PM1 steganography in JPEG images using genetic algorithm
暂无分享,去创建一个
Yao Zhao | Zhenfeng Zhu | Rongrong Ni | Lifang Yu | Yao Zhao | Zhenfeng Zhu | R. Ni | Lifang Yu
[1] Phil Sallee,et al. Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..
[2] Lakhmi C. Jain,et al. Intelligent Multimedia Data Hiding: New Directions , 2007, Studies in Computational Intelligence.
[3] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[4] Zbigniew Michalewicz,et al. Genetic Algorithms + Data Structures = Evolution Programs , 1992, Artificial Intelligence.
[5] Jeng-Shyang Pan,et al. Robust VQ-based digital watermarking for memoryless binary symmetric channel , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[6] David Coley,et al. Introduction to Genetic Algorithms for Scientists and Engineers , 1999 .
[7] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[8] Hsiang-Cheh Huang,et al. Genetic Watermarking for Zerotree-Based Applications , 2008 .
[9] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[10] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[11] Hsiang-Cheh Huang,et al. Progressive Watermarking Techniques Using Genetic Algorithms , 2007 .
[12] Jessica J. Fridrich,et al. New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.
[13] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[14] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[15] David Soukal,et al. Advanced steganographic and steganalytic methods in the spatial domain , 2006 .
[16] Bin Li,et al. Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry , 2007, 2007 IEEE International Conference on Image Processing.
[17] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[18] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[19] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[20] J. Fridrich,et al. Attacking the OutGuess , 2002 .
[21] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..