Steganography using Gabor filter and anisotropic diffusion (original) (raw)
Access this article
We’re sorry, something doesn't seem to be working properly.
Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.
References
- Al-Otaibi NA, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lect NoteS Inform Theory 2
- Al-Otaibi NA, Gutub AA (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), pp 250–256
- Alotaibi N, Gutub A, Khan E (2015, April) Stego-system for hiding text in images of personal computers. In: The 12th Learning and Technology Conference: Wearable Tech/Wearable Learning
- Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing BOSS. In: 13th International Conference,International Workshop on Information Hiding, pp 59–70
- Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014, December) Selection-channel-aware rich model for steganalysis of digital images. In: Information Forensics and Security (WIFS), 2014 I.E. International Workshop on, IEEE, pp 48–53
- Filler T, Fridrich JJ (2009, June) Fisher Information Determines Capacity of ε-Secure Steganography. In: Information Hiding vol. 5806, pp 31–47
- Filler T, Fridrich JJ (2011, January) Design of adaptive steganographic schemes for digital images. In: Media Forensics and Security p 78800F
- Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920–935
Article Google Scholar - Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882
Article Google Scholar - Fridrich JJ, Kodovský J (2013, May) Multivariate gaussian model for designing additive distortion for steganography. In: ICASSP, pp 2949–2953
- Fridrich J, Pevný T, Kodovský J (2007, September) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th workshop on Multimedia & security, ACM, pp 3–14
- Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). In: 13th International Conference,International Workshop on Information Hiding, pp 71–84
- Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensics Secur 9(5):814–825
Article Google Scholar - Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans Inf Forensics Secur 10(12):2669–2680
Article Google Scholar - Holub V, Fridrich J (2012, December) Designing steganographic distortion using directional filters. In: Information Forensics and Security (WIFS), 2012 I.E. International Workshop on, IEEE, pp 234–239
- Holub V, Fridrich J (2013, June) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM, pp 59–68
- Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228
Article Google Scholar - Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444
Article Google Scholar - Li B, Wang M, Huang J, Li X (2014, October) A new cost function for spatial image steganography. In: Image Processing (ICIP), 2014 I.E. International Conference on, IEEE, pp 4206–4210
- Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224
Article Google Scholar - Sedighi V, Fridrich J (2016, September) Effect of saturated pixels on security of steganographic schemes for digital images. In: Image Processing (ICIP), 2016 I.E. International Conference on, IEEE, pp 2747–2751
- Sedighi V, Fridrich JJ, Cogranne R (2015, March) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: Media Watermarking, Security, and Forensics, p 94090H
- Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221–234
Article Google Scholar - Song X, Liu F, Yang C, Luo X, Zhang Y (2015, June) Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM, pp 15–23
- Song X, Liu F, Zhang Z, Yang C, Luo X, Chen L (2016) 2D Gabor filters-based steganalysis of content-adaptive JPEG steganography. Multimed Tools Appl 1–29. https://doi.org/10.1007/s11042-016-4157-9
- Xie X, Livermore C (2016, January) A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach. In: Micro Electro Mechanical Systems (MEMS), 2016 I.E. 29th International Conference on, IEEE, pp 75–78
- Xie X, Zaitsev Y, Velásquez-García LF, Teller SJ, Livermore C (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24(12):125014
Article Google Scholar - Xie X, Zaitsev Y, Velasquez-Garcia L, Teller S, Livermore C (2014) Compact, scalable, high-resolution, MEMS-enabled tactile displays. In: Proc of Solid-State Sensors, Actuators, and Microsystems Workshop, pp 127–130