Benchmarking steganographic and steganalysis techniques
暂无分享,去创建一个
[1] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[2] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[3] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.
[4] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[5] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[6] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[7] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[8] Husrev T. Sencar,et al. Image Steganography: Concepts and Practice , 2004 .
[9] William A. Pearlman,et al. Kernel Fisher discriminant for steganalysis of JPEG hiding methods , 2004, IS&T/SPIE Electronic Imaging.
[10] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[11] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .
[12] Siwei Lyu,et al. Steganalysis using color wavelet statistics and one-class support vector machines , 2004, IS&T/SPIE Electronic Imaging.
[13] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[14] C.-C. Jay Kuo,et al. Steganography in JPEG2000 compressed images , 2003, IEEE Trans. Consumer Electron..
[15] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[16] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.