Steganography using Gabor filter and anisotropic diffusion
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[2] Carol Livermore,et al. Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays , 2014 .
[3] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[4] Xiaofeng Song,et al. 2D Gabor filters-based steganalysis of content-adaptive JPEG steganography , 2016, Multimedia Tools and Applications.
[5] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[6] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[7] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[8] Jessica J. Fridrich,et al. Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.
[9] Saudi Arabia,et al. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority , 2014 .
[10] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[11] Jessica J. Fridrich,et al. Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.
[12] Jessica J. Fridrich,et al. Effect of saturated pixels on security of steganographic schemes for digital images , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[13] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[14] Carol Livermore,et al. COMPACT, SCALABLE, HIGH-RESOLUTION, MEMS-ENABLED TACTILE DISPLAYS , 2014 .
[15] Fatih Kurugollu,et al. A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO) , 2011, Information Hiding.
[16] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[17] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[18] Carol Livermore,et al. A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach , 2016, 2016 IEEE 29th International Conference on Micro Electro Mechanical Systems (MEMS).
[19] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[20] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[21] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[22] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[23] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[24] Jessica J. Fridrich,et al. Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[25] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[26] Nouf A. Al-Otaibi,et al. 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .
[27] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.