Nature inspired metaheuristics for improved JPEG steganalysis

[1]  Latika Singh,et al.  An improved dynamic discrete firefly algorithm for blind image steganalysis , 2018, Int. J. Mach. Learn. Cybern..

[2]  Hedieh Sajedi,et al.  Image steganalysis using Artificial Bee Colony algorithm , 2017, J. Exp. Theor. Artif. Intell..

[3]  J. Anita Christaline,et al.  Bio-Inspired Computational Algorithms for Improved Image Steganalysis , 2016 .

[4]  J. Anita Christaline,et al.  Optimized JPEG Steganalysis , 2016, MUE 2016.

[5]  R. Ramesh,et al.  Critical review of image steganalysis techniques , 2015, Int. J. Adv. Intell. Paradigms.

[6]  Seyed Mohammad Mirjalili,et al.  The Ant Lion Optimizer , 2015, Adv. Eng. Softw..

[7]  Rita Rana Chhikara,et al.  An Improved Discrete Firefly and t-Test based Algorithm for Blind Image Steganalysis , 2015, 2015 6th International Conference on Intelligent Systems, Modelling and Simulation.

[8]  Yongdong Zhang,et al.  Efficient Parallel Framework for HEVC Motion Estimation on Many-Core Processors , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Liang Li,et al.  Efficient parallel HEVC intra-prediction on many-core processor , 2014 .

[10]  Yongdong Zhang,et al.  A Highly Parallel Framework for HEVC Coding Unit Partitioning Tree Decision on Many-core Processors , 2014, IEEE Signal Processing Letters.

[11]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Ali Kaveh,et al.  An improved ray optimization algorithm for design of truss structures , 2013 .

[13]  A. Kaveh,et al.  A new meta-heuristic method: Ray Optimization , 2012 .

[14]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Ramin Rajabioun,et al.  Cuckoo Optimization Algorithm , 2011, Appl. Soft Comput..

[16]  Qingzhong Liu,et al.  Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery , 2011, MiFor '11.

[17]  Qingzhong Liu,et al.  Steganalysis of DCT-embedding based adaptive steganography and YASS , 2011, MM&Sec '11.

[18]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[19]  Jessica J. Fridrich,et al.  Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.

[20]  Xin-She Yang,et al.  Engineering optimisation by cuckoo search , 2010, Int. J. Math. Model. Numer. Optimisation.

[21]  Xin-She Yang,et al.  Firefly algorithm, stochastic test functions and design optimisation , 2010, Int. J. Bio Inspired Comput..

[22]  Yong Wang,et al.  Blind JPEG Steganalysis Based on Correlations of DCT Cofficients in Multi-directions and Calibrations , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[23]  E. Talbi,et al.  Metaheuristics: From Design to Implementation , 2009 .

[24]  Luca Maria Gambardella,et al.  A survey on metaheuristics for stochastic combinatorial optimization , 2009, Natural Computing.

[25]  Bin Li,et al.  Universal JPEG steganalysis based on microscopic and macroscopic calibration , 2008, 2008 15th IEEE International Conference on Image Processing.

[26]  Tomás Pevný,et al.  Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.

[27]  Terry Windeatt,et al.  Accuracy/Diversity and Ensemble MLP Classifier Design , 2006, IEEE Transactions on Neural Networks.

[28]  Yun Q. Shi,et al.  A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.

[29]  Ludmila I. Kuncheva,et al.  A Theoretical Study on Six Classifier Fusion Strategies , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[30]  J. Anita Christaline,et al.  STEGANALYSIS WITH CLASSIFIER COMBINATIONS , 2014 .

[31]  Azman Samsudin,et al.  Digital steganalysis: Computational intelligence approach , 2009 .