One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme
暂无分享,去创建一个
[1] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[2] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[3] Cheng-Hsing Yang,et al. Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..
[4] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[5] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[6] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[7] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[8] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[9] Huan Xu,et al. An improved section-wise exploiting modification direction method , 2010, Signal Process..
[10] Bin Li,et al. Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels , 2007, 2007 IEEE International Conference on Image Processing.
[11] Tung-Shou Chen,et al. A Minimal Euclidean Distance Searching Technique for Sudoku Steganography , 2008, 2008 International Symposium on Information Science and Engineering.
[12] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[13] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[14] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[15] Bin Li,et al. Textural features based universal steganalysis , 2008, Electronic Imaging.
[16] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[17] Yen-Ping Chu,et al. A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..
[18] Cheng-Hsing Yang,et al. Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.
[19] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[20] Hung-Min Sun,et al. A LSB substitution compatible steganography , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[21] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[22] Shahrokh Ghaemmaghami,et al. One-third probability embedding: Less detectable LSB steganography , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[23] Chin-Chen Chang,et al. An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..
[24] Bo Li,et al. Preestimation-Based Array Interpolation Approach to Coherent Source Localization Using Multiple Sparse Subarrays , 2009, IEEE Signal Processing Letters.
[25] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[26] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[27] Tieyong Zeng,et al. Detecting LSB matching by applying calibration technique for difference image , 2008, MM&Sec '08.
[28] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[29] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[30] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[31] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[32] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[33] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[34] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.