Image complexity and feature mining for steganalysis of least significant bit matching steganography

[1]  Jan Wessnitzer,et al.  A Model of Non-elemental Associative Learning in the Mushroom Body Neuropil of the Insect Brain , 2007, ICANNGA.

[2]  Sushil Jajodia,et al.  Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..

[3]  Qingzhong Liu,et al.  Recursive Feature Addition for Gene Selection , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.

[4]  Qingzhong Liu,et al.  Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[5]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[6]  Tomás Pevný,et al.  Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.

[7]  Qingzhong Liu,et al.  Detect JPEG Steganography Using Polynomial Fitting , 2006 .

[8]  Xin Yao,et al.  Gene selection algorithms for microarray data based on least squares support vector machine , 2006, BMC Bioinformatics.

[9]  Jessica J. Fridrich,et al.  Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.

[10]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[11]  Jessica J. Fridrich,et al.  Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.

[12]  Pierre Moulin,et al.  New sensitivity analysis attack , 2005, IS&T/SPIE Electronic Imaging.

[13]  Qingzhong Liu,et al.  Statistical Correlations and Machine Learning for Steganalysis , 2005 .

[14]  Siwei Lyu,et al.  How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.

[15]  Pierre Moulin,et al.  A stochastic QIM algorithm for robust, undetectable image watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[16]  Siwei Lyu,et al.  Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.

[17]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[18]  Qingzhong Liu,et al.  JPEG compression immune steganography using wavelet transform , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[19]  E. Delp,et al.  Security, steganography, and watermarking of multimedia contents , 2004 .

[20]  Eero P. Simoncelli,et al.  On Advances in Statistical Modeling of Natural Images , 2004, Journal of Mathematical Imaging and Vision.

[21]  J. Wade Davis,et al.  Statistical Pattern Recognition , 2003, Technometrics.

[22]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[23]  William A. Pearlman,et al.  Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.

[24]  Jessica J. Fridrich,et al.  Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.

[25]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[26]  Tao Zhang,et al.  A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.

[27]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[28]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[29]  Nello Cristianini,et al.  Kernel Methods for Pattern Analysis , 2004 .

[30]  Gerhard Winkler,et al.  Image Analysis, Random Fields and Markov Chain Monte Carlo Methods: A Mathematical Introduction , 2002 .

[31]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[32]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[33]  Václav Hlavác,et al.  Ten Lectures on Statistical and Structural Pattern Recognition , 2002, Computational Imaging and Vision.

[34]  L. Sullivan,et al.  Introductory Applied Biostatistics , 2001 .

[35]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[36]  Toby Sharp,et al.  An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.

[37]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[38]  J. Friedman Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .

[39]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[40]  Martin J. Wainwright,et al.  Scale Mixtures of Gaussians and the Statistics of Natural Images , 1999, NIPS.

[41]  Ali N. Akansu,et al.  A robust data hiding scheme for images using DFT , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[42]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[43]  David Mumford,et al.  Statistics of natural images and models , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[44]  Pierre Moulin,et al.  Analysis of Multiresolution Image Denoising Schemes Using Generalized Gaussian and Complexity Priors , 1999, IEEE Trans. Inf. Theory.

[45]  Paul Scheunders,et al.  Statistical texture characterization from discrete wavelet representations , 1999, IEEE Trans. Image Process..

[46]  Yoram Singer,et al.  Improved Boosting Algorithms Using Confidence-rated Predictions , 1998, COLT' 98.

[47]  Jean-Raymond Abrial,et al.  On B , 1998, B.

[48]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[49]  S. Mallat A wavelet tour of signal processing , 1998 .

[50]  E. Smith Methods of Multivariate Analysis , 1997 .

[51]  Alberto Leon-Garcia,et al.  Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video , 1995, IEEE Trans. Circuits Syst. Video Technol..

[52]  Gerhard Winkler,et al.  Image analysis, random fields and dynamic Monte Carlo methods: a mathematical introduction , 1995, Applications of mathematics.

[53]  Edwin D. Mares,et al.  On S , 1994, Stud Logica.

[54]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[55]  T. Stephenson Image analysis , 1992, Nature.

[56]  B. C. Brookes,et al.  Information Sciences , 2020, Cognitive Skills You Need for the 21st Century.

[57]  David G. Stork,et al.  Pattern Classification , 1973 .