reversible Image Data Hiding with Contrast Enhancement , 2015, IEEE Signal Processing Letters.
[109] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[110] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[111] Yong-Feng Huang,et al. RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks , 2019, IEEE Transactions on Information Forensics and Security.
[112] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[113] M.H. Shirali-Shahreza,et al. Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[114] Ivan Laptev,et al. Is object localization for free? - Weakly-supervised learning with convolutional neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[115] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[116] Rong Zhang,et al. No-Reference JPEG Image Quality Assessment Based on Blockiness and Luminance Change , 2017, IEEE Signal Processing Letters.
[117] Yongfeng Huang,et al. TS-RNN: Text Steganalysis Based on Recurrent Neural Networks , 2019, IEEE Signal Processing Letters.
[118] Peter Vary,et al. High rate data hiding in ACELP speech codecs , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[119] Ming Tang,et al. AMR Steganalysis Based on the Probability of Same Pulse Position , 2015, IEEE Transactions on Information Forensics and Security.
[120] Wei Lu,et al. Secure Binary Image Steganography Based on Fused Distortion Measurement , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[121] Wei Lu,et al. Secure Binary Image Steganography With Distortion Measurement Based on Prediction , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[122] Pierre Boulanger,et al. Digital marbling: a multiscale fluid model , 2006, IEEE Transactions on Visualization and Computer Graphics.
[123] MARCO CARPENTIERI. A perfect threshold secret sharing scheme to identify cheaters , 1995, Des. Codes Cryptogr..
[124] Xinpeng Zhang,et al. Distortion function based on residual blocks for JPEG steganography , 2017, Multimedia Tools and Applications.
[125] Xiao Zeng,et al. Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.
[126] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[127] Weiming Zhang,et al. Reversibility improved data hiding in encrypted images , 2014, Signal Process..
[128] Jiri Fridrich,et al. Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[129] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.
[130] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[131] Jeho Nam,et al. Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[132] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[133] Yun Q. Shi,et al. Ensemble of CNNs for Steganalysis: An Empirical Study , 2016, IH&MMSec.
[134] Wei Lu,et al. Copy-move forgery detection using combined features and transitive matching , 2018, Multimedia Tools and Applications.
[135] Xianfeng Zhao,et al. RHFCN:: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[136] Yun Q. Shi,et al. Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration , 2013, IWDW.
[137] Tie-Yan Liu,et al. On the Depth of Deep Neural Networks: A Theoretical View , 2015, AAAI.
[138] Lina Wang,et al. A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame , 2017, IWDW.
[139] Fouad Khelifi,et al. Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.
[140] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[141] Gwoboa Horng,et al. Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..
[142] Zhili Chen,et al. A new scheme for covert communication via 3G encoded speech , 2012, Comput. Electr. Eng..
[143] Adi Shamir,et al. How to share a secret , 1979, CACM.
[144] Jagannath H. Nirmal,et al. A unique approach in text independent speaker recognition using MFCC feature sets and probabilistic neural network , 2015, 2015 Eighth International Conference on Advances in Pattern Recognition (ICAPR).
[145] Patrick Pérez,et al. Poisson image editing , 2003, ACM Trans. Graph..
[146] Chao Li,et al. Active Transfer Learning Network: A Unified Deep Joint Spectral–Spatial Feature Learning Model for Hyperspectral Image Classification , 2019, IEEE Transactions on Geoscience and Remote Sensing.
[147] Shanyu Tang,et al. An Approach to Information Hiding in Low Bit-Rate Speech Stream , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[148] Yao Zhao,et al. Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding , 2015, Signal Process..
[149] Yoshua Bengio,et al. Domain Adaptation for Large-Scale Sentiment Classification: A Deep Learning Approach , 2011, ICML.
[150] Andrew D. Ker. The Square Root Law of Steganography: Bringing Theory Closer to Practice , 2017, IH&MMSec.
[151] Jia Liu,et al. Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion , 2017, EIDWT.
[152] Marc Chaumont,et al. Deep Learning in steganography and steganalysis from 2015 to 2018 , 2019, Digital Media Steganography.
[153] Yongfeng Huang,et al. Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry , 2017, IH&MMSec.
