4.6 Article

Which gray level should be given the smallest cost for adaptive steganography?

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Decomposing Joint Distortion for Adaptive Steganography

Weiming Zhang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2017)

Article Computer Science, Theory & Methods

Content-Adaptive Steganography by Minimizing Statistical Detectability

Vahid Sedighi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Engineering, Electrical & Electronic

Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism

Chuan Qin et al.

SIGNAL PROCESSING (2016)

Article Computer Science, Theory & Methods

A Strategy of Clustering Modification Directions in Spatial Image Steganography

Bin Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Reversible data hiding scheme based on exploiting modification direction with two steganographic images

Chuan Qin et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Theory & Methods

Investigation on Cost Assignment in Spatial Image Steganography

Bin Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Theory & Methods

New Channel Selection Rule for JPEG Steganography

Fangjun Huang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Ensemble Classifiers for Steganalysis of Digital Media

Jan Kodovsky et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Rich Models for Steganalysis of Digital Images

Jessica Fridrich et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes

Tomas Filler et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Theory & Methods

Steganalysis by Subtractive Pixel Adjacency Matrix

Tomas Pevny et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Article Computer Science, Theory & Methods

Gibbs Construction in Steganography

Tomas Filler et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Article Computer Science, Artificial Intelligence

Expansion embedding techniques for reversible watermarking

Diljith M. Thodi et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2007)

Article Engineering, Electrical & Electronic

Reversible data hiding

ZC Ni et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2006)

Article Computer Science, Artificial Intelligence

Reversible watermark using the difference expansion of a generalized integer transform

AM Alattar

IEEE TRANSACTIONS ON IMAGE PROCESSING (2004)

Article Engineering, Electrical & Electronic

Reversible data embedding using a difference expansion

J Tian

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2003)