Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles
暂无分享,去创建一个
[1] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[2] Yun Q. Shi,et al. Textural Features for Steganalysis , 2012, Information Hiding.
[3] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[4] Florent Retraint,et al. A local adaptive model of natural images for almost optimal detection of hidden data , 2014, Signal Process..
[5] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[7] Mi Wen,et al. Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles , 2016, IEEE Transactions on Information Forensics and Security.
[8] Tao Zhang,et al. A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.
[9] Tomás Pevný,et al. A new paradigm for steganalysis via clustering , 2011, Electronic Imaging.
[10] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[11] Xinpeng Zhang,et al. Digital image steganalysis based on local textural features and double dimensionality reduction , 2016, Secur. Commun. Networks.
[12] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[13] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[14] Andrew D. Ker,et al. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.
[15] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[16] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[17] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[18] Bernhard Schölkopf,et al. A Kernel Method for the Two-Sample-Problem , 2006, NIPS.
[19] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[20] Florent Retraint,et al. Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.
[21] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[22] Rainer Böhme,et al. Weighted Stego-Image Steganalysis for JPEG Covers , 2008, Information Hiding.
[23] Jessica J. Fridrich,et al. Quantitative Structural Steganalysis of Jsteg , 2010, IEEE Transactions on Information Forensics and Security.
[24] Florent Retraint,et al. Steganalysis of JSteg algorithm using hypothesis testing theory , 2015, EURASIP J. Inf. Secur..
[25] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[26] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[27] Jessica J. Fridrich,et al. Further study on the security of S-UNIWARD , 2014, Electronic Imaging.
[28] David Megías,et al. Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..
[29] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[30] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[31] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[32] Tomás Pevný,et al. Identifying a steganographer in realistic and heterogeneous data sets , 2012, Other Conferences.