[154] Qiang Cheng,et al. Generalized Embedding of Multiplicative Watermarks , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[155] Jiangqun Ni,et al. A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[156] Mohammad Iftekhar Husain,et al. Covert Botnet Command and Control Using Twitter , 2015, ACSAC.
[157] Xiao Xiang Zhu,et al. Deep Recurrent Neural Networks for Hyperspectral Image Classification , 2017, IEEE Transactions on Geoscience and Remote Sensing.
[158] Paolo Bestagini,et al. First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.
[159] Marc Chaumont,et al. Steganalysis with cover-source mismatch and a small learning database , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[160] Brian K. Lien,et al. Reversible data hiding for ordered dithered halftone images , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[161] Jiwu Huang,et al. Evaluation of random field models in multi-modal unsupervised tampering localization , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[162] Yongfeng Huang,et al. A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding , 2017, SecureComm.
[163] Bolin Chen,et al. Audio Steganalysis with Convolutional Neural Network , 2017, IH&MMSec.
[164] Matti Pietikäinen,et al. A comparative study of texture measures with classification based on featured distributions , 1996, Pattern Recognit..
[165] Douglas A. Reynolds,et al. Speaker identification and verification using Gaussian mixture speaker models , 1995, Speech Commun..
[166] Frank Hutter,et al. SGDR: Stochastic Gradient Descent with Restarts , 2016, ArXiv.
[167] Jessica J. Fridrich,et al. Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[168] H. A. Aly,et al. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error , 2011, IEEE Transactions on Information Forensics and Security.
[169] Richard S. Zemel,et al. Prototypical Networks for Few-shot Learning , 2017, NIPS.
[170] D. G. Bhalke,et al. Speaker verification using Gaussian Mixture Model , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[171] Xiangyang Luo,et al. Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[172] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[173] Bin Li,et al. Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[174] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[175] Feiping Nie,et al. Adaptive-weighting discriminative regression for multi-view classification , 2019, Pattern Recognit..
[176] Jan P. Allebach,et al. Quad-interleaved Block Level Parallel Direct Binary Search Algorithm , 2016, Color Imaging: Displaying, Processing, Hardcopy, and Applications.
[177] Yan Liu,et al. Deep residual learning for image steganalysis , 2018, Multimedia Tools and Applications.
[178] Alexander Kain,et al. Spectral voice conversion for text-to-speech synthesis , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[179] Wei Wang,et al. New Graph-Theoretic Approach to Social Steganography , 2019, Media Watermarking, Security, and Forensics.
[180] Xin He,et al. Motion Vector Based Information Hiding Algorithm for H.264/AVC against Motion Vector Steganalysis , 2012, ACIIDS.
[181] Juha Partala,et al. Provably Secure Covert Communication on Blockchain , 2018, Cryptogr..
[182] Steve Harenberg,et al. Anomaly detection in dynamic networks: a survey , 2015 .
[183] Mohamad Khalil,et al. Secure Hash Algorithm based on Efficient Chaotic Neural Network , 2016, 2016 International Conference on Communications (COMM).
[184] Jiwu Huang,et al. Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[185] Mohammad Saniee Abadeh,et al. Image steganalysis using a bee colony based feature selection algorithm , 2014, Eng. Appl. Artif. Intell..
[186] Yongfeng Huang,et al. RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network , 2018, IEEE Transactions on Information Forensics and Security.
[187] Kun Yang,et al. CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain , 2018, IH&MMSec.
[188] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[189] Wei Lu,et al. Efficient halftone image steganography based on dispersion degree optimization , 2018, Journal of Real-Time Image Processing.
[190] Jing-Ming Guo,et al. Improved data hiding in halftone images with cooperating pair toggling human visual system , 2008, Int. J. Imaging Syst. Technol..
[191] Oriol Vinyals,et al. Matching Networks for One Shot Learning , 2016, NIPS.
[192] Kilian Q. Weinberger,et al. Marginalized Denoising Autoencoders for Domain Adaptation , 2012, ICML.
[193] Roman Senkerik,et al. Steganography Detection by Means of Neural Networks , 2008, 2008 19th International Workshop on Database and Expert Systems Applications.
