A Practical Method to Determine Achievable Rates for Secure Steganography
暂无分享,去创建一个
Xianfeng Zhao | Yun Cao | Lingyu Zhang | Diao Chen | Xianfeng Zhao | Yun Cao | Lingyu Zhang | D. Chen
[1] Jiwu Huang,et al. Distortion function designing for JPEG steganography with uncompressed side-image , 2013, IH&MMSec '13.
[2] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[3] Andrew D. Ker. A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.
[4] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[5] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[6] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[7] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[8] Pierre Moulin,et al. New results on steganographic capacity , 2004 .
[9] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[10] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[11] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[12] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[13] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[14] Christian Cachin,et al. An information-theoretic model for steganography , 2004, Inf. Comput..
[15] Jessica J. Fridrich,et al. Steganalysis of Content-Adaptive Steganography in Spatial Domain , 2011, Information Hiding.
[16] Jessica J. Fridrich,et al. Minimizing additive distortion functions with non-binary embedding operation in steganography , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[17] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[18] Robert M. Haralick,et al. Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..
[19] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[20] Jessica J. Fridrich,et al. The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.
[21] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.