New methodology for breaking steganographic techniques for JPEGs
暂无分享,去创建一个
[1] Ralph B. D'Agostino,et al. Goodness-of-Fit-Techniques , 2020 .
[2] Nasir D. Memon,et al. A distributed detection framework for Steganalysis , 2000, MULTIMEDIA '00.
[3] Andreas Westfeld. Detecting Low Embedding Rates , 2002, Information Hiding.
[4] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[5] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[6] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[7] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[8] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[9] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[10] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[11] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[12] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[13] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[14] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.