Benchmarking for Steganography
暂无分享,去创建一个
[1] Amaury Lendasse,et al. A Feature Selection Methodology for Steganalysis , 2006, MRCS.
[2] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[3] L. Györfi,et al. Nonparametric entropy estimation. An overview , 1997 .
[4] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[5] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[6] A. Murat Tekalp,et al. Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings , 2006, MRCS.
[7] Nasir D. Memon,et al. PSTEG: steganographic embedding through patching [image steganography] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[8] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[9] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[10] Ingo Steinwart,et al. On the Influence of the Kernel on the Consistency of Support Vector Machines , 2002, J. Mach. Learn. Res..
[11] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[12] Don R. Hush,et al. An Explicit Description of the Reproducing Kernel Hilbert Spaces of Gaussian RBF Kernels , 2006, IEEE Transactions on Information Theory.
[13] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[14] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[15] Pierre Moulin,et al. An information-theoretic model for image watermarking and data hiding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[16] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[17] Andrew D. Ker. A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.
[18] Andrew D. Ker. The ultimate steganalysis benchmark? , 2007, MM&Sec.
[19] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[20] A. Atiya,et al. Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.
[21] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[22] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[23] B. S. Manjunath,et al. Steganalysis for Markov cover data with applications to images , 2006, IEEE Transactions on Information Forensics and Security.
[24] Hideki Noda,et al. Application of QIM with dead zone for histogram preserving JPEG steganography , 2005, IEEE International Conference on Image Processing 2005.
[25] Nasir D. Memon,et al. Benchmarking steganographic and steganalysis techniques , 2005, IS&T/SPIE Electronic Imaging.
[26] Alexander J. Smola,et al. Learning with Kernels: support vector machines, regularization, optimization, and beyond , 2001, Adaptive computation and machine learning series.
[27] Bernd Girod,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[28] Rainer Böhme,et al. A two-factor error model for quantitative steganalysis , 2006, Electronic Imaging.
[29] B. S. Manjunath,et al. Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.
[30] Tomás Pevný,et al. Towards Multi-class Blind Steganalyzer for JPEG Images , 2005, IWDW.
[31] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[32] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[33] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[34] Elke Franz,et al. Pre-processing for Adding Noise Steganography , 2005, Information Hiding.
[35] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[36] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[37] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[38] Harshinder Singh,et al. Nearest Neighbor Estimates of Entropy , 2003 .
[39] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.
[40] Bernhard Schölkopf,et al. A Kernel Method for the Two-Sample-Problem , 2006, NIPS.
[41] Jessica J. Fridrich,et al. On Steganographic Embedding Efficiency , 2006, Information Hiding.
[42] Petra Mutzel,et al. A Graph-Theoretic Approach to Steganography , 2005, Communications and Multimedia Security.
[43] Dudley,et al. Real Analysis and Probability: Measurability: Borel Isomorphism and Analytic Sets , 2002 .
[44] Pedro Comesaña Alfaro,et al. On the capacity of stegosystems , 2007, MM&Sec.
[45] Michel Barlaud,et al. High-dimensional statistical distance for region-of-interest tracking: Application to combining a soft geometric constraint with radiometry , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[46] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[47] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[48] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.