References
- J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble Classifiers for Steganalysis of Digital Media," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 432-444, 2012. https://doi.org/10.1109/TIFS.2011.2175919
- V. Holub and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1996−2006, Dec. 2013.
- P. Bas, T. Filler, and T. Pevny, "Break our steganographic system: The ins and outs of organizing BOSS," in Proc. of 13th Information Hiding conference, pp. 59-70, 2011.
- I. Lubenko and A. D. Ker, "Steganalysis with mismatched covers: Do simple classifiers help," in Proc. of 13th Workshop, Multimedia Security, pp. 11-18, 2012.
- M. Barni, G. Cancelli, and A. Esposito, "Forensics aided steganalysis of heterogeneous images," in Proc. of IEEE Int. Conf. Acoustic Speech and Signal Processing, pp. 1690-1693, 2010.
- S. Lyu and H. Farid, "Steganalysis using color wavelet statistics and one-class vector support machines," in Proc. of SPIE, Security, Steganography, Watermarking of Multimedia Contents VI, vol. 5306, Jun. 2004.
- T. Pevny and J. Fridrich, "Novelty detection in blind steganalysis," in Proc. of 10th Workshop, Multimedia Security, pp. 167-176, 2008.
- I. Lubenko and A. D. Ker, "Going from small to large data in steganalysis," in Proc. of IS&T/SPIE Electron. Image, vol. 8303, p. 83030M, Feb. 2012.
-
G. Cancelli, G. Doerr, I. Cox, and M. Barni, "A comparative study of
${\pm}1$ steganalyzers," in Proc. of IEEE Int. Workshop, Multimedia Signal Processing, pp. 791-796, 2008. - T. Pevny and J. Fridrich, "Multiclass detector of current steganographic methods for JPEG format," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 635-650, Dec. 2008.
- X. Hou, T. Zhang, and G. Xiong et al., "Forensics aided steganalysis of heterogeneous bitmap images with different compression history," Ksii Transactions on Internet & Information Systems, vol. 6, no. 8, pp. 1926-1945, Aug. 2012. https://doi.org/10.3837/tiis.2012.08.003
- X. Hou, T. Zhang, and G. Xiong et al., "A novel steganalysis framework of heterogeneous images based on GMM clustering," Signal Process: Image Communication, vol. 29, no. 3, pp. 385-399, Mar. 2014. https://doi.org/10.1016/j.image.2014.01.006
- S. Cho, M. Gawecki, and C. Kuo, "Content-dependent feature selection for block-based image steganalysis," in Proc. of IEEE Int. Symposium on Circuits and Systems, pp. 1416-1419, 2012.
- S. Cho, B. Cha, and M. Gawecki et al., "Block-based image steganalysis: Algorithm and performance evaluation," Journal of Visual Communication & Image Representation, vol. 24, no. 7, pp. 846-856, Oct. 2013. https://doi.org/10.1016/j.jvcir.2013.05.007
- X. Li, X. Kong, B. Wang, Y. Guo, and X. You, "Generalized transfer component analysis for mismatched JPEG steganalysis," in Proc. of IEEE Int. Conf. Image Processing, pp. 4432-4436, 2013.
- A. D. Ker and T. Pevny, "A new paradigm for steganalysis via clustering," in Proc. of SPIE - The International Society for Optical Engineering, vol.7880, Feb. 2011.
- A. D. Ker and T. Pevny, "Identifying a steganographer in realistic and heterogeneous data sets," in Proc. of IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, vol. 8303, pp. N01-N13, May 2012.
- A. D. Ker and T. Pevny, "The steganographer is the outlier: Realistic large-scale steganalysis," IEEE Trans. Inf. Forensics Security, vol. 9, no.9, pp. 1424-1435, Sep. 2014. https://doi.org/10.1109/TIFS.2014.2336380
- W. Ng, Z. He, D. Yeung, and P. Chan, "Steganalysis classifier training via minimizing sensitivity for different imaging sources," Inform. Science, vol. 281, pp. 211-224, May. 2014. https://doi.org/10.1016/j.ins.2014.05.028
- J. Kodovsky, V. Sedighi and J. Fridrich, "Study of cover source mismatch in steganalysis and ways to mitigate its impact," in Proc. of SPIE, Media Watermark., Security, and Forensics, vol. 9028, p. 90280J, Feb. 2014.
- T. Pevny and A. D. Ker, "A mishmash of methods for mitigating the model mismatch mess," in Proc. of SPIE, Media Watermark., Security, and Forensics, vol. 9028, p. 90280I, Feb. 2014.
- Kharrazi, M., H. T. Sencar, and N. Memon. "Blind source camera identification," in Proc. of IEEE Int. Conf. Image Processing, pp. 709-712, 2004.
- Filler, T., J. Fridrich, and M. Goljan. "Using sensor pattern noise for camera model identification," in Proc. of IEEE Int. Conf. Image Processing, pp. 1296-1299, 2008.
- J. Lukas, J. Fridrich, and M. Goljan. "Determining digital image origin using sensor imperfections," in Proc. of SPIE, Image and Video Communications and Processing, vol. 5685, pp. 249-260, 2005.
- M. Goljan, Miroslav, J. Fridrich, and T. Filler. "Large scale test of sensor fingerprint camera identification," in Proc. of SPIE, Media Forensics and Security, vol. 7254, 2008.
- S. Gao, G. S. Xu, and R. M. Hu, "Camera model identification based on the characteristic of CFA and interpolation," in Proc. of International Conference on Digital-Forensics and Watermarking, vol. 7128, pp. 268-280. 2011.
- Magiera, P., Londahl, C.: ROF Denoising Algorithm (released 2008), http://www.mathworks.com/matlabcentral/fileexchange/22410-rof-denoising-algorithm/content/ ROFdenoise.m.
- Janssens, Jeroen H. M., I. Flesch, and E. O. Postma. "Outlier Detection with One-Class Classifiers from ML and KDD." in Proc. of International Conference on Machine Learning and Applications, pp. 147-153, 2009.
- M. M. Breunig, H. P. Kriegel, R. T. Ng, and J. Sander, "LOF: identifying density-based local outliers," in Proc. of ACM SIGMOD Int. Conf. Manage. Data, pp. 93-104, 2000.
- T. Gloe and R. Bohme, "The 'Dresden Image Database' for benchmarking digital image forensics," in Proc. of SAC, pp. 1584-1590. 2010.
- T. Pevny and J. Fridrich, "Merging Markov and DCT features for multi-class JPEG teganalysis," in Proc. of SPIE, Media Watermark., Security, Forensics IX, vol. 6505, pp. 3-14, Feb. 2007.
- K Yu, L Ji, X Zhang. "Kernel nearest-neighbor algorithm," Neural Processing Letters, pp. 147-156, 20002.
- S. Gao, "A Hybrid Approach for Camera-Model Detection," International Journal of Security and Its Applications, 2015, Vol. 9, no. 8.
- V. Holub, J. Fridrich and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP Journal on Information Security, pp. 1-13, 2014.
- L. Guo, J. Ni, and Y. Q. Shi, "An efficient JPEG steganographic scheme using uniform embedding," IEEE Transactions on Information Forensics and Security, vol.9, pp. 169-174, 2012.
- V. Holub and J. Fridrich, "Low Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, Vol. 10, no. 2, 2015.