Pooled Steganalysis in JPEG: how to deal with the spreading strategy?
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain , 2019, IH&MMSec.
[2] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[3] Tomás Pevný,et al. Optimizing pooling function for pooled steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[4] Andrew D. Ker,et al. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.
[5] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[6] Jessica J. Fridrich,et al. Minimizing the embedding impact in steganography , 2006, MM&Sec '06.
[7] Jessica Fridrich,et al. Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory , 2015, IEEE Transactions on Information Forensics and Security.
[8] Tomás Pevný,et al. Batch steganography in the real world , 2012, MM&Sec '12.
[9] Tomás Pevný,et al. A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.
[10] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[11] Jessica J. Fridrich,et al. Steganalyzing Images of Arbitrary Size with CNNs , 2018, Media Watermarking, Security, and Forensics.
[12] Marc Chaumont,et al. Quantitative and Binary Steganalysis in JPEG: A Comparative Study , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[13] Andrew D. Ker,et al. Going from small to large data in steganalysis , 2012, Other Conferences.
[14] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[15] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[16] Jessica J. Fridrich,et al. Practical strategies for content-adaptive batch steganography and pooled steganalysis , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[17] WOW S-UNIWARD,et al. Deep Learning Regressors for Quantitative Steganalysis , 2018 .
[18] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[19] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[20] Jessica J. Fridrich,et al. Quantitative steganalysis using rich models , 2013, Electronic Imaging.
[21] Rémi Cogranne,et al. A sequential method for online steganalysis , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[22] Ingemar J. Cox,et al. A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[23] Marc Chaumont,et al. Steganalysis with cover-source mismatch and a small learning database , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[24] Jessica J. Fridrich,et al. Nonlinear Feature Normalization in Steganalysis , 2017, IH&MMSec.