Passive spread-spectrum steganalysis
暂无分享,去创建一个
[1] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[2] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[3] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[4] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[5] Ying Wang,et al. Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.
[6] Fatih Kurugollu,et al. SVD-Based Universal Spatial Domain Image Steganalysis , 2010, IEEE Transactions on Information Forensics and Security.
[7] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[8] Dimitris A. Pados,et al. SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[9] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[10] Henrique S. Malvar,et al. Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..
[11] Alin Achim,et al. 18th IEEE International Conference on Image Processing, ICIP 2011, Brussels, Belgium, September 11-14, 2011 , 2011, ICIP.
[12] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[13] Dimitris A. Pados,et al. Optimal Signature Design for Spread-Spectrum Steganography , 2007, IEEE Transactions on Image Processing.
[14] Dimitris A. Pados,et al. Blind iterative recovery of spread-spectrum steganographic messages , 2005, IEEE International Conference on Image Processing 2005.
[15] François Cayre,et al. Achieving subspace or key security for WOA using natural or circular watermarking , 2006, MM&Sec '06.