Audio Stego Intrusion Detection System through Hybrid Neural Tree Model
暂无分享,去创建一个
[1] Bo Xu,et al. Improved BSS Based Schemes for Active Steganalysis , 2007 .
[2] D. Donoho,et al. Translation-Invariant De-Noising , 1995 .
[3] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[4] Hong-Juan Zhang,et al. Steganalysis of audio: attacking the Steghide , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[5] Thierry Pun,et al. Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..
[6] Jia-jun Lin,et al. Steganalysis based on feature reducts of rough set by using genetic algorithm , 2008, 2008 7th World Congress on Intelligent Control and Automation.
[7] Ying Wang,et al. Optimized Feature Extraction for Learning-Based Image Steganalysis , 2007, IEEE Transactions on Information Forensics and Security.
[8] Li Zhi,et al. A LSB steganography detection algorithm , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[9] Yin-Cheng Qi,et al. Wavelet domain audio steganalysis based on statistical moments and PCA , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.
[10] Fikret S. Gürgen,et al. Performance Evaluation of Digital Audio Watermarking Techniques Designed in Time, Frequency and Cepstrum Domains , 2004, ADVIS.
[11] Wei Tang,et al. Ensembling neural networks: Many could be better than all , 2002, Artif. Intell..
[12] Anne Laurent,et al. Data Structures for Efficient Tree Mining: From Crisp to Soft Embedding Constraints , 2008 .
[13] Shang Gao,et al. An algorithm of echo steganalysis based on Bayes classifier , 2008, 2008 International Conference on Information and Automation.
[14] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[15] Chin-Chen Chang,et al. A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..
[16] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[17] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[18] Tomás Pevný,et al. Multiclass Detector of Current Steganographic Methods for JPEG Format , 2008, IEEE Transactions on Information Forensics and Security.
[19] Zhi-Hua Zhou,et al. NeC4.5: Neural Ensemble Based C4.5 , 2004, IEEE Trans. Knowl. Data Eng..
[20] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[21] N. Kamaraj,et al. AQM-based audio steganalysis and its realisation through rule induction with a genetic learner , 2008 .
[22] Nasir D. Memon,et al. Detection of audio covert channels using statistical footprints of hidden messages , 2006, Digit. Signal Process..
[23] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[24] Qingzhong Liu,et al. Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.
[25] Zhi-Hua Zhou,et al. Hybrid decision tree , 2002, Knowl. Based Syst..
[26] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2005, EURASIP J. Adv. Signal Process..
[27] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[28] Paolo Gubian,et al. Blind Multi-Class Steganalysis System Using Wavelet Statistics , 2007 .
[29] Jessica J. Fridrich,et al. New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.
[30] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[31] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[32] Fang Min. A Novel Intrusion Detection Method Based on Combining Ensemble Learning With Induction-Enhanced Particle Swarm Algorithm , 2007, Third International Conference on Natural Computation (ICNC 2007).
[33] Jana Dittmann,et al. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification , 2007, Information Hiding.
[34] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..