A framework of adaptive steganography resisting JPEG compression and detection
暂无分享,去创建一个
Fenlin Liu | Xiangyang Luo | Chunfang Yang | Yi Zhang | Dengpan Ye | Xiangyang Luo | Fenlin Liu | Chunfang Yang | Dengpan Ye | Yi Zhang
[1] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[2] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[3] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.
[4] Hefei Ling,et al. Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions , 2012, IEEE MultiMedia.
[5] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[7] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[8] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[9] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[10] Gregory L. Heileman,et al. Fast and robust watermarking of JPEG files , 2002, Proceedings Fifth IEEE Southwest Symposium on Image Analysis and Interpretation.
[11] Yau-Hwang Kuo,et al. Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions , 2012, Signal Process..
[12] Jessica J. Fridrich,et al. Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.
[13] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[14] Ja-Ling Wu,et al. Gradient Original Image After JPEG compression or image processing Gradient magnitude Mean of gradient magnitude Determine amount of hidden watermark bits Intensity image Mean of gradient magnitude , 2002 .
[15] Dimitris E. Koulouriotis,et al. Performance evaluation of moment-based watermarking methods: A review , 2012, J. Syst. Softw..
[16] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[17] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[18] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[19] Jaya Sil,et al. Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization , 2013, J. Syst. Softw..
[20] Gang Chen,et al. Color Image Analysis by Quaternion-Type Moments , 2014, Journal of Mathematical Imaging and Vision.
[21] Xiangyang Wang,et al. A new robust color image watermarking using local quaternion exponent moments , 2014, Inf. Sci..
[22] Gaurav Tiwari. A Review on Robust Watermarking with its Applications and Comparative Analysis , 2015 .