TY - JOUR AU - Zhang, Y. AU - Luo, X. Y. AU - Guo, Y. Q. AU - Qin, C. AU - Liu, F. L. PY - 2020 DA - 2020// TI - Multiple robustness enhancements for image adaptive steganography in lossy channels JO - IEEE Trans. Circ. Syst. Video Technol. VL - 30 ID - Zhang2020 ER - TY - JOUR AU - Qin, C. AU - Zhang, W. AU - Cao, F. AU - Zhang, X. P. AU - Chang, C. C. PY - 2018 DA - 2018// TI - Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection JO - Sig. Process. VL - 153 UR - https://doi.org/10.1016/j.sigpro.2018.07.008 DO - 10.1016/j.sigpro.2018.07.008 ID - Qin2018 ER - TY - JOUR AU - Xiang, L. AU - Li, Y. AU - Hao, W. AU - Yang, P. AU - Shen, X. PY - 2018 DA - 2018// TI - Reversible natural language watermarking us-ing synonym substitution and arithmetic coding JO - Comput. Mater. Continua VL - 55 ID - Xiang2018 ER - TY - STD TI - T. Qiao, X. Y. Luo, T. Wu, M. Xu, Z. X. Qian, Adaptive steganalysis based on statistical model of quantized dct coefficients for jpeg images. IEEE Trans. Dependable Secur. Comput. (2019). https://doi.org/10.1109/TDSC.2019.2962672. ID - ref4 ER - TY - JOUR AU - Luo, X. Y. AU - Wang, D. S. AU - Wang, P. AU - Liu, F. L. PY - 2008 DA - 2008// TI - A review on blind detection for image steganography JO - Signal Process. VL - 88 UR - https://doi.org/10.1016/j.sigpro.2008.03.016 DO - 10.1016/j.sigpro.2008.03.016 ID - Luo2008 ER - TY - CHAP AU - Song, X. AU - Liu, F. AU - Yang, C. AU - Luo, X. AU - Zhang, Y. ED - Alattar, A. M. ED - Fridrich, J. J. ED - Smith, N. M. ED - Alfaro, P. C. PY - 2015 DA - 2015// TI - Steganalysis of adaptive JPEG steganography using 2D Gabor filters BT - Proceedings of the Third ACM Workshop on Information Hiding and Multimedia Security: 17-19 June 2015 PB - ACM CY - Portland Oregon USA ID - Song2015 ER - TY - JOUR AU - Ma, Y. AU - Luo, X. AU - Li, X. AU - Bao, Z. AU - Zhang, Y. PY - 2019 DA - 2019// TI - Selection of rich model steganalysis features based on decision rough set α-positive region reduction JO - IEEE Trans. Circ. Syst. Video Technol. VL - 29 UR - https://doi.org/10.1109/TCSVT.2018.2799243 DO - 10.1109/TCSVT.2018.2799243 ID - Ma2019 ER - TY - JOUR AU - Yang, C. AU - Liu, F. AU - Luo, X. AU - Liu, B. PY - 2008 DA - 2008// TI - Steganalysis frameworks of embedding in multiple least-significant bits JO - IEEE Trans. Inf. Forensic. Secur. VL - 3 UR - https://doi.org/10.1109/TIFS.2008.2007240 DO - 10.1109/TIFS.2008.2007240 ID - Yang2008 ER - TY - JOUR AU - Yang, C. AU - Liu, F. AU - Luo, X. AU - Zeng, Y. PY - 2013 DA - 2013// TI - Pixel group trace model-based quantitative steganalysis for multiple least-significant bits steganography JO - IEEE Trans. Inf. Forensic. Secur. VL - 8 UR - https://doi.org/10.1109/TIFS.2012.2229987 DO - 10.1109/TIFS.2012.2229987 ID - Yang2013 ER - TY - JOUR AU - Kang, Y. AU - Liu, F. AU - Yang, C. AU - Luo, X. AU - Zhang, T. PY - 2019 DA - 2019// TI - Color image steganalysis based on residuals of channel differences JO - Comput. Mater. Continua VL - 59 UR - https://doi.org/10.32604/cmc.2019.05242 DO - 10.32604/cmc.2019.05242 ID - Kang2019 ER - TY - JOUR AU - Xiang, L. AU - Guo, G. AU - Yu, J. AU - Sheng, V. S. AU - Yang, P. PY - 2019 DA - 2019// TI - A convolutional neural network-based linguistic steganalysis for synonym substitution steganography JO - Math. Biosci. Eng. VL - 17 UR - https://doi.org/10.3934/mbe.2020055 