A hierarchical protocol for increasing the stealthiness of steganographic methods
暂无分享,去创建一个
Mikhail J. Atallah | Edward J. Delp | Umut Topkara | Mercan Topkara | Cüneyt M. Taskiran | Eugene T. Lin
[1] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[2] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.
[3] Jessica J. Fridrich,et al. Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.
[4] Radu Sion,et al. Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.
[5] Edward J. Delp,et al. The Watermark Evaluation Testbed (WET) , 2004, IS&T/SPIE Electronic Imaging.
[6] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[7] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[8] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[9] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[10] Hany Farid,et al. Detecting Steganographic Messages in Digital Images , 2001 .
[11] Jessica J. Fridrich,et al. New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.
[12] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[13] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[14] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[15] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[16] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[17] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[18] Neri Merhav,et al. An Image Watermarking Scheme Based on Information Theoretic Principles , 2001 .
[19] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[20] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.