CISUC

An improved approach to steganalysis of JPEG images

Authors



Related Project

CACTUS: Computational Analysis of CT against US

Journal

Information Sciences Volume 180, Issue 9, pp. 1643-1655, May 2010

Cited by

Year 2013 : 3 citations

 Steganography content detection by means of feedforward neural network
ZK Oplatková, J Hološka, R Šenke?ík - International Journal of …, 2013 - Inderscience

 Blind Steganalysis with Modified Markov Features and RBFNN
RL Priya, P Eswaran, SLP Kamakshi - International Journal of Engineering, 2013 - ijert.org

 Multi-class JPEG Steganalysis using Extreme Learning Machine
V Bhasin, P Bedi - Advances in Computing, Communications …, 2013 - ieeexplore.ieee.org

Year 2012 : 10 citations

 Steganalysis of JPEG images using rich models
J Kodovský, J Fridrich - IS&T/SPIE …, 2012 - proceedings.spiedigitallibrary.org

 An intelligent chaotic embedding approach to enhance stego-image quality
R Amirtharajan, JB Balaguru Rayappan - Information Sciences, 2012 - Elsevier

 Improved contourlet-based steganalysis using binary particle swarm optimization and radial basis neural networks
M Sheikhan, M Pezhmanpour, MS Moin - Neural Computing and …, 2012 - Springer

 Steganalysis of Digital Images Using Rich Image Representations and Ensemble Classifiers
J Kodovský - 2012 - dde.binghamton.edu

 Identification of smartphone-image source and manipulation
Q Liu, X Li, L Chen, H Cho, PA Cooper, Z Chen… - Advanced Research in …, 2012 - Springer

 Novel robust image watermarking based on subsampling and DWT
W Lu, W Sun, H Lu - Multimedia Tools and Applications, 2012 - Springer

 MP3 audio steganalysis
M Qiao, AH Sung, Q Liu - Information Sciences, 2012 - Elsevier

 Steganography: Dct Coefficient Replacement Method and Compare With Jsteg Algorithm
H Sheisi, J Mesgarian, M Rahmani - International Journal of Computer …, 2012 - ijcee.org

 Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
Q Liu, X Li, PA Cooper, X Hu - … of the Twelfth International Workshop on …, 2012 - dl.acm.org

 Efficient steganalysis of images: learning is good for anticipation
D Ziou, R Jafari - Pattern Analysis and Applications, 2012 - Springer

Year 2011 : 12 citations

 Neighboring joint density-based JPEG steganalysis
Q Liu, AH Sung, M Qiao - ACM Transactions on Intelligent Systems and …, 2011 - dl.acm.org

 Covered CDMA multi-user writing on spatially divided image
R Amirtharajan, JBB Rayappan - … , Information Theory and …, 2011 - ieeexplore.ieee.org

 Tabu search based multi-watermarks embedding algorithm with multiple description coding
HC Huang, SC Chu, JS Pan, CY Huang, BY Liao - Information Sciences, 2011 - Elsevier

 Applying electromagnetism-like mechanism for feature selection
CT Su, HC Lin - Information Sciences, 2011 - Elsevier

 Derivative-based audio steganalysis.
Q Liu, AH Sung, M Qiao - TOMCCAP, 2011 - shsu.edu

 Gene selection and classification for cancer microarray data based on machine learning and similarity measures
Q Liu, A Sung, Z Chen, J Liu, L Chen, M Qiao… - BMC …, 2011 - biomedcentral.com

 Blind steganalysis with high generalization capability for different image databases using L-GEM
WWY Ng, ZM He, PPK Chan… - Machine Learning and …, 2011 - ieeexplore.ieee.org

 Steganalysis of Internet data, a feasibility study
I Gholampour, H Khalilian… - … Systems (CNDS), 2011 …, 2011 - ieeexplore.ieee.org

 A JPEG-based statistically invisible steganography
Q Liu, AH Sung, Z Chen, X Huang - Proceedings of the Third …, 2011 - dl.acm.org

 Feature Mining and Pattern Recognition in Multimedia Forensics—Detection of JPEG Image Based Steganography, Double-Compression, Interpolation and WAV …
Q Liu, AH Sung, M Qiao, B Ribeiro, Z Chen - … , Machine Intelligence and …, 2011 - Springer

 Convergence between fuzzy logic and steganography for high payload data embedding and more security
MH Goodarzi, A Zaeim… - … Systems, Services, and …, 2011 - ieeexplore.ieee.org

 Renkli ?mgelerde Gizlenen Verilerin Görsel Ataklara Kar?? Dayan?kl?l???n?n Tespiti ?çin Bir Steganografi Uygulamas?
TT? Do?an, E Avc? - firat.edu.tr

Year 2010 : 6 citations

 Revealing real quality of double compressed MP3 audio
M Qiao, AH Sung, Q Liu - Proceedings of the international conference on …, 2010 - dl.acm.org

 Detection of double MP3 compression
Q Liu, AH Sung, M Qiao - Cognitive Computation, 2010 - Springer

 Predicting embedding strength in audio steganography
M Qiao, AH Sung, Q Liu - Cognitive Informatics (ICCI), 2010 9th …, 2010 - ieeexplore.ieee.org

 A novel source MPEG-2 video identification algorithm
Y Su, J Xu, B Dong, J Zhang, Q Liu - International Journal of Pattern …, 2010 - World Scientific

 Improved Approaches to Steganalysis and Seam-carved Forgery Detection in JPEG Images
Q LIU, Z CHEN - 2010 - tist.acm.org

 Computational Intelligence: Neural Networks and Kernel Methods
BM Ribeiro - 2010 - estudogeral.sib.uc.pt