Citation: Fengyong Li, Jiang Yu, Yanli Ren. Data-Loss resilience video steganography using frame reference and data ensemble reconstruction[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4559-4580. doi: 10.3934/mbe.2019228
[1] | J. Mielikainen, LSB matching revisited, IEEE. SPL., 13(2006), 285–287. |
[2] | F. Li, X. Zhang, J. Yu, et al., Adaptive JPEG steganography with new distortion function, Ann. Telecommun., 69(2014), 431–440. |
[3] | V. Holub, J. Fridrich and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP JIS., Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, (2014), 2014:1. |
[4] | T. Pevný, T. Filler and P. Bas, Using high-dimensional image models to perform highly unde- tectable steganography, Proc. IH2010, Calgary, AB, Canada, June 28–30, 6387(2010), 161–177. |
[5] | F. Li, X. Zhang, H. Cheng, et al., Digital image steganalysis based on local textural features and double dimensionality reduction, SCN, 9(2016), 729–736. |
[6] | B. Chen, G. Feng, X. Zhang, et al., Mixing high-dimensional features for JPEG steganalysis with ensemble classifier, SIVP, 8(2014), 1475–1482. |
[7] | X. Song, F. Liu, C. Yang, et al., Steganalysis of adaptive JPEG steganography using 2D Gabor filters, Proc. IH&MMSec2015 , Portland, OR, USA, June 17-19, (2015), 15–23. |
[8] | F. Li, X. Zhang, B. Chen, et al., JPEG steganalysis with high- dimensional features and Bayesian ensemble classifier, IEEE SPL, 20(2013), 233–236. |
[9] | Z. Zhao, Q. Guan, X. Zhao, et al., Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain, MTAP, 77(2018), 14093–14113. |
[10] | R. Cogranne, V. Sedighi and J. Fridrich, Practical strategies for content-adaptive batch steganogra- phy and pooled steganalysis, Proc. ICASSP2017, New Orleans, USA, March 5–9, (2017), 2122– 2126. |
[11] | F. Li, K. Wu, X. Zhang, et al., Robust batch steganography in social networks with non-uniform payload and data decomposition, IEEE Access, 6(2018), 29912–29925. |
[12] | E. Franz, Embedding considering dependencies between pixels, Proc. SPIE, Electron. Imag., Se-cur., Forens., Steg., and Watermark. of Multimedia Contents X, 6819(2008), D 1–12. |
[13] | T. Denemark and J. Fridrich, Steganography with multiple JPEG images of the same scene, IEEE TIFS, 12(2017), 2308–2319. |
[14] | P. Chang, K. Chung, J. Chen, et al., A DCT/DST-based error propagation-free data hiding algo-rithm for HEVC intra-coded frames, JVCIR, 25(2014), 239–253. |
[15] | Y. Liu, Z. Li, X. Ma, et al., A robust data hiding algorithm for H.264/AVC video streams. J. Sys. Sof., 86(2013), 2174–2183. |
[16] | R. Mstafa, K. Elleithy and E. Abdelfattah, A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC, IEEE Access, 5(2017), 5354–5367. |
[17] | H. Aly, Data hiding in motion vectors of compressed video based on their associated prediction error, IEEE TIFS, 6(2011), 14–18. |
[18] | H. Zhang, Y. Cao and X. Zhao, Motion vector-based video steganography with preserved local optimality, MTAP, 75(2016), 13503–13519. |
[19] | H. Zhang, Y. Cao, X. Zhao, et al., Video steganography with perturbed macroblock partition, Proc. IH&MMSec2014, Salzburg, Austria, Jun. 11–13, (2014), 115–122. |
[20] | I. Cox, J. Kilian, F. Leighton, et al., Secure spread spectrum watermarking for multimedia, IEEE TIP, 6(1997), 1673–1687. |
[21] | V. Neagoe, Inversion of the Van der Monde matrix, IEEE SPL, 3(1996), 119–120. |
[22] | YUV Video Sequences, Available from: http://trace.eas.asu.edu/yuv/index.html, [Accessed on 2018]. |
[23] | J. Kodovský, J. Fridrich and V. Holub, Ensemble classifier for steganalysis of digital media, IEEE TIFS, 7(2012), 432–444. |
[24] | M. Dalal and M. Juneja, A robust and imperceptible steganography technique for SD and HD videos, MTAP, 2018, to appear. https://doi.org/10.1007/s11042-018-6093-3. |
[25] | A. Ker and T. Pevný, A new paradigm for steganalysis via clustering, Proc. SPIE, Media Water-mark., Secur., Forens. III, 7880(2011), 78800U. |
[26] | A. Ker and T. Pevný, The steganographer is the outlier: realistic large-scale steganalysis, IEEE TIFS, 9(2014), 1424–1435. |
[27] | F. Li, K. Wu, J. Lei, et al., Steganalysis over large-scale social networks with high-order joint features and clustering ensembles, IEEE TIFS, 11(2016), 344–357. |