[Chen:2020:audio_derivative]
K. Chen et al. “Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio”. En: IEEE Transactions on Circuits and Systems for Video Technology 30.7 (2020), págs. 2027-2032. doi: 10.1109/TCSVT.2019.2918511.
[Dumitrescu:2003:spa]
S. Dumitrescu, X. Wu y Z. Wang. “Detection of LSB stegano- graphy via sample pair analysis”. En: IEEE Transactions on Signal Processing 51.7 (2003), págs. 1995-2007. doi: 10.1109/ TSP.2003.812753.
[Fillatre:2012:structural]
L. Fillatre. “Adaptive Steganalysis of Least Significant Bit Re- placement in Grayscale Natural Images”. En: IEEE Transactions on Signal Processing 60.2 (2012), págs. 556-569. doi: 10.1109/ TSP.2011.2174231.
[Filler:2011:stc]
T. Filler, J. Judas y J. Fridrich. “Minimizing Additive Distor- tion in Steganography Using Syndrome-Trellis Codes”. En: IEEE Transactions on Information Forensics and Security 6.3 (2011), págs. 920-935. doi: 10.1109/TIFS.2011.2134094.
[Fridrich:2005:wpc]
J. Fridrich et al. “Writing on wet paper”. En: IEEE Transactions on Signal Processing 53.10 (2005), págs. 3923-3935. doi: 10 . 1109/TSP.2005.855393.
[Fridrich:2001:rs]
J. Fridrich, M. Goljan y R. Du. “Reliable detection of LSB ste- ganography in color and grayscale images”. En: Proceedings of the 2001 Workshop on Multimedia and Security: New Challen- ges. MM&Sec ’01. Ottawa, Ontario, Canada: Association for Computing Machinery, 2001, págs. 27-30. isbn: 1581133936. doi: 10.1145/1232454.1232466.
[Fridrich:2007:nsF5]
J. Fridrich, T. Pevný y J. Kodovský. “Statistically Undetecta- ble JPEG Steganography: Dead Ends Challenges, and Oppor- tunities”. En: Proceedings of the 9th Workshop on Multimedia & Security. MM&Sec ’07. Dallas, Texas, USA: Association for Computing Machinery, 2007, págs. 3-14. isbn: 9781595938572.
[Holub:2014:uniward]
V. Holub, J. J. Fridrich y T. Denemark. “Universal distortion function for steganography in an arbitrary domain”. En: EURA- SIP Journal on Information Security 2014.1 (2014), págs. 1-13.
[Ker:2005:structural]
A. D. Ker. “A General Framework for Structural Steganalysis of LSB Replacement”. En: Proceedings of the 7th Internatio- nal Conference on Information Hiding. IH’05. Barcelona, Spain: Springer-Verlag, 2005, págs. 296-311. isbn: 3540290397. doi: 10. 1007/11558859_22.
[Ker:2008:structural]
A. D. Ker y R. Böhme. “Revisiting Weighted Stego-Image Ste- ganalysis”. En: Security, Forensics, Steganography, and Water- marking of Multimedia Contents X. Ed. por E. J. Delp III et al. Vol. 6819. International Society for Optics y Photonics. SPIE, 2008, págs. 56-72. url: https://doi.org/10.1117/12. 766820.
[Li:2014:hill]
B. Li et al. “A New Cost Function for Spatial Image Stega- nography”. En: 2014 IEEE International Conference on Image Processing (ICIP). Paris, France: IEEE, oct. de 2014, págs. 4206-4210.
[Westfeld:2001:F5]
A. Westfeld. “F5—A Steganographic Algorithm”. En: Informa- tion Hiding. Ed. por I. S. Moskowitz. Berlin, Heidelberg: Sprin- ger Berlin Heidelberg, 2001, págs. 289-302. BIBLIOGRAFÍA 215
[Westfeld:2000]
A. Westfeld y A. Pfitzmann. “Attacks on Steganographic Sys- tems”. En: Information Hiding. Ed. por A. Pfitzmann. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000, págs. 61-76. isbn: 978-3-540-46514-0.
Actualmente no hay comentarios en este artículo.
Añade un comentario