Uniform Embedding for Efficient JPEG Steganography
release_uuj2gcycdnfehcmqtylazbnmca
by
Linjie Guo,
Jiangqun Ni,
Yun Qing Shi
References
NOTE: currently batch computed and may include additional references sources, or be missing recent changes, compared to entity reference list.Showing 1 - 18 of 18 references (in 113ms) | ||
---|---|---|
[b0] via fuzzy |
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
T. Filler, J. Judas, J. Fridrich 2011 IEEE Transactions on Information Forensics and Security doi:10.1109/tifs.2011.2134094 |
web.archive.org
[PDF]
|
[b1] via grobid |
A. Westfeld, "F5-A steganographic algorithm," in Proc. 4th Inf. Hiding Conf., vol. 2137. 2001, pp. 289-302.
| |
[b2] via grobid |
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities," in Proc. 9th ACM Workshop Multimedia Security, Dallas, TX, USA, Sep. 2007, pp. 3-14.
| |
[b3] via grobid |
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. 8th Inf. Hiding Conf., vol. 4437. Jul. 2006, pp. 314-327.
| |
[b4] via grobid |
V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganog- raphy method based on heuristic optimization and BCH syndrome coding," in Proc. 11th ACM Workshop Multimedia Security, Sep. 2009, pp. 131-140.
| |
[b5] via grobid |
T. Filler and J. Fridrich, "Design of adaptive steganographic schemes for digital images," Proc. SPIE, vol. 7880, p. 78800F, Jan. 2011.
| |
[b6] via grobid |
C. Wang and J. Ni, "An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients," in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 2012, pp. 1785-1788.
| |
[b7] via grobid |
J. Kodovský and J. Fridrich, "Calibration revisited," in Proc. 11th ACM Workshop Multimedia Security, New York, NY, USA, Sep. 2009, pp. 63-74.
| |
[b8] via grobid |
J. Kodovský, J. Fridrich, and V. Holub, "On dangers of overtrain- ing steganography to incomplete cover model," in Proc. 13th ACM Workshop Multimedia Security, New York, NY, USA, Sep. 2011, pp. 69-76.
| |
[b9] via fuzzy |
Digital image steganography using universal distortion
Vojtěch Holub, Jessica Fridrich 2013 Information Hiding and Multimedia Security Workshop doi:10.1145/2482513.2482514 dblp:conf/ih/HolubF13 |
web.archive.org
[PDF]
|
[b10] via grobid |
J. Kodovský and J. Fridrich, "Steganalysis of JPEG images using rich models," Proc. SPIE, vol. 8303, p. 83030A, Jan. 2012.
| |
[b11] via grobid |
J. Kodovský, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
| |
[b12] via grobid |
C. Chen and Y. Q. Shi, "JPEG image steganalysis utilizing both intrablock and interblock correlations," in Proc. IEEE Int. Symp. Circuits Syst., Mar. 2008, pp. 3029-3032.
| |
[b13] via grobid |
L. Guo, J. Ni, and Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in Proc. 4th IEEE Int. Workshop Inf. Forensics Security, Tenerife, Spain, Dec. 2012, pp. 169-174.
| |
[b14] via grobid |
P. Bas, T. Filler, and T. Pevný, "Break our steganographic system-The ins and outs of organizing boss," in Proc. 13th Inf. Hiding Conf., 2011, pp. 59-70.
| |
[b15] via fuzzy |
Defending Against Statistical Steganalysis
Niels Provos 2001 USENIX Security Symposium dblp:conf/uss/Provos01 | |
[b16] via grobid |
D. Freedman, Statistical Models: Theory and Practice. Cambridge, U.K.: Cambridge Univ. Press, 2009.
| |
[b17] via fuzzy |
LIBSVM : A Library for Support Vector Machines
C Chang, C Lin 2011 ACM Transactions on Intelligent Systems and Technology unpublished |
web.archive.org
[PDF]
|