|
基于图像纹理的空域富模型隐写分析研究
|
Abstract:
[1] | Johnson, N.F. and Jajodia, S. (1998) Exploring Steganography: Seeingthe Unseen. IEEE Computer, 31, 26-34.
https://doi.org/10.1109/MC.1998.4655281 |
[2] | Westfeld, A. (2001) High Capacity despite Better Steganalysis. Proceedings of 4th International Workshop on Information Hiding, No. 2137, 289-302. https://doi.org/10.1007/3-540-45496-9_21 |
[3] | Fridrich, J. and Pevny, T. (2007) Statistically Undetectable JPEG Steganography: Dead Ends Challenges, and Opportunities. In: Proceedings of 9th Workshop on Multimedia & Security, 3-14. https://doi.org/10.1145/1288869.1288872 |
[4] | Fridrich, J. and Kodovsky, J. (2012) Rich Models for Ste-ganalysis of Digital Images. IEEE Transactions on Information Forensics and Security, 7, 868-882. https://doi.org/10.1109/TIFS.2012.2190402 |
[5] | Holub, V. and Fridrich, J. (2015) Low Complexity Features for JPEG Steganalysis Using Undecimated DCT. IEEE Transactions on Information Forensics and Security, 10, 219-228. https://doi.org/10.1109/TIFS.2014.2364918 |
[6] | Filler, T., Fridrich, J. and Judas, J. (2010) Minimizing Embedding Impact in Steganography Using Trellis-Coded Quantization. Proceedings of SPIE Electronic Imaging, Media Forensics and Security XII5, San Jose, CA, 18-20 January 2010, 1-14. https://doi.org/10.1117/12.838002 |
[7] | Holub, V. and Fridrich, J. (2013) Digital Image Steganography Using Universal Distortion. Proceedings of 1st ACM Workshop on In-formation Hiding and Multimedia Security, France, Montpellier, 59-68.
https://doi.org/10.1145/2482513.2482514 |
[8] | Filler, T. and Fridrich, J. (2011) Gibbs Construction Insteganogra-phy. IEEE Transactions on Information Forensics and Security, 5, 705-720. https://doi.org/10.1109/TIFS.2010.2077629 |
[9] | Holub, V. and Fridrich, J. (2012) Designing Steganographic Distortion Using Directional Filters. Fourth IEEE International Workshop on Information Forensics and Security, Tene-rife, 234-239.
https://doi.org/10.1109/WIFS.2012.6412655 |
[10] | Holub, V., Fridrich, J. and Denemark, T. (2014) Universal Dis-tortion Function for Steganography in an Arbitrary Domain. EURASIP Journal on Information Security, 2014, 1-13. https://doi.org/10.1186/1687-417X-2014-1 |
[11] | Chen, M., Sedighi, V., Boroumand, M. and Fridrich, J. (2017) JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images. Proceedings of IH & MMSec 17, Philadelphia, PA, 20-22 June 2017.
https://doi.org/10.1145/3082031.3083248 |
[12] | 高程程. 基于灰度共生矩阵的纹理特征提取[J]. 计算机系统应用, 2010, 19(6): 195-198. |
[13] | Haralick, R.M. and Shanmugam, K. (1973) Texture Features for Image Classification. IEEE Transactions on Systems, Man, and Cybernetics, SMC-3, 610-621. https://doi.org/10.1109/TSMC.1973.4309314 |
[14] | Kodovsky, J. and Fridrich, J. (2011) Steganalysis in High Di-mensions: Fusing Classifiers Built on Random Subspaces. Proceedings of SPIE, Electronic Imaging, Security and Fo-rensics of Multimedia XIII, San Francisco, CA, 23-26 January 2011, 1-13. https://doi.org/10.1117/12.872279 |
[15] | Kodovsky, J., Fridrich, J. and Holub, V. (2012) Ensemble Classifier for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security, 7, 432-444. https://doi.org/10.1109/TIFS.2011.2175919 |