参考文献
|
-
Anderson, R. J.,Petitcolas, F. A. P.(2006).On the limits of steganography.proceedings of IEEE Journal on Selected Areas in Communications,16(4),474-481.
-
Avcibas, I.,Memon, N.,Sankur, B.(2003).Steganalysis using image quality metrics.Proceedings of IEEE Transactions on Image,12(2),221-229.
-
Bender, W.,Gruhl, D.,Morimoto, N.,Lu, A.(1996).Techniques for data hiding.IBM System Journal,35(3&4),313-336.
-
Bui, C. N.,Lee, H. Y.,Jog, J. C.,Lee, H. K.(2010).Steganalysis Method Defeating the Modified PixelValue Defferencing Steganography.International Journal of Innovative Computing, Information and Control,6(7),3193-3203.
-
Cancelli, G.,Doërr, G.,Cox, I.,Barni, M.(2008).Detection of ±1 LSB steganography based on the amplitude of histogram local extrema.Proceedings of 2008 15th IEEE International Conference on Image Processing, San Diego, CA, USA, 12-15 Oct 2008,Washington, DC:
-
Chang, K. C.,Chang, C. P.,Huang, P. S.,Tu, T. M.(2008).A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing.Journal of Multimedia,3(2),37-44.
-
Chen, Y. T.(2017).National Chung Hsing University.
-
DDE Lab at Binghamton University. 2009. “SPAM Feature extractor.” Accessed July 25. http://dde.binghamton.edu/download/feature_extractors/.
-
Dumitrescu, S.,Wu, X.,Wang, Z.(2003).Detection of LSB steganography via sample pair analysis.IEEE Transactions on Signal Processing,51(7),1995-2007.
-
Fallahpour, M.,Sedaaghi, M. H.(2007).High Capacity Lossless Data Hiding Based on Histogram Modification.IEICE Electronics Express,4(7),205-210.
-
Farid, H.(2002).Detecting Hidden Messages Using Higher-Order Statistical Models.IEEE Proceedings of International Conference on Image processing, Rochester, NY, USA, 22-25 Sept 2002,Washington, DC:
-
Fridrich, J.,Goljan, M.(2002).Practical steganalysis of digital images-state of the art.Proceedings of the SPIE, Security and Watermarking of Multimedia Contents,IV(4675),1-13.
-
Fridrich, J.,Goljan, M.,Du, R.(2001).Detecting LSB steganography in color and gray-scale images.IEEE Multimedia,8(4),22-28.
-
Fridrich, J.,Kodovsky, J.(2012).Rich Models for Steganalysis of Digital Images.IEEE Transactions on Information Forensics and Security,7(3),868-882.
-
Fridrich, J.,Long, M.(2000).Steganalysis of LSB encoding in color images.IEEE Proceedings of International Conference on Multimedia and Expo, New York, YK, USA, 30 July-2 Aug 2000,Washington, DC:
-
Geetha, S.,Sindhu, S. Sivatha,Kamaraj, N.(2009).Blind Image Steganalysis Based on Content Independent Statistical Measures Maximizing the Specificity and Sensitivity of the System.Computers & Security,28(7),683-697.
-
Goljan, M.,Fridrich, J.,Holotyak, T.(2006).New Blind Steganalysis and Its Implications.Proceedings of SPIE,6072,1-13.
-
Gul, G.,Kurugollu, F.(2010).SVD Based Universal Spatial Domain Image Steganalysis.IEEE Transactions on Information Forensics and Security,5(2),349-353.
-
Hong, W.,Chen, T. S.,Shiu, C. W.(2009).Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors.Journal of Systems and Software,82(11),1833-1842.
-
Hwang, J. H.,Kim, J. W.,Choi, J. U.(2006).A Reversible Watermarking Based on Histogram Shifting.Proceedings of 5th International Workshop, IWDW 2006, Jeju Island, Korea, 8-1 Nov 2006,Berlin, Heidelberg:
-
Ingemar, J. Cox. 2009. “Extract the amplitude of local extrema in histograms.” Accessed July 5. http://www.cs.ucl.ac.uk/staff/ingemar/Content/Downloads.html.
-
Johnson, N.,Jajodia, S.(1998).Exploring steganography: Seeing the unseen.proceedings of computer,31(2),26-34.
-
Joo, J. C.,Kim, K. S.,Lee, H. K.(2010).Histogram Estimation-Scheme-based Steganalysis Defeating the Steganography using Pixel-Value Defferencing and Modulus Function.Optical Enginnering,49(7),1-13.
-
Ker, A. D.(2007).Steganalysis of Embedding in Two Least-Significant Bits.IEEE Transactions on Information Forensics and Security,2(1),46-54.
-
Kim, K. S.,Lee, M. J.,Lee, H. Y.,Lee, H. K.(2009).Reversible Data Hiding Exploiting Spatial Correlation between Sub-sampled Images.Pattern Recognition,42(11),3083-3096.
-
Kuo, W. C.,Lin, Y. H.(2008).On the security of reversible data hiding based-on histogram shift.IEEE Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, Dalian, Liaoning, China, 18-20 June 2008,Washington, DC:
-
Kuo, W. C.,Lin, Y. H.,Huang, Y. Z.,Lee, Y. C.(2008).On the security of histogram-based reversible data hiding.Proceedings of the 7th Conference on Information Technology and Applications in Outlying Islands
-
Lee, C. F.,Chang, C. C.,Li, J. J.,Wu, Y. H.(2016).A Survey of Reversible Data Hiding Schemes Based on Pixel Value Ordering.Proceedings of 2016 Nicograph International (NicoInt), Hanzhou, China, 6-8 July 2016,Washington, DC:
-
Li, X. L.,Li, J.,Li, B.,Yang, B.(2013).High- Fidelity Reversible Data Hiding Scheme Based on PixelValue-Ordering and Prediction–Error Expansion.Signal Processing,93(1),198-205.