[194] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[195] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[196] Yue Zhang,et al. Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding , 2017, IWDW.
[197] Pao-Chi Chang,et al. Spectral-temporal receptive fields and MFCC balanced feature extraction for robust speaker recognition , 2016, Multimedia Tools and Applications.
[198] Rik Van de Walle,et al. Out-of-the-loop information hiding for HEVC video , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[199] Xijian Ping,et al. Steganalysis of Analysis-by-Synthesis Compressed Speech , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[200] Hetal N. Patel,et al. Design of a color palette based image steganography algorithm for fractal images , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[201] Jing Dong,et al. CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.
[202] Wei Lu,et al. Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.
[203] Shichao Zhang,et al. Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.
[204] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[205] Rajendra Bharti,et al. Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.
[206] Xiaogang Jin,et al. From design methodology to evolutionary design: An interactive creation of marble-like textile patterns , 2014, Eng. Appl. Artif. Intell..
[207] Tomás Pevný,et al. A mishmash of methods for mitigating the model mismatch mess , 2014, Electronic Imaging.
[208] Rong Zhao,et al. A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.
[209] K. J. Ray Liu,et al. Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.
[210] K. V. Arya,et al. Feature selection for image steganalysis using levy flight-based grey wolf optimization , 2018, Multimedia Tools and Applications.
[211] Kai Wang,et al. General-purpose image forensics using patch likelihood under image statistical models , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[212] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[213] Shuangyuan Yang,et al. Content-based image authentication: current status, issues, and challenges , 2007, International Conference on Semantic Computing (ICSC 2007).
[214] Ming Yu Fan,et al. An Efficient Separable Reversible Data Hiding Using Paillier Cryptosystem for Preserving Privacy in Cloud Domain , 2019 .
[215] Jessica J. Fridrich,et al. Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.
[216] Ching-Nung Yang,et al. (k,n) secret image sharing scheme capable of cheating detection , 2018, EURASIP J. Wirel. Commun. Netw..
[217] Vincent H. Berk,et al. Detection of Covert Channel Encoding in Network Packet Delays , 2005 .
[218] Rainer Böhme,et al. The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.
[219] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[220] Bo Hu,et al. Quaternion Discrete Cosine Transform and its Application in Color Template Matching , 2008, 2008 Congress on Image and Signal Processing.
[221] Qasim Mohammed Hussein,et al. Suitability of Using Julia Set Images as a Cover for Hiding Information , 2018, 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT).
[222] Wanqi Li,et al. Towards a Protocol for Autonomic Covert Communication , 2011, ATC.
[223] Monali Mavani,et al. Covert channel in IPv6 Destination option Extension header , 2014, 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA).
[224] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[225] Sorin Iftene,et al. Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes , 2010, IACR Cryptol. ePrint Arch..
[226] Jan P. Allebach,et al. Impact of HVS models on model-based halftoning , 2002, IEEE Trans. Image Process..
[227] Rahul V. Patil,et al. Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution , 2015 .
[228] A. Piva. An Overview on Image Forensics , 2013 .
[229] Zenglin Xu,et al. Self-weighted multi-view clustering with soft capped norm , 2018, Knowl. Based Syst..
[230] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[231] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[232] Michael I. Jordan,et al. Deep Transfer Learning with Joint Adaptation Networks , 2016, ICML.
[233] Shuli Zheng,et al. Lossless Data Hiding Based on Homomorphic Cryptosystem , 2019, IEEE Transactions on Dependable and Secure Computing.
[234] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[235] Jiwu Huang,et al. Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.
[236] Yanxiao Liu. Linear (k, n) Secret Sharing Scheme with Cheating Detection , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[237] William Puech,et al. Perceptual Image Hashing , 2012 .
[238] Akira Nishimura. Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band Speech Codec , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[239] Chin-Chen Chang,et al. Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery , 2018, IEEE MultiMedia.
[240] Guy Pujolle,et al. A Vademecum on Blockchain Technologies: When, Which, and How , 2019, IEEE Communications Surveys & Tutorials.
[241] Jiwu Huang,et al. A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.
[242] Wen-Hsiang Tsai,et al. A new approach to covert communication via PDF files , 2010, Signal Process..