DO - 10.3934/mbe.2020055 ID - Xiang2019 ER - TY - STD TI - A. D. Ker, R. Böhme, in Proceedings of SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X: 27 January 2008, ed. by E. J. D. III, P. W. Wong, J. Dittmann, and N. D. Memon. Revisiting weighted stego-image steganalysis (SPIESan Jose, CA, USA, 2008), pp. 27–31. ID - ref12 ER - TY - CHAP AU - Ker, A. D. ED - Zhang, N. ED - Abraham, A. ED - Shi, Q. ED - Thomas, J. PY - 2007 DA - 2007// TI - A weighted stego image detector for sequential lsb replacement BT - Proceedings of Third International Symposium on Information Assurance and Security: 29-31 August 2007 PB - IEEE CY - Manchester, UK UR - https://doi.org/10.1109/IAS.2007.71 DO - 10.1109/IAS.2007.71 ID - Ker2007 ER - TY - STD TI - A. D. Ker, I. Lubenko, in Proceedings of SPIE 7254, Media Forensics and Security: 18-22 January 2009, ed. by E. J. D. III, J. Dittmann, N. D. Memon, and P. W. Wong. Feature reduction and payload location with WAM steganalysis (SPIESan Jose, California, USA, 2009), p. 72540. ID - ref14 ER - TY - JOUR AU - Quach, T. T. PY - 2011 DA - 2011// TI - Optimal cover estimation methods and steganographic payload location JO - IEEE Trans. Inf. Forensic Secur. VL - 6 UR - https://doi.org/10.1109/TIFS.2011.2160855 DO - 10.1109/TIFS.2011.2160855 ID - Quach2011 ER - TY - CHAP AU - Quach, T. T. ED - Alattar, A. M. ED - Memon, N. D. ED - Heitzenrater, C. D. PY - 2014 DA - 2014// TI - Cover estimation and payload location using Markov random fields BT - Proceedings of SPIE 9028, Media Watermarking, Security, and Forensics: 2-6 February 2014 PB - SPIE CY - San Francisco, California, USA ID - Quach2014 ER - TY - CHAP AU - Gui, X. AU - Li, X. AU - Yang, B. ED - Saber, E. PY - 2012 DA - 2012// TI - Improved payload location for LSB matching steganography BT - Proceedings of Nineteenth IEEE International Conference on Image Processing: 30 September-3 October 2012 PB - IEEE CY - Orlando, Florida, USA UR - https://doi.org/10.1109/ICIP.2012.6467062 DO - 10.1109/ICIP.2012.6467062 ID - Gui2012 ER - TY - JOUR AU - Quach, T. T. PY - 2014 DA - 2014// TI - Extracting hidden messages in steganographic images JO - Digit. Investig. VL - 11 UR - https://doi.org/10.1016/j.diin.2014.05.003 DO - 10.1016/j.diin.2014.05.003 ID - Quach2014 ER - TY - JOUR AU - Yang, C. AU - Liu, F. AU - Ge, S. AU - Lu, J. AU - Huang, J. PY - 2019 DA - 2019// TI - Locating secret messages based on quantitative steganalysis JO - Math. Biosci. Eng. VL - 16 UR - https://doi.org/10.3934/mbe.2019247 DO - 10.3934/mbe.2019247 ID - Yang2019 ER - TY - JOUR AU - Wang, J. AU - Yang, C. AU - Wang, P. AU - Song, X. AU - Lu, J. PY - 2020 DA - 2020// TI - Payload location for JPEG image steganography based on co-frequency sub-image filtering JO - Int. J. Distrib. Sensor Netw. VL - 16 ID - Wang2020 ER - TY - STD TI - T. T. Quach, in Proceedings of SPIE 8303, Media Watermarking, Security, and Forensics: 22-26 January 2012, ed. by N. D. Memon, A. M. Alattar, and E. J. D. III. Locatability of modified pixels in steganographic images (SPIEBurlingame, California, USA, 2012), p. 83030. ID - ref21 ER - TY - JOUR AU - Yang, C. AU - Wang, J. AU - Lin, C. AU - Chen, H. AU - Wang, W. PY - 2019 DA - 2019// TI - Locating steganalysis of LSB matching based on spatial and wavelet filter fusion JO - Comput. Mater. Continua