Anti-compression JPEG steganography over repetitive compression networks
暂无分享,去创建一个
Chuan Qin | Kui Wu | Jingsheng Lei | Fengyong Li | Fengyong Li | Chuan Qin | Jingsheng Lei | Kui Wu
[1] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[2] Andrew D. Ker. Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.
[3] Xinpeng Zhang,et al. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.
[4] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[5] Sam Kwong,et al. An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix , 2014, IEEE Transactions on Information Forensics and Security.
[6] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[7] Xinpeng Zhang,et al. Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition , 2018, IEEE Access.
[8] Jiangqun Ni,et al. Uniform Embedding for Efficient Steganography of H.264 Video , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[9] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[10] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[11] Chuan Qin,et al. Dither modulation based adaptive steganography resisting jpeg compression and statistic detection , 2017, Multimedia Tools and Applications.
[12] Reza Safabakhsh,et al. High-capacity method for hiding data in the discrete cosine transform domain , 2013, J. Electronic Imaging.
[13] Ibrahim Kamel,et al. High-capacity steganography: a global-adaptive-region discrete cosine transform approach , 2017, Multimedia Tools and Applications.
[14] Chia-Chen Lin,et al. HighCapacity Data Hiding Scheme for DCT-based Images , 2010, J. Inf. Hiding Multim. Signal Process..
[15] Jiwu Huang,et al. New Channel Selection Rule for JPEG Steganography , 2012, IEEE Transactions on Information Forensics and Security.
[16] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[17] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[18] Jerry M. Mendel,et al. Blind deconvolution (equalization): Some new results , 1996, Signal Process..
[19] Jie Ding,et al. Normalized Correlation-Based Quantization Modulation for Robust Watermarking , 2014, IEEE Transactions on Multimedia.
[20] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[21] Wei Zhang,et al. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection , 2018, Signal Process..
[22] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[23] Xianfeng Zhao,et al. AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model , 2019, IEEE Transactions on Information Forensics and Security.
[24] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[25] Yau-Hwang Kuo,et al. Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions , 2012, Signal Process..
[26] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[27] Xinpeng Zhang,et al. Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[28] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .