Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach
暂无分享,去创建一个
Hanafizah Yaacob | Azman Samsudin | Shafiz Affendi Mohd Yusof | Angela Amphawan | Roshidi Din | Hanizan Shaker Hussain | Nazuha Jamaludin
[1] Edward J. Delp,et al. Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.
[2] Jean-Luc Gauvain,et al. Training Neural Network Language Models on Very Large Corpora , 2005, HLT.
[3] Kaustubh Choudhary. Image Steganography and Global Terrorism , 2012 .
[4] Huaiqing Wang,et al. Computing with words via Turing machines: a formal approach , 2003, IEEE Trans. Fuzzy Syst..
[5] Arputharaj Kannan,et al. An Active Rule Based Approach to Audio Steganalysis with a Genetic Algorithm , 2007, 2006 1st International Conference on Digital Information Management.
[6] Alisha Arora,et al. IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .
[7] João Gama. A Linear-Bayes Classifier , 2000, IBERAMIA-SBIA.
[8] Lotfi A. Zadeh,et al. Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..
[9] Gregg H. Gunsch,et al. Blind Stenanography Detection Using a Computational Immune System: A Work in Progress , 2003, Int. J. Digit. EVid..
[10] L.A. Zadeh. The concept of a generalized constraint - a bridge from natural languages to mathematics , 2005, NAFIPS 2005 - 2005 Annual Meeting of the North American Fuzzy Information Processing Society.
[11] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Azman Samsudin,et al. Digital steganalysis: Computational intelligence approach , 2009 .
[13] Lingyun Xiang,et al. Research on Steganalysis for Text Steganography Based on Font Format , 2007 .
[14] Shang Gao,et al. An algorithm of echo steganalysis based on Bayes classifier , 2008, 2008 International Conference on Information and Automation.
[15] Senén Barro,et al. A framework for fuzzy quantification models analysis , 2003, IEEE Trans. Fuzzy Syst..
[16] Yoshimi Suzuki,et al. Extracting Key Paragraph based on Topic and Event Detection Towards Multi-Document Summarization , 2000 .
[17] Malcolm I. Heywood,et al. Use of a genetic algorithm in brill's transformation-based part-of-speech tagger , 2005, GECCO '05.
[18] M.-R. Akbarzadeh-T,et al. A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[19] Qingzhong Liu,et al. Detect Information-Hiding Type and Length in JPEG Images by Using Neuro-fuzzy Inference Systems , 2008, 2008 Congress on Image and Signal Processing.
[20] V. Fay-Wolfe,et al. Video steganalysis for digital forensics investigation , 2013 .
[21] Andrei Fionov,et al. Applying statistical methods to text steganography , 2011, ArXiv.
[22] Ping Wang,et al. Inter-frame Correlation Based Compressed Video Steganalysis , 2008, 2008 Congress on Image and Signal Processing.
[23] Hui-Feng Shi,et al. Documents Categorization Based on Bayesian Spanning Tree , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[24] Dhananjay Kulkarni,et al. A Steganography-based framework to prevent active attacks during user authentication , 2013, 2013 8th International Conference on Computer Science & Education.
[25] J. M. Barone,et al. Looking for fuzziness in natural language , 2003, 22nd International Conference of the North American Fuzzy Information Processing Society, NAFIPS 2003.
[26] P. R. Deshmukh,et al. Hash Based Least Significant Bit Technique For Video Steganography , 2014 .
[27] Justo Carracedo Gallardo,et al. Measuring the Security of Linguistic Steganography in Spanish based on Synonymous Paraphrasing with WSD , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[28] Asif Perwej,et al. An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection , 2012, ArXiv.
[29] Gongzhu Hu,et al. Identification of deliberately doctored text documents using frequent keyword chain (FKC) model , 2003, Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[30] Xiaolin Gui,et al. A Hybrid Natural Language Information Hiding System , 2012 .
[31] K. P. Adhiya,et al. Hiding Text in Audio Using LSB Based Steganography , 2012 .
[32] M.A.K. Halliday. Fuzzy grammatics: a systemic functional approach to fuzziness in natural language , 1995, Proceedings of 1995 IEEE International Conference on Fuzzy Systems..
[33] N. D. Memon,et al. Steganography capacity: a steganalysis perspective , 2003, IS&T/SPIE Electronic Imaging.
[34] Frank Y. Shih,et al. Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[35] Huang Hou-Kuan,et al. Text classification based on the TAN model , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..
[36] Chang-Tsun Li,et al. Maintaining Information Security in E-Government through Steganology , 2008 .
[37] Rajarathnam Chandramouli,et al. A Bayesian image steganalysis approach to estimate the embedded secret message , 2005, MM&Sec '05.