References
- J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press, Cambridge, 2010.
- H. Q. Wang, S. Z. Wang, "Cyber warfare: steganography vs. steganalysis," Communications of the ACM, vol. 47, no. 10, pp. 76-82, October, 2004. https://doi.org/10.1145/1022594.1022597
- T. Pevny, T. Filler, P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc of the 12th International Workshop on Information Hiding, pp. 161-177, June 28-30, 2010.
- B. Li, M. Wang, X. L. Li, S. Q. Tan, J. W. Huang, "A strategy of clustering modification directions in spatial image steganography," IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1905-1917, September, 2015. https://doi.org/10.1109/TIFS.2015.2434600
- W. M. Zhang, Z. Zhang, L. L. Zhang, H. Y. Li N. H. Yu, "Decomposing Joint Distortion for Adaptive Steganography," IEEE Transactions on Circuits and Systems for Video Technology, vol.PP, no.99, pp.1-1, July, 2016.
- F. J. Huang, J. W. Huang, Y. Q. Shi, "New Channel Selection Rule for JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1181-1191, August, 2012. https://doi.org/10.1109/TIFS.2012.2198213
- V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. of 1st ACM IH&MMSec. Workshop, pp.59-68, June 20-22, 2013.
- L. J. Guo, J. Q. Ni, Y. Q. Shi, "Uniform embedding for efficient JPEG steganography," IEEE Transactions on Information Forensics and Security, vol.9, no.5, pp. 814-825, May, 2014. https://doi.org/10.1109/TIFS.2014.2312817
- F. Y. Li, X. P. Zhang, J. Yu, W. F, Shen, "Adaptive JPEG steganography with new distortion function," Annals of Telecommunications, vol. 69, no. 7, pp. 431-440, August, 2014. https://doi.org/10.1007/s12243-013-0415-2
- Z. C. Wang, X. P. Zhang, Z. X. Yin, "Hybrid distortion function for JPEG steganography," Journal of Electronic Imaging, vol. 25, no. 5, pp. 050501, September, 2016. https://doi.org/10.1117/1.JEI.25.5.050501
- T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, September, 2011. https://doi.org/10.1109/TIFS.2011.2134094
- J. Kodovsky and J. Fridrich, "Steganalysis of JPEG images using rich models," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 0A 1-13, January 22-26, 2012.
- V. Holub and J. Fridrich, "Low Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219-228, February, 2015. https://doi.org/10.1109/TIFS.2014.2364918
- V. Holub, J. Fridrich, "Phase-Aware Projection Model for Steganalysis of JPEG Images," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 94090T-94090T-11, February 8-12, 2015..
- X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo and Y. Zhang, "Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters," in Proc. of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 15-23, June 17-19, 2015..
- X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo, "2D Gabor Filters based steganalysis of content-adaptive JPEG Steganography," Multimedia Tools and Application, December, 2016.
- Y. Zhang, F. L. Liu, C. F. Yang, et al, "Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank," Journal of Electronic Imaging, vol. 26, no. 1, pp. 013011-013011, February, 2017. https://doi.org/10.1117/1.JEI.26.1.013011
- X. F. Song, F. L. Liu, C. F. Yang, et al, "Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion," KSII Transactions on Internet and Information Systems, vol. 9, no. 12, pp. 5209-5228, December, 2015. https://doi.org/10.3837/tiis.2015.12.026
- T. Denemark, M. Boroumand, J. Fridrich, "Steganalysis Features for Content-Adaptive JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 11, no. 8, pp. 1736-1746, August, 2016. https://doi.org/10.1109/TIFS.2016.2555281
- J. Kodovsky, J. Fridrich and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, vol.7, no. 2, pp. 432-444, April, 2012. https://doi.org/10.1109/TIFS.2011.2175919
- V. Sachnev, H. J. Kim, "Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis," in Proc of the 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp.1-6, April 21-24, 2014.
- B. Cao, G. R. Feng, Z. X. Yin, "Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matricesm," in Proc of the International Conference on Cloud Computing and Security, pp.84-93, July 29-31, 2016.
- F. Y. Li, X. P. Zhang, B. Chen, et al, "JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier," IEEE Signal Processing Letters, vol.20, no. 3, pp.233-236, March, 2013. https://doi.org/10.1109/LSP.2013.2240385
- R. Cogranne, V. Sedighi, J. Fridrich, et al, "Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?," in Proc of the IEEE International Workshop on Information Forensics and Security, pp.1-6, November, 2015.
- R. T. Marler, J. S. Arora, "Survey of multi-objective optimization methods for engineering," Structural and multidisciplinary optimization, vol. 26, no. 6, pp. 369-395, April, 2004. https://doi.org/10.1007/s00158-003-0368-6
- C. L. Qian, Y. Yu, Z. H, Zhou. "Pareto Ensemble Pruning," in Proc of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pp. 2935-2941, January, 2015.
- L. F. Yu, Y. Zhao, R. R. Ni, Z. F. Zhu. "PM1 steganography in JPEG images using genetic algorithm," Soft Computing, vol. 13, no. 4, pp. 393-400, February, 2009. https://doi.org/10.1007/s00500-008-0327-7
- D. Whitley, "A genetic algorithm tutorial," Statistics and computing, vol. 4, no. 2, pp. 65-85, June, 1994. https://doi.org/10.1007/BF00175354
- S. Lin, B. W. Kernighan, "An effective heuristic algorithm for the traveling-salesman problem," Operations research, vol.21, no.2, pp. 498-516, April, 1973. https://doi.org/10.1287/opre.21.2.498
- T. Denemark, J. Fridrich, "Steganography with Multiple JPEG Images of the Same Scene," IEEE Transactions on Information Forensics and Security," vol.12, no.10, pp. 2308-2319, October, 2017. https://doi.org/10.1109/TIFS.2017.2705625
- S. Q. Tan, B. Li, "Stacked convolutional auto-encoders for steganalysis of digital images," in Proc of Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, pp.1-4, December 9-12, 2015.
- Y. L. Qian, J. Dong, W. Wang, et al, "Deep learning for steganalysis via convolutional neural networks," in Proc of SPIE Media Watermarking, Security, and Forensics 2015, Part of IS&T International Symposium on Electronic Imaging," pp. 94090J-94090J-10, 2015.
- G. S. Xu, H. Z. Wu, Y. Q. Shi, "Structural Design of Convolutional Neural Networks for Steganalysis," IEEE Signal Processing Letters, vol.23, no.5, pp.708-712, May, 2016. https://doi.org/10.1109/LSP.2016.2548421
- J. S. Zeng, S. Q. Tan, B. Li, et al, "Large-scale JPEG steganalysis using hybrid deep-learning framework," arXiv preprint arXiv:1611.03233v2, 2017.
- M. Chen, V. Sedighi, M. Boroumand, J. Fridrich, "JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images," in Proc. of the 5rd ACM Workshop on Information Hiding and Multimedia Security, pp. 75-84, June 20-22, 2017.