Image universal steganalysis based on best wavelet packet decomposition
暂无分享,去创建一个
Fenlin Liu | Xiangyang Luo | Chunfang Yang | Daoshun Wang | Xiangyang Luo | Daoshun Wang | Fenlin Liu | Chunfang Yang
[1] Yang Yi-xian. A New Method for Blind Image Steganalysis , 2006 .
[2] Fenlin Liu,et al. A review on blind detection for image steganography , 2008, Signal Process..
[3] Mao Jia. An Attacked Image Based Hidden Messages Blind Detect Technique , 2009 .
[4] Hao Shiqi,et al. Classification using wavelet packet decomposition and support vector machine for digital modulations , 2008 .
[5] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[6] Gilbert L. Peterson,et al. A new blind method for detecting novel steganography , 2005, Digit. Investig..
[7] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[8] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[9] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[10] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[11] Nasir D. Memon,et al. Steganalysis of watermarking techniques using image quality metrics , 2001, IS&T/SPIE Electronic Imaging.
[12] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[13] Jiwu Huang,et al. Calibration based universal JPEG steganalysis , 2009, Science in China Series F: Information Sciences.
[14] Pla Information. Blind image steganalysis based on multi-domain feature scaling and BP network , 2007 .
[15] David G. Stork,et al. Pattern Classification , 1973 .
[16] Jia-Fa Mao,et al. An Attacked Image Based Hidden Messages Blind Detect Technique: An Attacked Image Based Hidden Messages Blind Detect Technique , 2009 .
[17] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[18] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[19] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[20] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[21] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[22] Georgios Tziritas,et al. Wavelet packet analysis for face recognition , 2000, Image Vis. Comput..
[23] HUANGWei,et al. Wavelet packet based feature extraction and recognition of license plate characters , 2005 .
[24] Kemin Wang,et al. Au nanochannels technique and its application in immunoassay , 2004 .
[25] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[26] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[27] Ryosuke Shibasaki,et al. Wavelet Analysis and Its Application , 1996 .
[28] Fenlin Liu,et al. LTSB Steganalysis Based on Quartic Equation , 2007, Trans. Data Hiding Multim. Secur..
[29] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[30] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[31] Wang Shuo-zhong. Statistical Features for Universal Steganalysis on Color Images , 2008 .
[32] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[33] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.