Perturbed quantization steganography
暂无分享,去创建一个
[1] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[2] Gérard D. Cohen,et al. Applications of coding theory to communication combinatorial problems , 1990, Discret. Math..
[3] Nasir D. Memon,et al. Steganalysis of watermarking techniques using image quality metrics , 2001, IS&T/SPIE Electronic Imaging.
[4] Oystein Ore,et al. Number Theory and Its History , 1949 .
[5] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[6] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[7] Elke Franz. Steganography Preserving Statistical Properties , 2002, Information Hiding.
[8] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[9] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[10] Mikhail J. Atallah,et al. A hierarchical protocol for increasing the stealthiness of steganographic methods , 2004, MM&Sec '04.
[11] Abbas El Gamal,et al. On the capacity of computer memory with defects , 1983, IEEE Trans. Inf. Theory.
[12] Shlomo Shamai,et al. Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.
[13] Rainer Böhme,et al. Exploiting Preserved Statistics for Steganalysis , 2004, Information Hiding.
[14] Jan Lukás,et al. Estimation of Primary Quantization Matrix in Double Compressed JPEG Images , 2003 .
[15] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[16] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[17] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[18] Jessica J. Fridrich,et al. Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.
[19] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[20] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[21] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[22] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[23] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[24] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[25] ContentChing-Yung Lin. Semi-Fragile Watermarking for Authenti ating JPEG Visual , 2000 .
[26] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[27] Nasir D. Memon,et al. Benchmarking steganographic and steganalysis techniques , 2005, IS&T/SPIE Electronic Imaging.
[28] Edward R. Dougherty,et al. Random processes for image and signal processing , 1998, SPIE / IEEE series on imaging science and engineering.
[29] Jiri Fridrich,et al. Secure Steganographic Methods for Palette Images , 1999, Information Hiding.
[30] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[31] Shuhong Gao,et al. Random Krylov Spaces over Finite Fields , 2003, SIAM J. Discret. Math..
[32] Hannes Federrath,et al. Modeling the Security of Steganographic Systems , 1998, Information Hiding.