共 50 条
- [2] Fighting the Reverse JPEG Compatibility Attack: Pick your Side PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 113 - 121
- [3] EXTENDING THE REVERSE JPEG COMPATIBILITY ATTACK TO DOUBLE COMPRESSED IMAGES 2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2710 - 2714
- [4] Reverse-engineering a detector with false alarms SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
- [5] A new approach to decreasing the false network attack alarms PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON MATHEMATICAL AND COMPUTATIONAL METHODS IN SCIENCE AND ENGINEERING (MACMESE '07)/ DNCOCO '07, 2007, : 366 - 371
- [6] Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice PROCEEDINGS OF THE 2023 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2023, 2023, : 67 - 79
- [7] ANALYSIS AND REDUCTION OF FALSE ALARMS AT LASA TRANSACTIONS-AMERICAN GEOPHYSICAL UNION, 1977, 58 (06): : 443 - 444
- [8] Understanding and mitigation of false alarms as measured in LWIR clutter by the AIRMS sensor SIGNAL AND DATA PROCESSING OF SMALL TARGETS 1996, 1996, 2759 : 62 - 76
- [9] Automatic JPEG Grid Detection with Controlled False Alarms, and Its Image Forensic Applications IEEE 1ST CONFERENCE ON MULTIMEDIA INFORMATION PROCESSING AND RETRIEVAL (MIPR 2018), 2018, : 378 - 383
- [10] SELECTION-CHANNEL-AWARE REVERSE JPEG COMPATIBILITY FOR HIGHLY RELIABLE STEGANALYSIS OF JPEG IMAGES 2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 2772 - 2776