Steganalysis of YASS
暂无分享,去创建一个
[1] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[2] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[3] Bin Li,et al. Steganalysis of YASS , 2009, IEEE Transactions on Information Forensics and Security.
[4] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[5] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[6] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[7] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[8] B. S. Manjunath,et al. Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.
[9] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[10] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[11] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[12] Fenlin Liu,et al. A review on blind detection for image steganography , 2008, Signal Process..
[13] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[14] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[15] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[16] Anindya Sarkar,et al. Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[17] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[18] Yun Q. Shi,et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[19] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[20] Andrew R. Webb,et al. Statistical Pattern Recognition , 1999 .
[21] Jessica J. Fridrich,et al. Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.
[22] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[23] Siwei Lyu,et al. Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[24] B. S. Manjunath,et al. Steganalysis of quantization index modulation data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[25] Rainer Böhme,et al. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics , 2004, ESORICS.
[26] Rajarathnam Chandramouli,et al. Steganalysis of GIM-based data hiding using kernel density estimation , 2007, MM&Sec.
[27] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[28] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[29] Anindya Sarkar,et al. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding scheme , 2008, 2008 15th IEEE International Conference on Image Processing.
[30] Wei Su,et al. A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.
[31] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[32] Brendan J. Frey,et al. Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.
[33] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[34] Yun Q. Shi,et al. A natural image model approach to splicing detection , 2007, MM&Sec.
[35] Bin Li,et al. Detecting doubly compressed JPEG images by using Mode Based First Digit Features , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.
[36] Carl-Erik W. Sundberg. Erasure and Error Decoding for Semiconductor Memories , 1978, IEEE Transactions on Computers.
[37] Wei Su,et al. Steganalysis Versus Splicing Detection , 2008, IWDW.
[38] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[39] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[40] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[41] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[42] Nasir D. Memon,et al. Image manipulation detection , 2006, J. Electronic Imaging.