[243] Avinash Madasu,et al. Gated Convolutional Neural Networks for Domain Adaptation , 2019, NLDB.
[244] Yao Zhao,et al. Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis , 2011, IEEE Signal Processing Letters.
[245] Taeshik Shon,et al. A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine , 2003, ICICS.
[246] Andreas Rössler,et al. ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection , 2018, ArXiv.
[247] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[248] Tomás Pevný,et al. Benchmarking for Steganography , 2008, Information Hiding.
[249] Hong Zhang,et al. Motion vector-based video steganography with preserved local optimality , 2016, Multimedia Tools and Applications.
[250] Jing-Ming Guo,et al. High efficient Direct Binary Search using Multiple Lookup Tables , 2012, 2012 19th IEEE International Conference on Image Processing.
[251] Shaohua Tang,et al. A high-capacity reversible data hiding method for homomorphic encrypted images , 2019, J. Vis. Commun. Image Represent..
[252] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[253] Wei Lu,et al. Binary image steganalysis based on pixel mesh Markov transition matrix , 2015, J. Vis. Commun. Image Represent..
[254] Mikhail J. Atallah,et al. Information hiding through errors: a confusing approach , 2007, Electronic Imaging.
[255] Ran-Zan Wang,et al. Scalable Secret Image Sharing With Smaller Shadow Images , 2010, IEEE Signal Processing Letters.
[256] Xuelong Li,et al. Facial Skin Beautification Using Adaptive Region-Aware Masks , 2014, IEEE Transactions on Cybernetics.
[257] Yann LeCun,et al. Generalization and network design strategies , 1989 .
[258] Mo Chen,et al. JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images , 2017, IH&MMSec.
[259] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[260] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[261] William W. Streilein,et al. Detecting HTTP Tunneling Activities , 2002 .
[262] Keke Gai,et al. Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.
[263] Jessica J. Fridrich,et al. Study of cover source mismatch in steganalysis and ways to mitigate its impact , 2014, Electronic Imaging.
[264] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[265] Pichao Wang,et al. Robust unsupervised feature selection via dual self-representation and manifold regularization , 2018, Knowl. Based Syst..
[266] Chin-Chen Chang,et al. A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..
[267] Anil K. Jain,et al. Face Detection in Color Images , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[268] Zhenxing Qian,et al. Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[269] Jian Sun,et al. Identity Mappings in Deep Residual Networks , 2016, ECCV.
[270] Sushanta Biswas,et al. A new (k, n) verifiable secret image sharing scheme (VSISS) , 2014 .
[271] Hongbin Zhang,et al. High Capacity Data Hiding for Halftone Image Authentication , 2012, IWDW.
[272] Yan Liu,et al. Steganalysis via Deep Residual Network , 2016, 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS).
[273] Kenji Fukumizu,et al. Equivalence of distance-based and RKHS-based statistics in hypothesis testing , 2012, ArXiv.
[274] Weisi Lin,et al. A locally-adaptive algorithm for measuring blocking artifacts in images and videos , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[275] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[276] Wei Lu,et al. Region duplication detection based on hybrid feature and evaluative clustering , 2019, Multimedia Tools and Applications.
[277] Wei Zheng,et al. Robust unsupervised feature selection by nonnegative sparse subspace learning , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).
[278] Yao Zhao,et al. Forensic detection of median filtering in digital images , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[279] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[280] Yao Zhao,et al. Median filtering detection of small-size image based on CNN , 2018, J. Vis. Commun. Image Represent..
[281] Xiangwei Kong,et al. Cover-Source Mismatch in Deep Spatial Steganalysis , 2019, IWDW.
[282] Yun Q. Shi,et al. A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern , 2013, IWDW.
[283] Wei Wu,et al. GMM Supervector Based SVM with Spectral Features for Speech Emotion Recognition , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[284] Chi-Man Pun,et al. Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.
[285] Xianfeng Zhao,et al. Defining Joint Embedding Distortion for Adaptive MP3 Steganography , 2019, IH&MMSec.
[286] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[287] William Puech,et al. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.