-
Liu, C. L.,Liu, H. H.(2012).Reliable Detection of Histogram Shift-based Steganography Using Payload Invariant Features.Applied Mechanics and Materials,284-287,3517-3521.
-
Liu, C. L.,Liu, H. H.(2010).Performance Analysis of Histogram Shift-based Steganalysis.Proceedings of The 23rd IPPR Conference on Computer Vision, Graphics and Image Processing
-
Luo, X. Y.,Wang, D. S.,Wang, P.,Liu, F. L.(2008).A Review on Blind Detection for Image Steganography.Signal Processing,88(9),2138-2157.
-
Lyu, S.,Farid, H.(2006).Steganalysis using higherorder Image Statistics.IEEE Transactions on Information Forensics and Security,1(1),111-119.
-
Ni, Z.,Shi, Y. Q.,Ansari, N.,Su, W.(2006).Reversible Data Hiding.IEEE Transactions on Circuits and Systems for Video Technology,16(3),354-362.
-
Nissar, A.,Mir, A. H.(2010).Classification of Steganalysis Techniques: A Study.Digital Signal Processing,20(6),1758-1770.
-
Peng, F.,Li, X. L.,Yang, B.(2014).Improved PVO- based Reversible Data Hiding.Digital Signal Processing,25,255-265.
-
Petitcolas, F. A. P.,Anderson, R. J.,Kuhn, M. G.(1999).Information hiding-a survey.Proceedings of the IEEE,87(7),1062-1078.
-
Pevný, T.,Bas, P.,Fridrich, J.(2010).Steganalysis by Subtractive Pixel Adjacency Matrix.IEEE Transactions on Information Forensics and Security,5(2),215-224.
-
Qu, X.,Kim, H. J.(2015).Pixel-Based Pixel Value Ordering Predictor for High-Fidelity Reversible data Hiding.Signal Processing,111,249-260.
-
Rao, P. V. N.,Devi, T. U.,Sridhar, G.,Kaladhar, D.,Rao, A.(2005).A probabilistic neural network approach for protein superfamilt classification.Journal of Theoretical and Applied Information Technology,6(1),101-105.
-
Sabeti, V.,Samavi, S.,Mahdavi, M.,Shirani, S.(2007).Steganalysis of Pixel-Value Differencing Steganographic Method.IEEE Proceedings of 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processin, Victoria, BC, Canada, 22-24 Aug 2007,Washington, DC:
-
Sabeti, V.,Samavi, S.,Mahdavi, M.,Shirani, S.(2010).Steganalysis and payload estimation of embedding in pixel differences using neural networks.Pattern Recognition,43(1),405-415.
-
Sachnev, V.,Kim, H. J.,Nam, J.,Suresh, S.,Shi, Y. Q.(2009).Reversible Watermarking Algorithm Using Sorting and Prediction.IEEE Transactions on Circuits and Systems for Video Technology,19(7),989-999.
-
Specht, D. F.(1990).Probabilistic Neural Networks.Neural Network,3(1),109-118.
-
Tsai, P.,Hu, Y. C.,Yeh, H. L.(2009).Reversible Image Hiding Scheme Using Predictive Coding and Histogram Shifting.Signal Processing,89(6),1129-1143.
-
United States Department of Agriculture. 2015. “NRCS photo Gallery.” Accessed May 10. http://photogallery.nrcs.usda.gov/.
-
Wang, C. M.,Wu, N. I,Tsai, C. S.,Hwang, M. S.(2008).A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function.Journal of Systems and Software,81(1),150-158.
-
Weinberger, M. J.,Seroussi, G.,Sapiro, G.(2000).The LOCO-I Lossless Image Compression Algorithm: Principles and Standardization into JPEG-LS.IEEE Transactions on Image Processing,9(8),1309-1324.
-
Westfeld, A.,Pfitzmann, A.(1999).Attacks on steganographic systems.Proceedings of the 3rd International Workshop on Information Hiding, Dresden, Germany, 29 Sep.-1 Oct 1999,Berlin, Heidelberg:
-
Wu, D. C.,Tsai, W. H.(2003).A Steganographic Method for Images by Pixel-Value Differencing.Pattern Recognition Letters,24(9-10),1613-1626.
-
Wu, H. C.,Wu, N. I,Tsai, C. S.,Hwang, M. S.(2005).Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods.IEE Proceedings on Vision, Image and Signal Processing,152(5),611-615.
-
Wu, X.,Memon, N.(1997).Context-Based, Adaptive, Lossless Image Coding.IEEE Transactions on Communications,45(4),437-444.
-
Yang, C. H.,Weng, C. Y.,Wang, S. J.,Sun, H. M.(2008).Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.IEEE Transactions on Information Forensics and Security,3(3),488-497.
-
Zaker, N.,Hamzeh, A.(2012).A Novel Steganalysis for TPVD Steganographic Method Based on Differences of Pixel Difference Histogram.Multimedia Tools and Applications,58(1),147-166.
-
Zhang, J.,Cox, I. J.,Doerr, G.(2007).Steganalysis for LSB Matching in Images with High-frequency Noise.IEEE Processing 2007 IEEE 9th Workshop on Multimedia Signal Processing Crete, Greece, 1-3 Oct. 2007,Washington, DC:
-
Zhang, X.,Wang, S.(2004).Vulnerability of Pixel Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security.Pattern Recognition Letters,25(3),331-339.
|