Nature inspired metaheuristics for improved JPEG steganalysis
暂无分享,去创建一个
[1] Latika Singh,et al. An improved dynamic discrete firefly algorithm for blind image steganalysis , 2018, Int. J. Mach. Learn. Cybern..
[2] Hedieh Sajedi,et al. Image steganalysis using Artificial Bee Colony algorithm , 2017, J. Exp. Theor. Artif. Intell..
[3] J. Anita Christaline,et al. Bio-Inspired Computational Algorithms for Improved Image Steganalysis , 2016 .
[4] J. Anita Christaline,et al. Optimized JPEG Steganalysis , 2016, MUE 2016.
[5] R. Ramesh,et al. Critical review of image steganalysis techniques , 2015, Int. J. Adv. Intell. Paradigms.
[6] Seyed Mohammad Mirjalili,et al. The Ant Lion Optimizer , 2015, Adv. Eng. Softw..
[7] Rita Rana Chhikara,et al. An Improved Discrete Firefly and t-Test based Algorithm for Blind Image Steganalysis , 2015, 2015 6th International Conference on Intelligent Systems, Modelling and Simulation.
[8] Yongdong Zhang,et al. Efficient Parallel Framework for HEVC Motion Estimation on Many-Core Processors , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[9] Liang Li,et al. Efficient parallel HEVC intra-prediction on many-core processor , 2014 .
[10] Yongdong Zhang,et al. A Highly Parallel Framework for HEVC Coding Unit Partitioning Tree Decision on Many-core Processors , 2014, IEEE Signal Processing Letters.
[11] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[12] Ali Kaveh,et al. An improved ray optimization algorithm for design of truss structures , 2013 .
[13] A. Kaveh,et al. A new meta-heuristic method: Ray Optimization , 2012 .
[14] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[15] Ramin Rajabioun,et al. Cuckoo Optimization Algorithm , 2011, Appl. Soft Comput..
[16] Qingzhong Liu,et al. Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery , 2011, MiFor '11.
[17] Qingzhong Liu,et al. Steganalysis of DCT-embedding based adaptive steganography and YASS , 2011, MM&Sec '11.
[18] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[19] Jessica J. Fridrich,et al. Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.
[20] Xin-She Yang,et al. Engineering optimisation by cuckoo search , 2010, Int. J. Math. Model. Numer. Optimisation.
[21] Xin-She Yang,et al. Firefly algorithm, stochastic test functions and design optimisation , 2010, Int. J. Bio Inspired Comput..
[22] Yong Wang,et al. Blind JPEG Steganalysis Based on Correlations of DCT Cofficients in Multi-directions and Calibrations , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[23] E. Talbi,et al. Metaheuristics: From Design to Implementation , 2009 .
[24] Luca Maria Gambardella,et al. A survey on metaheuristics for stochastic combinatorial optimization , 2009, Natural Computing.
[25] Bin Li,et al. Universal JPEG steganalysis based on microscopic and macroscopic calibration , 2008, 2008 15th IEEE International Conference on Image Processing.
[26] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[27] Terry Windeatt,et al. Accuracy/Diversity and Ensemble MLP Classifier Design , 2006, IEEE Transactions on Neural Networks.
[28] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[29] Ludmila I. Kuncheva,et al. A Theoretical Study on Six Classifier Fusion Strategies , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[30] J. Anita Christaline,et al. STEGANALYSIS WITH CLASSIFIER COMBINATIONS , 2014 .
[31] Azman Samsudin,et al. Digital steganalysis: Computational intelligence approach , 2009 .