[288] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[289] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[290] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[291] Wojciech Mazurczyk,et al. Trends in steganography , 2014, Commun. ACM.
[292] Sushil K. Bhattacharjee,et al. Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[293] DeLiang Wang,et al. Analyzing noise robustness of MFCC and GFCC features in speaker identification , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[294] KokSheik Wong,et al. A Unified Data Embedding and Scrambling Method , 2014, IEEE Transactions on Image Processing.
[295] Xueqing Wang,et al. A new audio steganalysis method based on linear prediction , 2017, Multimedia Tools and Applications.
[296] Xiaolong Li,et al. A Statistics-Based Watermarking Scheme Robust to Print-and-Scan , 2008, 2008 International Symposium on Electronic Commerce and Security.
[297] Andrew D. Ker,et al. Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.
[298] Yu-Chi Chen,et al. Encrypted image-based reversible data hiding with public key cryptography from difference expansion , 2015, Signal Process. Image Commun..
[299] Su Xiao. THE RESULTING OF THE SYMMETRIC FRACTAL ART IMAGES WITH IMPROVED NEWTON RAPHSON METHOD , 1999 .
[300] Hongxia Wang,et al. Reversible data hiding in homomorphically encrypted image using interpolation technique , 2019, J. Inf. Secur. Appl..
[301] Lip Yee Por,et al. Information Hiding: A New Approach in Text Steganography , 2008 .
[302] Hang Zhou,et al. Defining Cost Functions for Adaptive JPEG Steganography at the Microscale , 2019, IEEE Transactions on Information Forensics and Security.
[303] Chi-Man Pun,et al. Robust image hashing using progressive feature selection for tampering detection , 2017, Multimedia Tools and Applications.
[304] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[305] Shinfeng D. Lin,et al. Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..
[306] Gao Hai-ying,et al. The MP3 Steganography Algorithm Based on Huffman Coding , 2007 .
[307] Jiwu Huang,et al. Fragility Analysis of Adaptive Quantization-Based Image Hashing , 2010, IEEE Transactions on Information Forensics and Security.
[308] K. J. Ray Liu,et al. Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.
[309] Dong-Ming Yan,et al. Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks , 2018, IEEE Transactions on Information Forensics and Security.
[310] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[311] KokSheik Wong,et al. Information hiding in HEVC standard using adaptive coding block size decision , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[312] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[313] Weiming Zhang,et al. A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images , 2017, Multimedia Tools and Applications.
[314] Xingming Sun,et al. Linguistic steganalysis using the features derived from synonym frequency , 2012, Multimedia Tools and Applications.
[315] Oscar C. Au,et al. Data hiding in halftone images with parity coding , 2001, IS&T/SPIE Electronic Imaging.
[316] Chang-Tsun Li,et al. Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[317] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[318] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[319] Jie Yang,et al. An efficient information hiding method based on motion vector space encoding for HEVC , 2017, Multimedia Tools and Applications.
[320] Latika Singh,et al. A hybrid feature selection approach based on improved PSO and filter approaches for image steganalysis , 2016, Int. J. Mach. Learn. Cybern..
[321] Chun-Wei Yang,et al. Recover the tampered image based on VQ indexing , 2010, Signal Process..
[322] Tieyong Zeng,et al. Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.
[323] Jessica J. Fridrich,et al. Phase-aware projection model for steganalysis of JPEG images , 2015, Electronic Imaging.
[324] Ki-Hyun Jung. A high-capacity reversible data hiding scheme based on sorting and prediction in digital images , 2016, Multimedia Tools and Applications.
[325] John F. Jarvis,et al. A survey of techniques for the display of continuous tone pictures on bilevel displays , 1976 .
[326] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[327] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[328] Jiwu Huang,et al. Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.
[329] Panagiotis Tsakalides,et al. Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.
[330] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[331] Wei Lu,et al. Image Deblocking Detection Based on a Convolutional Neural Network , 2019, IEEE Access.
[332] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[333] Marc Chaumont,et al. Yedroudj-Net: An Efficient CNN for Spatial Steganalysis , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[334] Ali Broumandnia,et al. Image steganalysis using improved particle swarm optimization based feature selection , 2018, Applied Intelligence.
