PDF下载 分享
[1]段怀锋,杨 榆,雷 敏,等.基于训练集构造的图像通用盲检测算法改进[J].成都信息工程大学学报,2016,(01):70-75.
 DUAN Huai-feng,YANG Yu,LEI Min,et al.Improvement of Image Universal Blind Detection based on Training Set Construction[J].Journal of Chengdu University of Information Technology,2016,(01):70-75.
点击复制

基于训练集构造的图像通用盲检测算法改进

参考文献/References:

[1] Dumitrescu S, Wu X L, Wang Z. Detection of LSB Steganography via Sample Pair Analysis[J]. IEEE Trans. on Signal Processing, 2003, 51 (7): 1995 - 2007.
[2] Zhihua Xia, Xinhui Wang, Xingming Sun, et al. Steganalysis of least significant bit matching using multi-order differences[ J]. Security and Commu- nication Networks, 2014, 7(8): 1283-1291.
[3] Zhihua Xia, Xinhui Wang, Xingming Sun, et al. Steganalysis of LSB matching using differences be- tween nonadjacent pixels[ C]. Multimedia Tools and Applications,2014.
[4] 万宝吉, 张涛, 侯晓丹,等. 基于Boosting 算法 融合的图像隐写分析方法[ J]. 计算机工程, 2013, 39(12): 148-151.
[5] Pevny T, Bas P, Fridrich J. Steganalysis by Sub- tractivePixel AdjacencyMatrix[ J]. IEEE Transac- tions onInformation Security and Forensics, 2010, 5(2): 215-224.
[6] Fridrich J, Kodovsky J. Rich Models for Steganal- ysis of Digital Images[ J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3).
[7] 李彩霞. 空域自适应EA 隐秘算法及分析算法 的研究(D). 大连:大连理工大学, 2013.
[8] Kodovsky J, Fridrich J, Holub. V. : Ensemble Classifiers for Steganalysis of Digital Media. IEEE Trans[J]. Information Forensics Security, 2011.
[9] Kodovsky J, Pevny T, Fridrich J. Modern stega- nalysis can detect YASS[C]. In Proc. SPIE, E- lectronic Imaging, Security Forensics of Multime- diaXII, San Jose, CA, 2010, 7541:201-211.
[10] Breiman L. Random forest[ J]. Machine Learn- ing, 2001, 45(1):5-32.
[11] Filler T, Pevny T, Bas P. BOSS ( Break Our Steganography System) 2014 [EB/ OL]. Availa-ble: http: / / agents. fel. cvut. cz/ stegodata/ Boss- Base-1. 01-cover. tar. bz2,2014.
[12] Sharp T. An Implementation of Key-based Digital Signal Steganography[ C]. In Proceedings of the 4th International Workshop on Information Hid- ing, London, UK, 2001: 13-26.
[13] Luo W, Huang F, Huang J. Edge adaptive image steganographybased on LSB matching revisited [J]. IEEE Trans. Inform. Forensics Security, 2010, 5(2): 201 – 214.
[14] Pevny T, Filler T, Bas P. Eds. :Using High-di- mensional Image Models to Perform Highly Unde- tectable Steganography[ J], in Information Hid- ing, 12th Int. Workshop, Calgary, Canada, 2010, 6387: 161 – 177.
[15] Filler T, Fridrich J, Judas J. Minimizing Embed- ding Impact in Steganography Using Trellis-Coded Quantization [ J]. In Proceedings SPIE, EI, Media Forensics and Security XII, San Jose, CA, 2010: 1-14.
[16] Filler T, Judas J, Fridrich J. Minimizing Addi- tive Distortion in Steganography Using Syndrome- Trellis Codes[J]. IEEE Transactions on Informa- tion Forensics and Security,2011, 6(3): 920- 935.
[17] Anxin Wu, Guorui Feng. Payload Mismatch De- tection of Image Steganalysis Using Ensemble Linear Discriminant Clustering[ J]. IEEE Trans. on Signal Processing, 2015: 1-4.
[18] Yu Dong, Tao Zhang, Xiaodan Hou, et al. A New Steganalysis Paradigm Based on Image Re- trieval of Similar Image-Inherent Statistical Prop- erties and Outlier Detection[ J]. Wireless Com- munications & Signal Processing ( WCSP ), 2015: 1-5.

备注/Memo

收稿日期:2016-02-02 基金项目:国家自然科学基金资助项目(61310306028),浙江省自然 科学基金资助项目(Y15F020053)

更新日期/Last Update: 2016-01-20