Steganography algorithms recognition based on match image and deep features verification
暂无分享,去创建一个
Jiang Wu | Yi Sun | Yifeng Sun | Xiaoyu Xu
[1] Jing Dong,et al. Learning and transferring representations for image steganalysis using convolutional neural network , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[2] C. Ern. Information hiding techniques for steganography and digital watermarking , 2018 .
[3] David G. Stork,et al. Pattern Classification , 1973 .
[4] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[5] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[6] Jessica J. Fridrich,et al. Study of cover source mismatch in steganalysis and ways to mitigate its impact , 2014, Electronic Imaging.
[7] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[8] Jessica J. Fridrich,et al. Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[10] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[11] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[12] Jian Zhao,et al. Deep Learning on Spatial Rich Model for Steganalysis , 2016, IWDW.
[13] Ming Li,et al. Iterative multi-order feature alignment for JPEG mismatched steganalysis , 2016, Neurocomputing.
[14] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[15] Yun Q. Shi,et al. Ensemble of CNNs for Steganalysis: An Empirical Study , 2016, IH&MMSec.
[16] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[17] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[18] Trevor Darrell,et al. Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.
[19] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[20] Fenlin Liu,et al. Multi-class steganalysis for Jpeg stego algorithms , 2008, 2008 15th IEEE International Conference on Image Processing.
[21] Jing Dong,et al. Multi-class Blind Steganalysis Based on Image Run-Length Analysis , 2009, IWDW.
[22] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[23] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[24] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[25] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[26] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[27] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[28] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[29] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[30] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[31] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.
[32] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[33] Jessica J. Fridrich,et al. Boosting Steganalysis with Explicit Feature Maps , 2016, IH&MMSec.
[34] C.-C. Jay Kuo,et al. Block-based image steganalysis: Algorithm and performance evaluation , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.
[35] Andrew D. Ker,et al. Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.
[36] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[37] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[38] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.