Image complexity and feature mining for steganalysis of least significant bit matching steganography
暂无分享,去创建一个
Qingzhong Liu | Andrew H. Sung | Bernardete Ribeiro | Mingzhen Wei | Zhongxue Chen | Jianyun Xu | B. Ribeiro | A. Sung | Jianyun Xu | Qingzhong Liu | Mingzhen Wei | Zhongxue Chen
[1] Jan Wessnitzer,et al. A Model of Non-elemental Associative Learning in the Mushroom Body Neuropil of the Insect Brain , 2007, ICANNGA.
[2] Sushil Jajodia,et al. Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..
[3] Qingzhong Liu,et al. Recursive Feature Addition for Gene Selection , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.
[4] Qingzhong Liu,et al. Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[5] Sushil Jajodia,et al. A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..
[6] Tomás Pevný,et al. Multi-class blind steganalysis for JPEG images , 2006, Electronic Imaging.
[7] Qingzhong Liu,et al. Detect JPEG Steganography Using Polynomial Fitting , 2006 .
[8] Xin Yao,et al. Gene selection algorithms for microarray data based on least squares support vector machine , 2006, BMC Bioinformatics.
[9] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[10] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[11] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[12] Pierre Moulin,et al. New sensitivity analysis attack , 2005, IS&T/SPIE Electronic Imaging.
[13] Qingzhong Liu,et al. Statistical Correlations and Machine Learning for Steganalysis , 2005 .
[14] Siwei Lyu,et al. How realistic is photorealistic? , 2005, IEEE Transactions on Signal Processing.
[15] Pierre Moulin,et al. A stochastic QIM algorithm for robust, undetectable image watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[16] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[17] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[18] Qingzhong Liu,et al. JPEG compression immune steganography using wavelet transform , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[19] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[20] Eero P. Simoncelli,et al. On Advances in Statistical Modeling of Natural Images , 2004, Journal of Mathematical Imaging and Vision.
[21] J. Wade Davis,et al. Statistical Pattern Recognition , 2003, Technometrics.
[22] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[23] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[24] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[25] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[26] Tao Zhang,et al. A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.
[27] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[28] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[29] Nello Cristianini,et al. Kernel Methods for Pattern Analysis , 2004 .
[30] Gerhard Winkler,et al. Image Analysis, Random Fields and Markov Chain Monte Carlo Methods: A Mathematical Introduction , 2002 .
[31] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[32] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[33] Václav Hlavác,et al. Ten Lectures on Statistical and Structural Pattern Recognition , 2002, Computational Imaging and Vision.
[34] L. Sullivan,et al. Introductory Applied Biostatistics , 2001 .
[35] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[36] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[37] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[38] J. Friedman. Special Invited Paper-Additive logistic regression: A statistical view of boosting , 2000 .
[39] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[40] Martin J. Wainwright,et al. Scale Mixtures of Gaussians and the Statistics of Natural Images , 1999, NIPS.
[41] Ali N. Akansu,et al. A robust data hiding scheme for images using DFT , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[42] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[43] David Mumford,et al. Statistics of natural images and models , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).
[44] Pierre Moulin,et al. Analysis of Multiresolution Image Denoising Schemes Using Generalized Gaussian and Complexity Priors , 1999, IEEE Trans. Inf. Theory.
[45] Paul Scheunders,et al. Statistical texture characterization from discrete wavelet representations , 1999, IEEE Trans. Image Process..
[46] Yoram Singer,et al. Improved Boosting Algorithms Using Confidence-rated Predictions , 1998, COLT' 98.
[47] Jean-Raymond Abrial,et al. On B , 1998, B.
[48] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[49] S. Mallat. A wavelet tour of signal processing , 1998 .
[50] E. Smith. Methods of Multivariate Analysis , 1997 .
[51] Alberto Leon-Garcia,et al. Estimation of shape parameter for generalized Gaussian distributions in subband decompositions of video , 1995, IEEE Trans. Circuits Syst. Video Technol..
[52] Gerhard Winkler,et al. Image analysis, random fields and dynamic Monte Carlo methods: a mathematical introduction , 1995, Applications of mathematics.
[53] Edwin D. Mares,et al. On S , 1994, Stud Logica.
[54] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[55] T. Stephenson. Image analysis , 1992, Nature.
[56] B. C. Brookes,et al. Information Sciences , 2020, Cognitive Skills You Need for the 21st Century.
[57] David G. Stork,et al. Pattern Classification , 1973 .