Feature extraction optimization of JPEG steganalysis based on residual images
暂无分享,去创建一个
Yanli Ren | Guorui Feng | Xinpeng Zhang | Zhiyang Jin | Xinpeng Zhang | Yanli Ren | Guorui Feng | Zhiyang Jin
[1] Yi Ma,et al. Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms , 2017, IH&MMSec.
[2] Xinpeng Zhang,et al. Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Wei Zhang,et al. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..
[4] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[5] Saman Shojae Chaeikar,et al. Ensemble SW image steganalysis: A low dimension method for LSBR detection , 2019, Signal Process. Image Commun..
[6] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[7] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[8] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[9] Jessica J. Fridrich,et al. Phase-aware projection model for steganalysis of JPEG images , 2015, Electronic Imaging.
[10] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[11] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[12] Florent Retraint,et al. Statistical detection of data hidden in least significant bits of clipped images , 2014, Signal Process..
[13] Zhenxing Qian,et al. Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[14] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[15] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[16] Chin-Chen Chang,et al. Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery , 2018, IEEE MultiMedia.
[17] Ainuddin Wahid Abdul Wahab,et al. Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..
[18] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[19] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[20] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[21] Xinpeng Zhang,et al. Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.
[22] Florent Retraint,et al. Quality factor estimation of JPEG compressed images , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).