[335] Ramarathnam Venkatesan,et al. Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[336] Kun Yang,et al. Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution , 2017, International Workshop on Digital Watermarking.
[337] Xian-Mo Zhang,et al. Cheating Prevention in Linear Secret Sharing , 2002, ACISP.
[338] Di Xiao,et al. Reversible data hiding in encrypted images using cross division and additive homomorphism , 2015, Signal Process. Image Commun..
[339] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[340] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[341] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[342] Shiguo Lian,et al. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.
[343] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[344] Bin Li,et al. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion , 2013, Signal Process..
[345] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[346] Wei Lu,et al. Binary image steganography based on joint distortion measurement , 2019, J. Vis. Commun. Image Represent..
[347] Heidi A. Peterson,et al. Luminance-model-based DCT quantization for color image compression , 1992, Electronic Imaging.
[348] Grzegorz Lewandowski,et al. Covert Channels in IPv6 , 2005, Privacy Enhancing Technologies.
[349] Yicong Zhou,et al. Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling , 2019, IEEE Transactions on Multimedia.
[350] Rangding Wang,et al. Tunable data hiding in partially encrypted H.264/AVC videos , 2017, J. Vis. Commun. Image Represent..
[351] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[352] Qingzhong Liu,et al. Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[353] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[354] Renata Teixeira,et al. Early Recognition of Encrypted Applications , 2007, PAM.
[355] Mohan S. Kankanhalli,et al. Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.
[356] P. P. Vaidyanathan,et al. Optimized halftoning using dot diffusion and methods for inverse halftoning , 2000, IEEE Trans. Image Process..
[357] Y.-L. Chen,et al. Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.
[358] Giulia Boato,et al. Forensics of High Quality and Nearly Identical JPEG Image Recompression , 2016, IH&MMSec.
[359] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[360] Belhassen Bayar,et al. Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[361] Feiping Nie,et al. Robust feature selection via simultaneous sapped norm and sparse regularizer minimization , 2018, Neurocomputing.
[362] Ryan Prenger,et al. Waveglow: A Flow-based Generative Network for Speech Synthesis , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[363] Christos Faloutsos,et al. Modeling Temporal Activity to Detect Anomalous Behavior in Social Media , 2017, ACM Trans. Knowl. Discov. Data.
[364] Xinpeng Zhang,et al. Lost in the Digital Wild: Hiding Information in Digital Activities , 2018, MPS@CCS.
[365] Luc Van Gool,et al. Adversarial Binary Coding for Efficient Person Re-Identification , 2018, 2019 IEEE International Conference on Multimedia and Expo (ICME).
[366] Zhenxing Qian,et al. Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.
[367] Xinpeng Zhang,et al. Selective Ensemble Classification of Image Steganalysis Via Deep Q Network , 2019, IEEE Signal Processing Letters.
[368] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[369] Alessandro Piva,et al. Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.
[370] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[371] Xingyu Yan,et al. Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system , 2018, Quantum Information Processing.
[372] Chen Cui,et al. Depth Information Estimation-Based DIBR 3D Image Hashing Using SIFT Feature Points , 2020 .
[373] Bin Li,et al. New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.
[374] Meisam Khalil Arjmandi,et al. Audio steganalysis based on reversed psychoacoustic model of human hearing , 2016, Digit. Signal Process..
[375] Xuelong Li,et al. Block-Row Sparse Multiview Multilabel Learning for Image Classification , 2016, IEEE Transactions on Cybernetics.
[376] Paolo Bestagini,et al. Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks , 2017, J. Vis. Commun. Image Represent..
[377] Zachary Chase Lipton. A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.
[378] Alex Graves,et al. Supervised Sequence Labelling with Recurrent Neural Networks , 2012, Studies in Computational Intelligence.
[379] Rangding Wang,et al. Separable and error-free reversible data hiding in encrypted images , 2016, Signal Process..
[380] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[381] Minqing Zhang,et al. Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC , 2017 .
[382] Jing-Ming Guo,et al. Halftone-Image Security Improving Using Overall Minimal-Error Searching , 2011, IEEE Transactions on Image Processing.
[383] Yi Ma,et al. Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms , 2017, IH&MMSec.
