MP3 steganalysis based on joint point-wise and block-wise correlations
暂无分享,去创建一个
[1] Kun Yang,et al. CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain , 2018, IH&MMSec.
[2] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator Technique for RGB Image Steganography , 2010 .
[3] Saudi Arabia,et al. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority , 2014 .
[4] Lina Wang,et al. Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors , 2019, 2019 IEEE International Conference on Multimedia and Expo (ICME).
[5] Hong Zhao,et al. Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value , 2014, IEEE Transactions on Information Forensics and Security.
[6] Adnan Abdul-Aziz Gutub,et al. Triple-A: Secure RGB image steganography based on randomization , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[7] Bolin Chen,et al. Audio Steganalysis with Convolutional Neural Network , 2017, IH&MMSec.
[8] Adnan Abdul-Aziz Gutub,et al. RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[9] Jessica J. Fridrich,et al. Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.
[10] N. Kamaraj,et al. Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics , 2010, Inf. Sci..
[11] Rangding Wang,et al. Detection of MP3Stego exploiting recompression calibration-based feature , 2013, Multimedia Tools and Applications.
[12] Farhan Khan,et al. Message Concealment Techniques using Image based Steganography , 2007 .
[13] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .
[14] Xuelong Li,et al. Robust Reversible Watermarking via Clustering and Enhanced Pixel-Wise Masking , 2012, IEEE Transactions on Image Processing.
[15] Xinbo Gao,et al. Robust lossless data hiding using clustering and statistical quantity histogram , 2012, Neurocomputing.
[16] Xiaofeng Song,et al. Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank , 2017, J. Electronic Imaging.
[17] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[18] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[19] Chao Jin,et al. Steganalysis of MP3Stego with low embedding-rate using Markov feature , 2017, Multimedia Tools and Applications.
[20] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[21] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[22] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[23] Xianfeng Zhao,et al. Segmentation Based Video Steganalysis to Detect Motion Vector Modification , 2017, Secur. Commun. Networks.
[24] Meisam Khalil Arjmandi,et al. Audio steganalysis based on reversed psychoacoustic model of human hearing , 2016, Digit. Signal Process..
[25] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[26] Sid-Ahmed Selouani,et al. Audio steganalysis using deep belief networks , 2016, Int. J. Speech Technol..
[27] Sakir Sezer,et al. Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes , 2016, IEEE Transactions on Image Processing.
[28] Adnan Abdul-Aziz Gutub,et al. Multi-Bits Stego-System For Hiding Text in Multimedia Images Based on User Security Priority , 2018 .
[29] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[30] Kun Yang,et al. Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution , 2017, International Workshop on Digital Watermarking.
[31] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[32] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[33] Hong Zhang,et al. A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality , 2017, IEEE Transactions on Information Forensics and Security.
[34] Xianfeng Zhao,et al. RHFCN:: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[35] Lina Wang,et al. A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame , 2017, IWDW.