References
- Z. Wang, X. Zhang, and Z. Yin, “Joint cover-selection and payload-allocation by steganographic distortion optimiza- tion,” IEEE Signal Process Lett., Vol. 25, no. 10, pp. 1530–1534, Oct. 2018. doi: 10.1109/LSP.2018.2865888
- S. Li, and X. Zhang, “Towards construction based data hiding: from Secrets to fingerprint images,” IEEE Trans. Image Processing, Vol. 28, no. 3, pp. 1482–1497, Mar. 2019. doi: 10.1109/TIP.2018.2878290
- F. Li, K. Wu, J. Lei, M. Wen, Z. Bi, and C. Gu, “Steganalysis over large-scale social networks with high-order joint features and clustering ensembles,” IEEE Trans Inform. Forensics Secur., Vol. 11, no. 2, pp. 344–357, Feb. 2016. doi: 10.1109/TIFS.2015.2496910
- T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Trans. Inform Forensics Secur, Vol. 6, no. 3, pp. 920–935, Sept. 2011. doi: 10.1109/TIFS.2011.2134094
- Z. Wang, X. Zhang, and Z. Yin, “Hybrid distortion function for JPEG steganography,” J. Electron. Imaging, Vol. 25, no. 5, pp. 050501, Sept. 2016. doi: 10.1117/1.JEI.25.5.050501
- Z. Wang, Z. Qian, X. Zhang, M. Yang, and D. Ye, “On improving distortion functions for JPEG steganography,” IEEE. Access., Vol. 6, no. 1, pp. 74917–74930, Dec. 2018. doi: 10.1109/ACCESS.2018.2884198
- F. Li, X. Zhang, B. Chen, and G. Feng, “JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier,” IEEE Signal Process Lett., Vol. 20, no. 3, pp. 233–236, Mar. 2013. doi: 10.1109/LSP.2013.2240385
- J. Fridrich, and J. Kodovsky, “Rich models for steganalysis of digital Images,” IEEE Trans. Inform. Forensics Secur., Vol. 7, no. 3, pp. 868–882, June 2012. doi: 10.1109/TIFS.2012.2190402
- B. Li, Z. Li, S. Zhou, S. Tan, and X. Zhang, “New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator,” IEEE Trans. Inform. Forensics Secur., Vol. 13, no. 5, pp. 1242–1257, May, 2018. doi: 10.1109/TIFS.2017.2780805
- J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Trans. Inform. Forensics Secur., Vol. 7, no. 2, pp. 432–444, April 2012. doi: 10.1109/TIFS.2011.2175919
- J. Ye, J. Ni, and Y. Yi, “Deep learning hierarchical representations for image steganalysis,” IEEE Trans. IEEE Trans. Inform. Forensics Secur., Vol. 12, no. 11, pp. 2545–2557, Nov. 2017. doi: 10.1109/TIFS.2017.2710946
- J. Zeng, S. Tan, B. Li, and J. Huang, “Large-scale JPEG image steganalysis using hybrid deep-learning framework,” IEEE Trans. Inform. Forensics Secur., Vol. 13, no. 5, pp. 1200–1214, May 2018. doi: 10.1109/TIFS.2017.2779446
- J. Tao, S. Li, X. Zhang, and Z. Wang, “Towards robust image steganography,” IEEE Trans. Circuits Syst Video Technol., Vol. 29, no. 2, pp. 594–600, Feb. 2019. doi: 10.1109/TCSVT.2018.2881118
- N. Pantic, and M. Husain. “Covert botnet command and control using twitter,” in Proc. 31st Annual Computer Security Applications Conference (ACSAC 2015), Los Angeles, CA, USA, Dec. 2015, pp. 171–180.
- S. Li, A. Ho, Z. Wang, and X. Zhang. “Lost in the digital wild: hiding information in digital activities,” in Proc. 2nd International Workshop on Multimedia Privacy and Security (MPS 2018), Toronto, Oct. 2018, pp. 27–37.
- X. Zhang, “Behavior steganography in social network,” in Proc. the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, Nov. 2016, pp. 21–23.
- J. Fridrich, and T. Filler. “Practical methods for minimizing embedding impact in steganography,” in Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, Feb. 2007, pp. 2–3.
- [Online]. Available: https://github.com/Chion82/WeChatMomentStat-Android