Resisting Blind Steganalysis in Real Time Covert Communication
暂无分享,去创建一个
[1] Miad Faezipour,et al. Fast real-time hardware engine for Multipoint Text Steganography , 2014, IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014.
[2] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[3] M. Saeb,et al. DESIGN AND IMPLEMENTATION OF A SECRET KEY STEGANOGRAPHIC MICROARCHITECTURE EMPLOYING FPGA , 2003 .
[4] B. J. Mohd,et al. FPGA hardware of the LSB steganography method , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[5] Jing Tian,et al. An Improved YASS Approach Using Irregular Host-Blocks and Modified Quantization Index Modulation , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[6] Lee-Ming Cheng,et al. Hardware Realization of Steganographic Techniques , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[7] Jing Tian,et al. Modified YASS algorithm with virtual host block selection and model based embedding , 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).
[9] Claudia Feregrino Uribe,et al. FPGA Hardware Architecture of the Steganographic ConText Technique , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).
[10] C VivekAmruth,et al. Multi-Level Steganography for Smart phones , 2014, SOCO 2014.
[11] Data Hiding in Digital Images : A Steganographic Paradigm , 2008 .
[12] B. S. Manjunath,et al. Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration , 2006, 2006 International Conference on Image Processing.
[13] B. S. Manjunath,et al. Robust image-adaptive data hiding using erasure and error correction , 2004, IEEE Transactions on Image Processing.
[14] Anindya Sarkar,et al. Further study on YASS: steganography based on randomized embedding to resist blind steganalysis , 2008, Electronic Imaging.
[15] Xiang Yang,et al. Effective Steganalysis of YASS Based on Statistical Moments of Wavelet Characteristic Function and Markov Process , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[16] B. S. Manjunath,et al. Statistical restoration for robust and secure steganography , 2005, IEEE International Conference on Image Processing 2005.
[17] Anindya Sarkar,et al. Matrix Embedding With Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[18] Wen-hua Zhang,et al. Effective Steganalysis of YASS Based on Statistical Moments of Wavelet Characteristic Function and Markov Process , 2012 .
[19] Anindya Sarkar. Novel image data-hiding methodologies for robust and secure steganography with extensions to image forensics , 2010 .