Search

Your search keyword '"Jpeg steganography"' showing total 70 results

Search Constraints

Start Over You searched for: Descriptor "Jpeg steganography" Remove constraint Descriptor: "Jpeg steganography"
70 results on '"Jpeg steganography"'

Search Results

1. Errorless robust JPEG steganography using steganographic polar codes

2. Errorless robust JPEG steganography using steganographic polar codes.

3. An efficient steganography scheme based on wavelet transformation for side-information estimation

4. Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography.

5. An Improved Approach to Blind Image Steganalysis Using an Overlapping Blocks Idea.

6. Steganalysis of Content-Adaptive JPEG Steganography Based on Ensemble of Convolutional Neural Networks with Image Preprocessing Using Gabor Filters

7. A Novel Upgraded Uniform Embedding Technique for JPEG Steganography

9. Quantized Gaussian JPEG Steganography and Pool Steganalysis

10. Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain.

11. Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.

12. Improving the Robustness of JPEG Steganography With Robustness Cost.

13. Modification in spatial, extraction from transform: Keyless side-information steganography for JPEG.

14. An efficient steganography scheme based on wavelet transformation for side-information estimation.

15. A Multiple-Format Steganography Algorithm for Color Images

16. Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding.

17. Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents.

18. Dual-domain joint optimization for universal JPEG steganography.

19. Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysis

20. Improved Uniform Embedding for Efficient JPEG Steganography

21. Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge

22. An Attempt to Generalize Distortion Measure for JPEG Steganography

23. A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy.

24. Distortion function based on residual blocks for JPEG steganography.

25. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy.

26. Blind JPEG steganalysis based on DCT coefficients differences.

27. 2D Gabor filters-based steganalysis of content-adaptive JPEG steganography.

28. Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection.

29. Shortening the Cover for Fast JPEG Steganography

30. A Multiple-Format Steganography Algorithm for Color Images

31. Steganalysis of JPEG images by block texture based segmentation.

32. A steganography framework for easy secret sharing through images.

33. A Cognitive Ensemble of Extreme Learning Machines for Steganalysis Based on Risk-Sensitive Hinge Loss Function.

34. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy

35. Quantitative Structural Steganalysis of Jsteg.

36. High-performance JPEG steganography using complementary embedding strategy

37. Comparison of Image Formats to Apply Image Steganography in Smartphones: A Preliminary Study

38. New design paradigm of distortion cost function for efficient JPEG steganography.

39. 2D Gabor filters-based steganalysis of content-adaptive JPEG steganography

40. Improving side-informed JPEG steganography using two-dimensional decomposition embedding method

41. Enhancing JPEG Steganography using Iterative Adversarial Examples

42. Steganalysis of Content-Adaptive JPEG Steganography Based on CNN and 2D Gabor Filters

43. Steganalysis of Adaptive JPEG Steganography Based on ResDet

44. Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms

45. New Distortion Metric for Efficient JPEG Steganography Using Linear Prediction

46. Anti-compression JPEG steganography over repetitive compression networks.

47. Spatial-Spectral Watermarking Scheme for Jpeg Steganography

48. New Channel Selection Rule for JPEG Steganography

49. Image-based jpeg steganography

50. Secure steganography based on binary particle swarm optimization

Catalog

Books, media, physical & digital resources