Steganalysis of video sequences using collusion sensitivity
暂无分享,去创建一个
[1] Gary C. Kessler. Steganography: Implications for the Prosecutor and Computer Forensics Examiner , 2004 .
[2] Deepa Kundur,et al. Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.
[3] Robert E. Tarjan,et al. Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[4] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[5] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[6] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[7] Siwei Lyu,et al. Higher-order Wavelet Statistics and their Application to Digital Forensics , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[8] Wen Gao,et al. Steganalysis of data hiding techniques in wavelet domain , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[9] Jean-Luc Dugelay,et al. New intra-video collusion attack using mosaicing , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[10] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[11] Jiri Fridrich,et al. Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[12] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[13] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[14] Rajarathnam Chandramouli,et al. A mathematical framework for active steganalysis , 2003, Multimedia Systems.
[15] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[16] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[17] Shaohui Liu,et al. Steganalysis based on wavelet texture analysis and neural network , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[18] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[19] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[20] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[21] Bülent Sankur,et al. Statistical evaluation of image quality measures , 2002, J. Electronic Imaging.
[22] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.