Citation: | LUO Junwei, YU Mujian, YIN Xiaolin, et al., “Binary Image Steganalysis Based on Symmetrical Local Residual Patterns,” Chinese Journal of Electronics, vol. 31, no. 4, pp. 752-763, 2022, doi: 10.1049/cje.2020.00.414 |
[1] |
Z. Gao, D. Wei, G. Tang, et al., “Fast matrix embedding based on random linear code,” Acta Electronica Sinica, vol.45, no.5, pp.1139–1149, 2017. (in Chinese)
|
[2] |
D. Huang, J. Zhang, R. Zhang, et al., “New system of multi-modal information hiding based on big data environment,” Acta Electronica Sinica, vol.45, no.2, pp.477–484, 2017. (in Chinese)
|
[3] |
L. Chen, W. Bai, and Z. Yao, “A secure and privacy-preserving watermark based medical image sharing method,” Chinese Journal of Electronics, vol.29, no.5, pp.819–825, 2020. doi: 10.1049/cje.2020.07.003
|
[4] |
Z. Yue, Z. Li, Y. Yang, et al., “A histogram-based 2Bin m-ary image digital watermarking algorithm,” Acta Electronica Sinica, vol.48, no.3, pp.531–537, 2020. (in Chinese)
|
[5] |
W. Zhang, J. Chen, and Y. HU, “Resynchronization based high capacity robust image watermarking algorithm,” Acta Electronica Sinica, vol.47, no.4, pp.862–870, 2019. (in Chinese)
|
[6] |
S. Wang, C. Cui, and X. Niu, “A novel dibr 3D image watermarking algorithm resist to geometrical attacks,” Chinese Journal of Electronics, vol.26, no.6, pp.1184–1193, 2017. doi: 10.1049/cje.2017.09.025
|
[7] |
X. Tang, Z. Ma, X. Niu, et al., “Robust audio watermarking algorithm based on empirical mode decomposition,” Chinese Journal of Electronics, vol.25, no.6, pp.1005–1010, 2016. doi: 10.1049/cje.2016.06.007
|
[8] |
J. Wang, G. Li, G. Xia, et al., “A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space,” Acta Electronica Sinica, vol.48, no.1, pp.92–100, 2020. (in Chinese)
|
[9] |
J. Wang, Z. Sun, and G. Li, “High capacity reversible data hiding algorithm based on parabolic interpolation space,” Acta Electronica Sinica, vol.47, no.1, pp.137–144, 2019. (in Chinese)
|
[10] |
J. Xu, W. Zhang, R. Jiang, et al., “Minimum structural similarity distortion for reversible data hiding,” Chinese Journal of Electronics, vol.27, no.3, pp.582–587, 2018. doi: 10.1049/cje.2018.03.012
|
[11] |
Y. Huang, J. Kuo, and W. HSIEH, “Capacity controllable location map free reversible watermarking,” Chinese Journal of Electronics, vol.24, no.3, pp.518–523, 2015.
|
[12] |
F. Chen, L. Qu, C. Yuan, et al., “Ordered equivalence division based cryptanalysis of redundant-space-transfer image encryption,” Acta Electronica Sinica, vol.49, no.4, pp.665–671, 2021. (in Chinese)
|
[13] |
W. Lu, J. Chen, J. Zhang, et al., “Secure halftone image steganography based on feature space and layer embedding,” IEEE Transactions on Cybernetics, in print, DOI: 10.1109/TCYB.2020.3026047, 2020.
|
[14] |
J. Zhang, W. Lu, X. Yin, et al., “Binary image steganography based on joint distortion measurement,” Journal of Visual Communication and Image Representation, vol.58, pp.600–605, 2019. doi: 10.1016/j.jvcir.2018.12.038
|
[15] |
W. Lu, J. Zhang, X. Zhao, et al., “Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding,” IEEE Transactions on Circuits and Systems for Video Technology, vol.31, no.7, pp.2909–2922, 2021. doi: 10.1109/TCSVT.2020.3027843
|
[16] |
Y. Zhang, M. Zhang, K. Niu, et al., “Video steganography algorithm based on trailing coefficients,” 2015 International Conference on Intelligent Networking and Collaborative Systems, Taipei, China, pp.360–364, 2015.
