A Novel Technique of Steganalysis in Uncompressed Image through Zipf's Law
暂无分享,去创建一个
[1] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[2] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[3] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[4] George Kingsley Zipf,et al. Human behavior and the principle of least effort , 1949 .
[5] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[6] N. Vincent,et al. Compressed image quality and Zipf law , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.
[7] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[8] J. Fridrich,et al. Attacking the OutGuess , 2002 .
[9] Kian-Lee Tan,et al. Hiding data accesses in steganographic file system , 2004, Proceedings. 20th International Conference on Data Engineering.
[10] Nicole Vincent,et al. A method for detecting artificial objects in natural environments , 2002, Object recognition supported by user interaction for service robots.
[11] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[12] Jessica J. Fridrich,et al. Higher-order statistical steganalysis of palette images , 2003, IS&T/SPIE Electronic Imaging.
[13] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[14] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[15] Nasir D. Memon,et al. On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.
[16] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.