[384] Kejiang Chen,et al. Defining Joint Distortion for JPEG Steganography , 2018, IH&MMSec.
[385] Yuting Su,et al. Smooth filtering identification based on convolutional neural networks , 2019, Multimedia Tools and Applications.
[386] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[387] Koby Crammer,et al. A theory of learning from different domains , 2010, Machine Learning.
[388] KokSheik Wong,et al. HEVC video authentication using data embedding technique , 2015, 2015 IEEE International Conference on Image Processing (ICIP).
[389] Maxim Anikeev,et al. Network Based Detection of Passive Covert Channels in TCP/IP , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.
[390] Eric Moulines,et al. Pitch-synchronous waveform processing techniques for text-to-speech synthesis using diphones , 1989, Speech Commun..
[391] Jianyi Liu,et al. Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis , 2020, IEEE Transactions on Information Forensics and Security.
[392] Liusheng Huang,et al. Steganalysis of Compressed Speech Based on Markov and Entropy , 2013, IWDW.
[393] Tiegang Gao,et al. Robust detection of median filtering based on combined features of difference image , 2019, Signal Process. Image Commun..
[394] Touradj Ebrahimi,et al. Calculation of average coding efficiency based on subjective quality scores , 2014, Journal of Visual Communication and Image Representation.
[395] Josef Pieprzyk,et al. Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis , 2010, ISPEC.
[396] Fei Peng,et al. Improved PVO-based reversible data hiding , 2014, Digit. Signal Process..
[397] Peng Liu,et al. Steganography integrated into linear predictive coding for low bit-rate speech codec , 2016, Multimedia Tools and Applications.
[398] Rangding Wang,et al. An improved scheme for data hiding in encrypted H.264/AVC videos , 2016, J. Vis. Commun. Image Represent..
[399] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[400] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[401] Wael Abd-Almageed,et al. BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.
[402] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[403] Yuan Yujin,et al. Research of speaker recognition based on combination of LPCC and MFCC , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.
[404] Nobuo Funabiki,et al. Robust and Secure Data Hiding for PDF Text Document , 2019, IEICE Trans. Inf. Syst..
[405] Shijun Xiang,et al. Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[406] Qin Bo,et al. Improving image copy-move forgery detection with particle swarm optimization techniques , 2016, China Communications.
[407] Dusit Niyato,et al. Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.
[408] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[409] Po-Whei Huang,et al. A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..
[410] Sebastian Zander,et al. Stealthier Inter-packet Timing Covert Channels , 2011, Networking.
[411] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[412] Xinxin Niu,et al. Non-uniform Quantization in Breaking HUGO , 2013, IWDW.
[413] Xueqi Cheng,et al. Data Hiding in a Kind of PDF Texts for Secret Communication , 2007, Int. J. Netw. Secur..
[414] Oscar C. Au,et al. Data hiding by smart pair toggling for halftone images , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[415] Xu Zhang,et al. Digital image encryption scheme based on generalized Mandelbrot-Julia set , 2019, Optik.
[416] Xijian Ping,et al. Steganalysis of Compressed Speech Based on Histogram Features , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).
[417] Alessandro Piva,et al. Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.
[418] Qi Shen,et al. Perceptual hashing for color image based on color opponent component and quadtree structure , 2020, Signal Process..
[419] Xinpeng Zhang,et al. Behavior Steganography in Social Network , 2017 .
[420] Bo Jiang,et al. A CABAC based HEVC video steganography algorithm without bitrate increase , 2015 .
[421] Feiping Nie,et al. Efficient and Robust Feature Selection via Joint ℓ2, 1-Norms Minimization , 2010, NIPS.
[422] David J. Sakrison,et al. The effects of a visual fidelity criterion of the encoding of images , 1974, IEEE Trans. Inf. Theory.
[423] Z. Jane Wang,et al. Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding , 2013, IEEE Transactions on Information Forensics and Security.
[424] Jessica J. Fridrich,et al. Effect of Image Downsampling on Steganographic Security , 2014, IEEE Transactions on Information Forensics and Security.
[425] Yongfeng Huang,et al. RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model , 2018, ICCCS.
[426] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[427] Jiri Fridrich,et al. Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).