|
[17] |
H. Tian, S. GUO, J. Qin, et al., “Adaptive voice-over-IP steganography based on quantitative performance ranking,” Acta Electronica Sinica, vol.44, no.11, pp.2735–2741, 2016. (in Chinese)
|
[18] |
Z. Wu, H. Cao, and D. Li, “An approach of steganography in G.729 bitstream based on matrix coding and interleaving,” Chinese Journal of Electronics, vol.24, no.1, pp.157–165, 2015. doi: 10.1049/cje.2015.01.026
|
[19] |
J. Fridrich and J. Kodovsky, “Rich models for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol.7, no.3, pp.868–882, 2012. doi: 10.1109/TIFS.2012.2190402
|
[20] |
W. Yang, S. Tang, M. Li, et al., “Steganalysis of low embedding rates LSB speech based on histogram moments in frequency domain,” Chinese Journal of Electronics, vol.26, no.6, pp.1254–1260, 2017. doi: 10.1049/cje.2017.09.026
|
[21] |
H. Ding, Z. Li, Y. Yang, et al., “High quality data hiding in halftone image based on block conjugate,” Chinese Journal of Electronics, vol.27, no.1, pp.150–158, 2018. doi: 10.1049/cje.2017.10.004
|
[22] |
X. Shi, S. Ma, Y. Hu, et al., “A pixel block-based adaptive steganographic algorithm with embedding priority given to image textures,” Acta Electronica Sinica, vol.43, no.6, pp.1094–1100, 2015. (in Chinese)
|
[23] |
J. Wen, J. Zhang, J. Zhou, et al., “An adaptive JPEG steganographic scheme based on run-length statistical complexity,” Chinese Journal of Electronics, vol.27, no.1, pp.52–59, 2018. doi: 10.1049/cje.2017.11.012
|
[24] |
H. Cao and A.C. Kot, “On establishing edge adaptive grid for bilevel image data hiding,” IEEE Transactions on Information Forensics and Security, vol.8, no.9, pp.1508–1518, 2013. doi: 10.1109/TIFS.2013.2274041
|
[25] |
B. Feng, W. Lu, and W. Sun, “Secure binary image steganography based on minimizing the distortion on the texture,” IEEE Transactions on Information Forensics and Security, vol.10, no.2, pp.243–255, 2015. doi: 10.1109/TIFS.2014.2368364
|
[26] |
W. Lu, L. He, Y. Yeung, et al., “Secure binary image steganography based on fused distortion measurement,” IEEE Trans. Circuits Syst. Video Technol., vol.29, no.6, pp.1608–1618, 2019. doi: 10.1109/TCSVT.2018.2852702
|
[27] |
Y. Yeung, W. Lu, Y. Xue, et al., “Secure binary image steganography with distortion measurement based on prediction,” IEEE Transactions on Circuits and Systems for Video Technology, vol.30, no.5, pp.1423–1434, 2020. doi: 10.1109/TCSVT.2019.2903432
|
[28] |
L. Zeng, W. Lu, W. Liu, et al., “Deep residual network for halftone image steganalysis with stego-signal diffusion,” Signal Processing, vol.172, article no.107576, 2020.
|
[29] |
M. Boroumand, M. Chen, and J. Fridrich, “Deep residual network for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol.14, no.5, pp.1181–1193, 2019. doi: 10.1109/TIFS.2018.2871749
|
[30] |
T. Pevný, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on Information Forensics and Security, vol.5, no.2, pp.215–224, 2010. doi: 10.1109/TIFS.2010.2045842
|
[31] |
C.-C. Chang and C.-J. Lin, “Libsvm: A library for support vector machines,” ACM Transactions on Intelligent Systems and Technology, vol.2, no.3, article no.27, 2011.
|
[32] |
J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Transactions on Information Forensics and Security, vol.7, no.2, pp.432–444, 2011.
|
[33] |
B. Feng, W. Lu, and W. Sun, “Binary image steganalysis based on pixel mesh markov transition matrix,” Journal of Visual Communication and Image Representation, vol.26, pp.284–295, 2015. doi: 10.1016/j.jvcir.2014.10.003
|
[34] |
J. Chen, W. Lu, Y. Fang, et al., “Binary image steganalysis based on local texture pattern,” Journal of Visual Communication and Image Representation, vol.55, pp.149–156, 2018. doi: 10.1016/j.jvcir.2018.06.004
|
[35] |
R. Li, L. Zeng, W. Lu, et al., “Binary image steganalysis based on local residual patterns,” International Conference on Security with Intelligent Computing and Big-data Services, Guilin, China, pp.904–913, 2020.
|
[36] |
W. Lu, R. Li, L. Zeng, et al., “Binary image steganalysis based on histogram of structuring elements,” IEEE Trans. on Circuits and Systems for Video Technology, vol.30, no.9, pp.3081–3094, 2020. doi: 10.1109/TCSVT.2019.2936028
|
[37] |
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification, 2nd ed., Wiley-Interscience, pp.96−99, 2000.
|
[38] |
H. Yang and A.C. Kot, “Pattern-based data hiding for binary image authentication by connectivity-preserving,” IEEE Transactions on Multimedia, vol.9, no.3, pp.475–486, 2007. doi: 10.1109/TMM.2006.887990
|
[39] |
M. Wu and B. Liu, “Data hiding in binary image for authentication and annotation,” IEEE Transactions on Multimedia, vol.6, no.4, pp.528–538, 2004. doi: 10.1109/TMM.2004.830814
|
[40] |
H. Yang, A.C. Kot, and S. Rahardja, “Orthogonal data embedding for binary images in morphological transform domain- a high-capacity approach,” IEEE Transactions on Multimedia, vol.10, no.3, pp.339–351, 2008. doi: 10.1109/TMM.2008.917404
|
[41] |
B. Feng, J. Weng, W. Lu, et al., “Steganalysis of content-adaptive binary image data hiding,” Journal of Visual Communication and Image Representation, vol.46, pp.119–127, 2017. doi: 10.1016/j.jvcir.2017.01.008
|