Artificial neural network for steganography
暂无分享,去创建一个
[1] S. Abdul-Kareem,et al. RETRACTED ARTICLE: Static hand gesture recognition using neural networks , 2014, Artificial Intelligence Review.
[2] Alaa H. Alhamami,et al. Attack and construction of simulator for some cipher systems using neuro-Identifier , 2010, Int. Arab J. Inf. Technol..
[3] Sameem Abdul Kareem,et al. Gesture Feature Extraction for Static Gesture Recognition , 2013 .
[4] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[5] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[6] Abdolreza Moghadassi,et al. A New Approach Based on Artificial Neural Networks for Prediction of High Pressure Vapor-liquid Equilibrium , 2009 .
[7] Andrzej Dzielinski,et al. Neural Approximation: A Control Perspective , 1995 .
[8] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[9] J. Tanomaru,et al. Comparative study of two neural network approaches for nonlinear identification , 1994, Proceedings of ICSIPNN '94. International Conference on Speech, Image Processing and Neural Networks.
[10] G.R.S. Murthy,et al. Hand gesture recognition using neural networks , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).
[11] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[12] Sameem Abdul Kareem,et al. RETRACTED ARTICLE: Feature extraction and ML techniques for static gesture recognition , 2013, Neural Computing and Applications.
[13] Haitham Hasan,et al. RETRACTED ARTICLE: Human–computer interaction using vision-based hand gesture recognition systems: a survey , 2013, Neural Computing and Applications.
[14] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[15] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.
[16] Alfred Menezes,et al. Contemporary cryptology—The science of information integrity , 1994 .
[17] Thomas Baignères,et al. Quantitative security of block ciphers - designs and cryptanalysis tools , 2008 .
[18] Haitham Sabah Badi,et al. Hand posture and gesture recognition technology , 2014, Neural Computing and Applications.
[19] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[20] Jennifer Seberry,et al. Cryptography - an introduction to computer security , 1991, Advances in computer science series.
[21] Sameem Abdul Kareem,et al. Fingerprint image enhancement and recognition algorithms: a survey , 2012, Neural Computing and Applications.
[22] Benjamín Barán,et al. Steganographic watermarking for documents , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[23] S. Abdul-Kareem,et al. Static hand gesture recognition using neural networks , 2012 .
[24] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[25] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[26] V. P. Lane. Security of computer based information systems , 1985 .
[27] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[28] D. Signorini,et al. Neural networks , 1995, The Lancet.