Statistical Attack Resilient Data Hiding
暂无分享,去创建一个
[1] Abdulmotaleb El-Saddik,et al. RST-invariant digital image watermarking based on log-polar mapping and phase correlation , 2003, IEEE Trans. Circuits Syst. Video Technol..
[2] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[3] Andreas Westfeld. Detecting Low Embedding Rates , 2002, Information Hiding.
[4] Joseph W. Goodman,et al. A mathematical analysis of the DCT coefficient distributions for images , 2000, IEEE Trans. Image Process..
[5] Chengyun Yang,et al. Reversible data hiding based on wavelet spread spectrum , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..
[6] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[7] Fernando Pérez-González,et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..
[8] Wilson W. L. Fung,et al. Rotation, scaling, and translation-invariant multi-bit watermarking based on log-polar mapping and discrete Fourier transform , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[9] Thierry Pun,et al. Asymmetric spread spectrum data-hiding for Laplacian host data , 2005, IEEE International Conference on Image Processing 2005.
[10] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[11] Terry A. Welch,et al. A Technique for High-Performance Data Compression , 1984, Computer.
[12] R. R. Clarke. Transform coding of images , 1985 .
[13] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[14] R. Clarke,et al. Relation between the Karhunen Loève and cosine transforms , 1981 .
[15] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[16] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[17] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[18] Ning Liu,et al. Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.
[19] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[20] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[21] Ross Anderson,et al. Information hiding terminology , 1996 .
[22] Sung-Han Park,et al. A robust video watermarking method , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[23] S. Pholsomboon,et al. Rotation, scale, and translation resilient digital watermarking based on complex exponential function , 2004, 2004 IEEE Region 10 Conference TENCON 2004..
[24] Ying Wang,et al. Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.
[25] K. P. Subbalakshmi,et al. Rotation and cropping resilient data hiding with Zernike moments , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[26] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[27] K. Murali,et al. Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.
[28] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[29] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[30] Athanassios N. Skodras,et al. A subband DCT approach to image watermarking , 2000, 2000 10th European Signal Processing Conference.