|
[1]
|
Johnson, N.F. and Jajodia, S. (1998) Exploring Steganography: Seeingthe Unseen. IEEE Computer, 31, 26-34. [Google Scholar] [CrossRef]
|
|
[2]
|
Westfeld, A. (2001) High Capacity despite Better Steganalysis. Proceedings of 4th International Workshop on Information Hiding, No. 2137, 289-302. [Google Scholar] [CrossRef]
|
|
[3]
|
Fridrich, J. and Pevny, T. (2007) Statistically Undetectable JPEG Steganography: Dead Ends Challenges, and Opportunities. In: Proceedings of 9th Workshop on Multimedia & Security, 3-14. [Google Scholar] [CrossRef]
|
|
[4]
|
Fridrich, J. and Kodovsky, J. (2012) Rich Models for Ste-ganalysis of Digital Images. IEEE Transactions on Information Forensics and Security, 7, 868-882. [Google Scholar] [CrossRef]
|
|
[5]
|
Holub, V. and Fridrich, J. (2015) Low Complexity Features for JPEG Steganalysis Using Undecimated DCT. IEEE Transactions on Information Forensics and Security, 10, 219-228. [Google Scholar] [CrossRef]
|
|
[6]
|
Filler, T., Fridrich, J. and Judas, J. (2010) Minimizing Embedding Impact in Steganography Using Trellis-Coded Quantization. Proceedings of SPIE Electronic Imaging, Media Forensics and Security XII5, San Jose, CA, 18-20 January 2010, 1-14. [Google Scholar] [CrossRef]
|
|
[7]
|
Holub, V. and Fridrich, J. (2013) Digital Image Steganography Using Universal Distortion. Proceedings of 1st ACM Workshop on In-formation Hiding and Multimedia Security, France, Montpellier, 59-68. [Google Scholar] [CrossRef]
|
|
[8]
|
Filler, T. and Fridrich, J. (2011) Gibbs Construction Insteganogra-phy. IEEE Transactions on Information Forensics and Security, 5, 705-720. [Google Scholar] [CrossRef]
|
|
[9]
|
Holub, V. and Fridrich, J. (2012) Designing Steganographic Distortion Using Directional Filters. Fourth IEEE International Workshop on Information Forensics and Security, Tene-rife, 234-239. [Google Scholar] [CrossRef]
|
|
[10]
|
Holub, V., Fridrich, J. and Denemark, T. (2014) Universal Dis-tortion Function for Steganography in an Arbitrary Domain. EURASIP Journal on Information Security, 2014, 1-13. [Google Scholar] [CrossRef]
|
|
[11]
|
Chen, M., Sedighi, V., Boroumand, M. and Fridrich, J. (2017) JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images. Proceedings of IH & MMSec 17, Philadelphia, PA, 20-22 June 2017. [Google Scholar] [CrossRef]
|
|
[12]
|
高程程. 基于灰度共生矩阵的纹理特征提取[J]. 计算机系统应用, 2010, 19(6): 195-198.
|
|
[13]
|
Haralick, R.M. and Shanmugam, K. (1973) Texture Features for Image Classification. IEEE Transactions on Systems, Man, and Cybernetics, SMC-3, 610-621. [Google Scholar] [CrossRef]
|
|
[14]
|
Kodovsky, J. and Fridrich, J. (2011) Steganalysis in High Di-mensions: Fusing Classifiers Built on Random Subspaces. Proceedings of SPIE, Electronic Imaging, Security and Fo-rensics of Multimedia XIII, San Francisco, CA, 23-26 January 2011, 1-13. [Google Scholar] [CrossRef]
|
|
[15]
|
Kodovsky, J., Fridrich, J. and Holub, V. (2012) Ensemble Classifier for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security, 7, 432-444. [Google Scholar] [CrossRef]
|