The Influence of the Image Basis on Modeling and Steganalysis Performance
暂无分享,去创建一个
Bernhard Schölkopf | Matthias O. Franz | Pham Hai Dang Le | Valentin Schwamberger | M. Franz | B. Scholkopf | Valentin Schwamberger
[1] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[2] E. Delp,et al. Security, steganography, and watermarking of multimedia contents , 2004 .
[3] I. Johnstone,et al. Ideal spatial adaptation by wavelet shrinkage , 1994 .
[4] Matthias O. Franz,et al. Simple algorithmic modifications for improving blind steganalysis performance , 2010, MM&Sec '10.
[5] Alexander J. Smola,et al. Learning with Kernels: support vector machines, regularization, optimization, and beyond , 2001, Adaptive computation and machine learning series.
[6] S. Geisser,et al. A Predictive Approach to Model Selection , 1979 .
[7] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[8] Edward H. Adelson,et al. IMAGE DATA COMPRESSION WITH THE LAPLACIAN PYRAMID , 1981 .
[9] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[10] Alexander J. Smola,et al. Learning with kernels , 1998 .
[11] D. Signorini,et al. Neural networks , 1995, The Lancet.
[12] John W. Woods,et al. Subband Image Coding , 1990 .
[13] Jessica J. Fridrich,et al. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics , 2005, Communications and Multimedia Security.
[14] Gunnar Rätsch,et al. Advanced Lectures on Machine Learning , 2004, Lecture Notes in Computer Science.
[15] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[16] Jessica J. Fridrich,et al. New blind steganalysis and its implications , 2006, Electronic Imaging.
[17] Eero P. Simoncelli,et al. Image compression via joint statistical characterization in the wavelet domain , 1999, IEEE Trans. Image Process..
[18] Jessica J. Fridrich,et al. Stochastic approach to secret message length estimation in ±k embedding steganography , 2005, IS&T/SPIE Electronic Imaging.
[19] Carl E. Rasmussen,et al. Gaussian processes for machine learning , 2005, Adaptive computation and machine learning.
[20] Bart De Decker,et al. Communications and Multimedia Security , 2011, Lecture Notes in Computer Science.