标题
Geolocation of covert communication entity on the Internet for post-steganalysis
作者
关键词
-
出版物
EURASIP Journal on Image and Video Processing
Volume 2020, Issue 1, Pages -
出版商
Springer Science and Business Media LLC
发表日期
2020-04-07
DOI
10.1186/s13640-020-00504-8
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Deep neural networks for efficient steganographic payload location
- (2019) Yu Sun et al. Journal of Real-Time Image Processing
- CNN-Based Adversarial Embedding for Image Steganography
- (2019) Weixuan Tang et al. IEEE Transactions on Information Forensics and Security
- Towards feature representation for steganalysis of spatial steganography
- (2019) Ping Wang et al. SIGNAL PROCESSING
- Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction
- (2018) Yuanyuan Ma et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
- New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator
- (2018) Bin Li et al. IEEE Transactions on Information Forensics and Security
- IP Geolocation based on identification routers and local delay distribution similarity
- (2018) Fan Zhao et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- Deep Residual Network for Steganalysis of Digital Images
- (2018) Mehdi Boroumand et al. IEEE Transactions on Information Forensics and Security
- Extracting hidden messages of MLSB steganography based on optimal stego subset
- (2018) Chunfang Yang et al. Science China-Information Sciences
- Deep Learning Hierarchical Representations for Image Steganalysis
- (2017) Jian Ye et al. IEEE Transactions on Information Forensics and Security
- Stego key searching for LSB steganography on JPEG decompressed image
- (2016) Jiufen Liu et al. Science China-Information Sciences
- LSB steganographic payload location for JPEG-decompressed images
- (2015) Jiu-fen Liu et al. DIGITAL SIGNAL PROCESSING
- The Steganographer is the Outlier: Realistic Large-Scale Steganalysis
- (2014) Andrew D. Ker et al. IEEE Transactions on Information Forensics and Security
- Rich Models for Steganalysis of Digital Images
- (2012) Jessica Fridrich et al. IEEE Transactions on Information Forensics and Security
- Optimal Cover Estimation Methods and Steganographic Payload Location
- (2011) Tu-Thach Quach IEEE Transactions on Information Forensics and Security
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now