Joint-channel modeling to attack QIM steganography
暂无分享,去创建一个
Rajarathnam Chandramouli | K. P. Subbalakshmi | Hafiz Malik | K.P. Subbalakshmi | R. Chandramouli | Hafiz Malik
[1] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[2] B. S. Manjunath,et al. LLRT based detection of LSB hiding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[3] Naixue Xiong,et al. Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.
[4] Bernd Girod,et al. Informed Watermarking , 2002 .
[5] K. P. Subbalakshmi,et al. Steganalysis of QIM Steganography , 2013 .
[6] Jessica J. Fridrich,et al. Quantitative steganalysis using rich models , 2013, Electronic Imaging.
[7] R. Chandramouli,et al. Secret key estimation in sequential steganography , 2005 .
[8] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[9] J. Fridrich,et al. Attacking the OutGuess , 2002 .
[10] Rajarathnam Chandramouli,et al. Nonparametric steganalysis of QIM data hiding using approximate entropy , 2008, Electronic Imaging.
[11] Tomás Pevný,et al. Detection of Double-Compression in JPEG Images for Applications in Steganography , 2008, IEEE Transactions on Information Forensics and Security.
[12] B. Widrow,et al. Statistical theory of quantization , 1996 .
[13] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[14] Yun Q. Shi,et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain , 2006, 2006 IEEE Workshop on Multimedia Signal Processing.
[15] Qingzhong Liu,et al. Neighboring joint density-based JPEG steganalysis , 2011, TIST.
[16] Jessica J. Fridrich,et al. Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.
[17] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[18] Rajarathnam Chandramouli,et al. Current trends in steganalysis: a critical survey , 2004, ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004..
[19] Andrew D. Ker. A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.
[20] Guo-Shiang Lin,et al. A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.
[21] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[22] Kyung-Ae Moon,et al. EM Estimation of Scale Factor for Quantization-Based Audio Watermarking , 2003, IWDW.
[23] Yong-feng Huang,et al. Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis , 2012, Journal of Zhejiang University SCIENCE C.
[24] Rajarathnam Chandramouli,et al. A mathematical framework for active steganalysis , 2003, Multimedia Systems.
[25] Ja-Ling Wu,et al. Digital-Invisible-Ink Data Hiding Based on Spread-Spectrum and Quantization Techniques , 2008, IEEE Transactions on Multimedia.
[26] Aiming Wang,et al. Detection of Quantization Data Hiding , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[27] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[28] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[29] Bane V. Vasic,et al. Simplification Resilient LDPC-Coded Sparse-QIM Watermarking for 3D-Meshes , 2012, IEEE Transactions on Multimedia.
[30] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[31] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[32] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[33] Lionel Fillatre. Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images , 2012, IEEE Transactions on Signal Processing.
[34] A. Murat Tekalp,et al. Universal image steganalysis using rate-distortion curves , 2004, IS&T/SPIE Electronic Imaging.
[35] B. S. Manjunath,et al. Steganalysis of quantization index modulation data hiding , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[36] William A. Pearlman,et al. Steganalysis of additive-noise modelable information hiding , 2003, IS&T/SPIE Electronic Imaging.
[37] Chengyun Yang,et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions , 2005, Information Hiding.
[38] Nasir D. Memon,et al. On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.
[39] Siho Kim,et al. Estimation of Quantization Step Size Against Amplitude Modification Attack in Scalar Quantization-Based Audio Watermarking , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[40] Tomás Pevný,et al. Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images , 2008, Electronic Imaging.
[41] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[42] C. Kelley. Solving Nonlinear Equations with Newton's Method , 1987 .
[43] Wei Su,et al. Steganalysis based on Markov Model of Thresholded Prediction-Error Image , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[44] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[45] Pierre Duhamel,et al. Applied public-key steganography , 2002, IS&T/SPIE Electronic Imaging.
[46] Ramamurti Chandramouli,et al. Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy , 2012, IEEE Transactions on Information Forensics and Security.
[47] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[48] Andrew D. Ker,et al. Going from small to large data in steganalysis , 2012, Other Conferences.
[49] Hafiz Malik,et al. Steganalysis of QIM steganography using irregularity measure , 2008, MM&Sec '08.
[50] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[51] Guo-Shiang Lin,et al. A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm , 2010, IEEE Transactions on Multimedia.
[52] Hafiz Malik. Statistical modeling of footprints of QIM steganography , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[53] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[54] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[55] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[56] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[57] Weiping Li,et al. Revisit Steganalysis on QIM-Based Data Hiding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[58] B. S. Manjunath,et al. High-volume data hiding in images: Introducing perceptual criteria into quantization based embedding , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[59] Rajarathnam Chandramouli,et al. Steganalysis of GIM-based data hiding using kernel density estimation , 2007, MM&Sec.