Audio Stego Intrusion Detection System through Hybrid Neural Tree Model

[1]  Bo Xu,et al.  Improved BSS Based Schemes for Active Steganalysis , 2007 .

[2]  D. Donoho,et al.  Translation-Invariant De-Noising , 1995 .

[3]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[4]  Hong-Juan Zhang,et al.  Steganalysis of audio: attacking the Steghide , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[5]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[6]  Jia-jun Lin,et al.  Steganalysis based on feature reducts of rough set by using genetic algorithm , 2008, 2008 7th World Congress on Intelligent Control and Automation.

[7]  Ying Wang,et al.  Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.

[8]  Li Zhi,et al.  A LSB steganography detection algorithm , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[9]  Yin-Cheng Qi,et al.  Wavelet domain audio steganalysis based on statistical moments and PCA , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.

[10]  Fikret S. Gürgen,et al.  Performance Evaluation of Digital Audio Watermarking Techniques Designed in Time, Frequency and Cepstrum Domains , 2004, ADVIS.

[11]  Wei Tang,et al.  Ensembling neural networks: Many could be better than all , 2002, Artif. Intell..

[12]  Anne Laurent,et al.  Data Structures for Efficient Tree Mining: From Crisp to Soft Embedding Constraints , 2008 .

[13]  Shang Gao,et al.  An algorithm of echo steganalysis based on Bayes classifier , 2008, 2008 International Conference on Information and Automation.

[14]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[15]  Chin-Chen Chang,et al.  A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..

[16]  Siwei Lyu,et al.  Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.

[17]  Yeuan-Kuen Lee,et al.  High capacity image steganographic model , 2000 .

[18]  Tomás Pevný,et al.  Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.

[19]  Zhi-Hua Zhou,et al.  NeC4.5: Neural Ensemble Based C4.5 , 2004, IEEE Trans. Knowl. Data Eng..

[20]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[21]  N. Kamaraj,et al.  AQM-based audio steganalysis and its realisation through rule induction with a genetic learner , 2008 .

[22]  Nasir D. Memon,et al.  Detection of audio covert channels using statistical footprints of hidden messages , 2006, Digit. Signal Process..

[23]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[24]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[25]  Zhi-Hua Zhou,et al.  Hybrid decision tree , 2002, Knowl. Based Syst..

[26]  Nasir D. Memon,et al.  Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..

[27]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[28]  Paolo Gubian,et al.  Blind Multi-Class Steganalysis System Using Wavelet Statistics , 2007 .

[29]  Jessica J. Fridrich,et al.  New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.

[30]  Jessica J. Fridrich,et al.  Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.

[31]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[32]  Fang Min A Novel Intrusion Detection Method Based on Combining Ensemble Learning With Induction-Enhanced Particle Swarm Algorithm , 2007, Third International Conference on Natural Computation (ICNC 2007).

[33]  Jana Dittmann,et al.  Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification , 2007, Information Hiding.

[34]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..