Stego anomaly detection in images exploiting the curvelet higher order statistics using evolutionary support vector machine
暂无分享,去创建一个
[1] Guo-Shiang Lin,et al. Robust image watermarking on the DCT domain , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[2] David J. Field,et al. Emergence of simple-cell receptive field properties by learning a sparse code for natural images , 1996, Nature.
[3] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[4] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[5] Hedieh Sajedi,et al. CBS: Contourlet-Based Steganalysis Method , 2010, J. Signal Process. Syst..
[6] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[7] C.-C. Jay Kuo,et al. Block-based image steganalysis: Algorithm and performance evaluation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[8] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[9] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.
[10] Thomas S. Huang,et al. An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..
[11] David G. Stork,et al. Pattern Classification , 1973 .
[12] Bin Gu,et al. Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[13] Jessica J. Fridrich,et al. CFA-aware features for steganalysis of color images , 2015, Electronic Imaging.
[14] Xiaoming Huo,et al. Sparse image representation via combined transforms , 1999 .
[15] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[16] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[17] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[18] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[19] Jessica J. Fridrich,et al. New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.
[20] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[21] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[22] Fang Min. A Novel Intrusion Detection Method Based on Combining Ensemble Learning With Induction-Enhanced Particle Swarm Algorithm , 2007, Third International Conference on Natural Computation (ICNC 2007).
[23] Jia-jun Lin,et al. Steganalysis based on feature reducts of rough set by using genetic algorithm , 2008, 2008 7th World Congress on Intelligent Control and Automation.
[24] Emmanuel J. Candès,et al. The curvelet transform for image denoising , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[25] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[26] Xinpeng Zhang,et al. JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier , 2013, IEEE Signal Processing Letters.
[27] Naokazu Yokoya,et al. Data embedding into pictorial images with less distortion using discrete cosine transform , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[28] Hong-Juan Zhang,et al. Steganalysis of audio: attacking the Steghide , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[29] Paolo Gubian,et al. Blind Multi-Class Steganalysis System Using Wavelet Statistics , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[30] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[31] Fernando Pérez-González,et al. Performance analysis of existing and new methods for data hiding with known-host information in additive channels , 2003, IEEE Trans. Signal Process..
[32] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[33] O-Hyung Kwon,et al. Wavelet based watermarking method for digital images using the human visual system , 1999 .
[34] Wen Gao,et al. Neural network based steganalysis in still images , 2003, ICME.
[35] Bo Xu,et al. Improved BSS Based Schemes for Active Steganalysis , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[36] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[37] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[38] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[39] N. Kamaraj,et al. StegoHunter: Steganalysis of LSB Embedded Images Based on Stego-Sensitive Threshold Close Color Pair Signature , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[40] Yin-Cheng Qi,et al. Wavelet domain audio steganalysis based on statistical moments and PCA , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.
[41] Wen-Nung Lie,et al. Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[42] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[43] Peng Liu,et al. Research on RTOS-Integrated TMR for Fault Tolerant Systems , 2007 .
[44] Chengyun Yang,et al. Effective steganalysis based on statistical moments of wavelet characteristic function , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[45] E. Candès,et al. Curvelets: A Surprisingly Effective Nonadaptive Representation for Objects with Edges , 2000 .
[46] Gabriel Bugar,et al. Universal Image Steganalytic Method , 2014 .
[47] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[48] James E. Baker,et al. Adaptive Selection Methods for Genetic Algorithms , 1985, International Conference on Genetic Algorithms.
[49] Zheng Zhang,et al. Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[50] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[51] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[52] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[53] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[54] Jiwu Huang,et al. Adaptive image watermarking scheme based on visual masking , 1998 .
[55] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[56] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.