Open Access
This article has a note: [note]

Issue
MATEC Web of Conferences
Volume 22, 2015
International Conference on Engineering Technology and Application (ICETA 2015)
Article Number 01012
Number of page(s) 9
Section Information and Communication Technology
DOI https://doi.org/10.1051/matecconf/20152201012
Published online 09 July 2015
  1. Sun, Y.F. & Liu, F.L. 2010. A study on the anti-detection property of the spread spectrum steganography of Gauss-Markov carriers, Data Acquisition and Processing, 25(4): 462–468.
  2. Xi, L., Ping, X.J. & Zhang, H. 2012. Security analysis of the self-adaptive spread spectrum steganography based on the GMM model, Computer Engineering, 38(1): 137–139.
  3. Ouyang, C.J., Li, B., Li, X. & Wang, N. 2012. Security measure of the image steganographic system based on the similarity measure of Vague set, Chinese Journal of Computers, 35(7): 1510–1521. [CrossRef]
  4. Xu, C.Y. & Ping, X.J. 2010. An analysis on the video steganography based on the spatial-temporal correlation, Journal of Image and Graphics, 15(9): 1331–1337.
  5. Xu, L., Guo, L., Wang, C.P., Wang, Y.J. & Yang, F. 2010. Direct spread spectrum audio steganalysis based on video features, Communication Technologies, 43(1): 78–81.
  6. Qi, K. & Xie, D.Q. 2013. Steganalysis of colored images based on noise model and channel integration, Computer Research and Progress, 50(2): 307–318.
  7. Zhou, H.Z. & Wang, D.M. 2014. Video steganalysis of fine identified spatial-temporal characteristics, Computer Engineering, 40(1): 149–152.
  8. Zhong, W.D., Wu, J.Q., Wu, G.R. & Yang, H.B. 2012. A video steganalysis method based on the invisibility of spatial-temporal redundancy statistics, Application Re-search Of Computers, 29(10): 3846–3850
  9. Rong, T.Z. 2012. Study on the Prediction Method Based on Higher Order Period Markov Chain Model, a thesis of the Doctor’s degree. Chongqing University.
  10. Pegram G. G. S. 1975. A multinomial model for transition probability matrices, Journal of Applied Probability, 12(3): 498–506. [CrossRef]
  11. Raftery A.E. 1985. A model for high-order Markov chains, Journal of the Royal Statistical Society, 47(3): 528–539.
  12. Cachin C. 2004. An information-theoretic model for steganography, Information and Computation, 192(1): 41–56. [CrossRef]
  13. Wang, S.Z., Zhang, X.P. & Zhang, W.M. 2009. Research progress of the steganalysis with digital images as carriers, Chinese Journal of Computers, 32(7): 1247–1263 [CrossRef]
  14. Luo, X.Y., Wang, D.S. & Wang, P. 2008. A review on blind detection for image steganography, Signal Processing, 88(9): 2138–2157. [CrossRef]
  15. Sullivan K, Madhow U. & Chandrasekaran S, et al. 2006. Steganalysis for Markov cover data with applications to images, IEEE Transaction on Information Forensics and Security, 1(2): 275–287. [CrossRef]
  16. Cox I J, Kilian J, Leighton T, et al. 1997. Secure spread spectrum watermarking for multimedia, IEEE Transaction on Image Processing, 6(12): 1673–1687. [CrossRef]
  17. Marvel L M, Boncelet C G. & Retter C T. 1999. Spread spectrum image steganography, IEEE Transaction on Image Processing, 8(8): 1075–1073. [CrossRef]
  18. Fridrich J. & Goljan M. 2003. Digital image steganography using tochastic modulation, in Proceedings of SPIE: Security, Steganograhy, and Watemarking of Multimedia Contents V, SPIE: Santa Clara, Cuba, 121(2): 191–202.
  19. Zhang, Z. 2010. Research on High-order Statistical Secure Steganography Algorithm, a thesis of the Doctor’s degree. Nanjing: Nanjing University of Science and Technology.
  20. Schaefer G. & Stich M. 2004. UCID-An Uncompressed Colour Image Database.
  21. Zhang, Z., Liu, G.J., Wang, J.W., Dai, Y.W. & Wang, Z.Q. 2010. Spread spectrum steganalysis based on the image high-order MARKOV chain model, Chinese Journal of Electronics, 38(11): 2578–2585

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.