VL - 60 UR - https://doi.org/10.32604/cmc.2019.06154 DO - 10.32604/cmc.2019.06154 ID - Yang2019 ER - TY - JOUR AU - Zhang, W. M. AU - Liu, J. F. AU - Q, L. S. PY - 2005 DA - 2005// TI - Approaches for recovering key of LSB steganography JO - Acta Sci. Nat. Univ. Sunyatseni VL - 44 ID - Zhang2005 ER - TY - STD TI - J. Fridrich, M. Goljan, D. Soukal, in Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI: 18-22 January 2004, ed. by E. J. D. III, P. W. Wong. Searching for the stego-key (SPIESan Jose, California, USA, 2004), pp. 70–82. ID - ref24 ER - TY - STD TI - J. Fridrich, M. Goljan, D. Soukal, T. Holotyak, in Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII: 16-20 January 2005, ed. by E. J. D. III, P. W. Wong. Forensic steganalysis: determining the stego key in spatial domain steganography (SPIESan Jose, California, USA, 2005), pp. 631–642. ID - ref25 ER - TY - JOUR AU - Zhang, W. M. AU - Q, L. S. AU - Liu, J. F. PY - 2007 DA - 2007// TI - Extracting attack to LSB steganography in spatial domain JO - Chin. J. Comput. VL - 30 ID - Zhang2007 ER - TY - JOUR AU - Liu, J. F. AU - Tian, Y. G. AU - Han, T. AU - Yang, C. F. AU - B, L. W. PY - 2015 DA - 2015// TI - LSB steganographic payload location for JPEG-decompressed images JO - Digit Signal Process. VL - 38 UR - https://doi.org/10.1016/j.dsp.2014.12.004 DO - 10.1016/j.dsp.2014.12.004 ID - Liu2015 ER - TY - JOUR AU - Liu, J. AU - Tian, Y. AU - Han, T. AU - Wang, J. AU - Luo, X. PY - 2016 DA - 2016// TI - Stego key searching for LSB steganography on JPEG decompressed image JO - Sci. China Inf. Sci. VL - 59 UR - https://doi.org/10.1007/s11432-015-5367-x DO - 10.1007/s11432-015-5367-x ID - Liu2016 ER - TY - JOUR AU - Yang, C. AU - Luo, X. AU - Lu, J. AU - Liu, F. PY - 2018 DA - 2018// TI - Extracting hidden messages of MLSB steganography based on optimal stego subset JO - Sci. China Inf. Sci. VL - 61 UR - https://doi.org/10.1007/s11432-017-9328-2 DO - 10.1007/s11432-017-9328-2 ID - Yang2018 ER - TY - JOUR AU - Xu, C. AU - Liu, J. AU - Gan, J. AU - Luo, X. PY - 2018 DA - 2018// TI - Stego key recovery based on the optimal hypothesis test JO - Multimed. Tools Appl. VL - 77 UR - https://doi.org/10.1007/s11042-017-4878-4 DO - 10.1007/s11042-017-4878-4 ID - Xu2018 ER - TY - JOUR AU - Liu, J. AU - Gan, J. AU - Wang, J. AU - Xu, C. AU - Luo, X. PY - 2019 DA - 2019// TI - Efficient stego key recovery based on distribution differences of extracting message bits JO - J. Real-Time Image Proc. VL - 16 UR - https://doi.org/10.1007/s11554-018-0805-9 DO - 10.1007/s11554-018-0805-9 ID - Liu2019 ER - TY - JOUR AU - Zhang, W. M. AU - Li, S. Q. AU - Liu, J. F. PY - 2007 DA - 2007// TI - Analysis for the equivalent keys of steganographic scheme CPT JO - Acta Electron. Sin. VL - 35 ID - Zhang2007 ER - TY - JOUR AU - Chen, J. Y. AU - Zhu, Y. F. AU - Zhang, W. M. AU - Liu, J. F. PY - 2010 DA - 2010// TI - Chosen-key extracting attack to random LSB steganography JO - J. Commun. VL - 31 ID - Chen2010 ER - TY - JOUR AU - Chen, J. AU - Liu, J. AU - Zhang, W. AU - Liu, H. AU - Zhao, X. PY - 2013 DA - 2013// TI - Cryptographic secrecy analysis of matrix embedding JO - Int. J. Comput. Intell. Syst. VL - 6 UR - https://doi.org/10.1080/18756891.2013.802116 DO - 10.1080/18756891.2013.802116 ID - Chen2013 ER - TY - JOUR AU - Luo, X. AU - Song, X. AU - Li, X. AU - Zhang, W. AU - Lu, J. AU - Yang, C. AU - Liu, F. PY - 2016 DA - 2016// TI - Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes JO - Multimed. Tools Appl. VL - 75 UR - https://doi.org/10.1007/s11042-015-2759-2 DO - 10.1007/s11042-015-2759-2 ID - Luo2016 ER - TY - JOUR AU - Gan, J. AU - Liu, J. AU - Luo, X. AU - Yang, C. AU - Liu, F. PY - 2018 DA - 2018// TI - Reliable steganalysis of HUGO steganography based on partially known plaintext JO - Multimed. Tools Appl. VL - 77 UR - https://doi.org/10.1007/s11042-017-5134-7 DO - 10.1007/s11042-017-5134-7 ID - Gan2018 ER - TY - CHAP AU - Westfeld, A. ED - Moskowitz, I. S. PY - 2001 DA - 2001// TI - High capacity despite better steganalysis (F5-a steganographic algorithm) BT - Proceedings of Fourth International Workshop on Information Hiding: 25-27 April 2001 PB - Springer CY - Pittsburgh, PA, USA UR - https://doi.org/10.1007/3-540-45496-9_21 DO - 10.1007/3-540-45496-9_21 ID - Westfeld2001 ER - TY - BOOK AU - Fridrich, J. PY - 2009 DA - 2009// TI - Steganography in digital media—principles, algorithms, and applications PB - Cambridge University Press CY - Cambridge UR - https://doi.org/10.1017/CBO9781139192903 DO - 10.1017/CBO9781139192903 ID - Fridrich2009 ER - TY - CHAP AU - Fridrich, J. AU - Goljan, M. AU - Hogea, D. ED - Petitcolas, F. A. P. PY - 2002 DA - 2002// TI - Steganalysis of JPEG images: breaking the F5 algorithm BT - Proceedings of Fifth International Workshop on Information Hiding: 7-9 October 2002 PB - Springer CY - Noordwijkerhout, The Netherlands ID - Fridrich2002 ER - TY - JOUR AU - Luo, X. AU - Liu, F. AU - Yang, C. AU - Lian, S. AU - Wang, D. PY - 2012 DA - 2012// TI - On F5 steganography in images JO - Comput. J. VL - 55 UR - https://doi.org/10.1093/comjnl/bxr092 DO - 10.1093/comjnl/bxr092 ID - Luo2012 ER - TY - JOUR AU - Xiang, L. AU - Zhao, G. AU - Li, Q. AU - Hao, W. AU - Li, F. PY - 2018 DA - 2018// TI - TUMK-ELM: a fast unsupervised heterogeneous data learning approach JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2847037 DO - 10.1109/ACCESS.2018.2847037 ID - Xiang2018 ER - TY - JOUR AU - Xiang, L. AU - Shen, X. AU - Qin, J. AU - Hao, W. PY - 2019 DA - 2019// TI - Discrete multi-graph hashing for large-scale visual search JO - Neural. Process. Lett. VL - 49 UR - https://doi.org/10.1007/s11063-018-9892-7 DO - 10.1007/s11063-018-9892-7 ID - Xiang2019 ER - TY - JOUR AU - Wang, J. AU - Li, T. AU - Luo, X. AU - Shi, Y. Q. AU - Liu, R. AU - Jha, S. K. PY - 2018 DA - 2018// TI - Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain JO - IEEE Trans. Circ. Syst. Video Technol. VL - 29 UR - https://doi.org/10.1109/TCSVT.2018.2867786 DO - 10.1109/TCSVT.2018.2867786 ID - Wang2018 ER - TY - JOUR AU - Wang, J. AU - Wang, H. AU - Li, J. AU - Luo, X. AU - Shi, Y. Q. AU - Jha, S. K. PY - 2020 DA - 2020// TI - Detecting double jpeg compressed color images with the same quantization matrix in spherical coordinates JO - IEEE Trans. Circ. Syst. Video Technol. VL - 30 ID - Wang2020 ER - TY - JOUR AU - Qiao, T. AU - Shi, R. AU - Luo, X. AU - Xu, M. AU - Zheng, N. AU - Wu, Y. PY - 2019 DA - 2019// TI - Statistical model-based detector via texture weight map: application in re-sampling authentication JO - IEEE Trans. Multimed. VL - 21 UR - https://doi.org/10.1109/TMM.2018.2872863 DO - 10.1109/TMM.2018.2872863 ID - Qiao2019 ER -