References
- D. Upham. Steganographic algorithm JSteg. Software available at http://zooid.org/paul/crypto/jsteg/.
- P. Sallee, "Model-based methods for steganography and steganalysis," International Journal of Image Graphics, vol. 5, no. 1, pp. 167-190, January, 2005. https://doi.org/10.1142/S0219467805001719
- N. Provos, "Defending against statistical steganalysis," in Proc. of 10th Usenix Security Symposium, pp. 323-335, August 13-17, 2001.
- A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)," in Proc. of 4th International. Workshop on Information Hiding, pp. 289-302, April 25-27, 2001.
- J. Fridrich, T. Pevny, J. Kodovsky, "Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities," in Proc. of 9th ACM Multimedia and Security Workshop, pp. 3-14, September 20-21, 2007.
- J. Fridrich, M. Goljan, and D. Soukal, "Perturbed Quantization Steganography," ACM Multimedia System Journal, vol.11, no.2, pp.98-107, February, 2005. https://doi.org/10.1007/s00530-005-0194-3
- Y. Kim, Z. Duric, D. Richards, "Modified matrix encoding technique for minimal distortion steganography," in Proc. of 8th International Workshop Information Hiding, pp. 314-327, July 10-12, 2006.
- J. Fridrich, T. Filler, "Design of adaptive steganographic schemes for digital images," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security and Forensics of Multimedia XIII," pp. OF 1-14, January 23-26, 2011.
- F. J. Huang, J. W. Huang, Y. Q. Shi, "New Channel Selection Rule for JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1181-1191, August, 2012. https://doi.org/10.1109/TIFS.2012.2198213
- C. Wang, J. Q. Ni, "An efficient JPEG steganographic scheme based on the block-entropy of DCT coefficients," in Proc. of IEEE ICASSP, pp.1785-1788, March 25-30, 2012.
- L. J. Guo, J. Q. Ni, Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," in Proc. of Fourth IEEE International Workshop on Information Forensics and Security, pp.169-174, December 2-5, 2012.
- V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. of 1st ACM IH&MMSec. Workshop, pp.59-68, June 20-22, 2013.
- T. Filler, J. Judas, and J. Fridrich, "Minimizing additive distortion in steganography using syndrome-trellis codes," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920-935, September, 2011. https://doi.org/10.1109/TIFS.2011.2134094
- S. Lyu, H. Farid, "Steganalysis using higher-order image statistics," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111-119, March, 2006. https://doi.org/10.1109/TIFS.2005.863485
- X.Y. Luo, D.S. Wang, P. Wang and F.L. Liu, "A review on blind detection for image steganography," Signal Processing, vol. 6, no. 3, pp. 2138-2157, September, 2008.
- H. Zong, F. L. Liu and X. Y. Luo, "Blind Image Steganalysis Based on Wavelet Coefficient Correlation," Digital Investigation, vol. 9, no. 1, pp. 58-68, June, 2012. https://doi.org/10.1016/j.diin.2012.02.003
- J. Kodovsky, J. Fridrich, and V. Holub, "On dangers of overtraining steganography to incomplete cover model," in Proc. of the 13th ACM Multimedia & Security Workshop, pp. 69-76, September 29-30, 2011.
- X. F. Song, F. L. Liu, X. Y. Luo and J. C. Lu, "Steganalysis of perturbed quantization steganography based on the enhanced histogram features," Multimedia Tools and Applications, vol. 74, no. 24, pp. 11045-11071, December, 2015. https://doi.org/10.1007/s11042-014-2217-6
- J. Kodovsky and J. Fridrich, "Steganalysis of JPEG images using rich models," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 0A 1-13, January 22-26, 2012.
- V. Holub and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Transactions on Information Forensics and Security, 8(12):1996-2006, 2013. https://doi.org/10.1109/TIFS.2013.2286682
- V. Holub and J. Fridrich, "Low Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219-228, February, 2015. https://doi.org/10.1109/TIFS.2014.2364918
- V. Holub, J. Fridrich, "Phase-Aware Projection Model for Steganalysis of JPEG Images," in Proc. of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, pp. 94090T-94090T-11, February 8-12, 2015.
- X. F. Song, F. L. Liu, C. F. Yang, X. Y. Luo and Y. Zhang, "Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters," in Proc. of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 15-23, June 17-19, 2015.
- J. Kodovsky, J. Fridrich and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security, vol.7, no. 2, pp. 432-444, April, 2012. https://doi.org/10.1109/TIFS.2011.2175919
- J. G. Daugman, "Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters," Journal of the Optical Society of America A Optics and Image Science, vol. 2, no. 7, pp. 1160-1169, July, 1985. https://doi.org/10.1364/JOSAA.2.001160
- M. Idrissa, M. Acheroy, "Texture classification using Gabor filters," Pattern Recognition Letters, vol. 23, no. 9, pp. 1095-1102, July, 2002. https://doi.org/10.1016/S0167-8655(02)00056-9
- M. Li, R.C. Staunton, "Optimum Gabor filter design and local binary patterns for texture segmentation," Pattern Recognition Letters, vol. 29, no. 5, pp. 664-672, April, 2008. https://doi.org/10.1016/j.patrec.2007.12.001
- Z. N. Sun, T. N. Tan, "Ordinal Measures for Iris Recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 12, pp. 2211-2226, December, 2009. https://doi.org/10.1109/TPAMI.2008.240
- Z. H. Chai, Z. N Sun, H. M. Vazquez, R. He and T. N. Tan, "Gabor Ordinal Measures for Face Recognition," IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 14-26, January, 2014. https://doi.org/10.1109/TIFS.2013.2290064
- T. Denemark, V. Sedighi, V. Holub and R. Cogranne, "Selection-Channel-Aware Rich Model for Steganalysis of Digital Images," in Proc. of the 5th IEEE International Workshop on Information Forensics and Security, pp. 48-53, December 3-5, 2014.
- S. E. Grigorescu, N. Petkov and P. Kruizinga, "Comparison of Texture Features Based on Gabor Filters," IEEE Transactions on Image Processing, vol. 11, no. 10, pp. 1160-1167, October, 2002. https://doi.org/10.1109/TIP.2002.804262
- P. Bas, T. Filler and T. Pevny, "Break our steganographic system-The ins and outs of organizing BOSS," in Proc. of the 13th International workshop on Information Hiding, pp. 59-70, May 18-20, 2011.
Cited by
- J-UNIWARD Steganoanalysis vol.57, pp.3, 2021, https://doi.org/10.1007/s10559-021-00374-6