Kernel methods in computer vision

CH Lampert - … and Trends® in Computer Graphics and …, 2009 - nowpublishers.com
Over the last years, kernel methods have established themselves as powerful tools for
computer vision researchers as well as for practitioners. In this tutorial, we give an …

CFA-aware features for steganalysis of color images

M Goljan, J Fridrich - Media Watermarking, Security, and …, 2015 - spiedigitallibrary.org
Color interpolation is a form of upsampling, which introduces constraints on the relationship
between neighboring pixels in a color image. These constraints can be utilized to …

Performance study of common image steganography and steganalysis techniques

M Kharrazi, HT Sencar… - Journal of Electronic …, 2006 - spiedigitallibrary.org
We investigate the performance of state of the art universal steganalyzers proposed in the
literature. These universal steganalyzers are tested against a number of well-known …

Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images

Q Liu, AH Sung, Z Chen, J Xu - Pattern Recognition, 2008 - Elsevier
In this paper, we present a scheme based on feature mining and pattern classification to
detect LSB matching steganography in grayscale images, which is a very challenging …

Digital video steganalysis exploiting statistical visibility in the temporal domain

U Budhia, D Kundur, T Zourntos - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
In this paper, we present effective steganalysis techniques for digital video sequences
based on interframe collusion that exploits the temporal statistical visibility of a hidden …

Image complexity and feature mining for steganalysis of least significant bit matching steganography

Q Liu, AH Sung, B Ribeiro, M Wei, Z Chen, J Xu - Information Sciences, 2008 - Elsevier
The information-hiding ratio is a well-known metric for evaluating steganalysis performance.
In this paper, we introduce a new metric of image complexity to enhance the evaluation of …

Multiclass detector of current steganographic methods for JPEG format

T Pevny, J Fridrich - IEEE Transactions on Information …, 2008 - ieeexplore.ieee.org
The aim of this paper is to construct a practical forensic steganalysis tool for JPEG images
that can properly analyze single-and double-compressed stego images and classify them to …

Steganalysis of spread spectrum data hiding exploiting cover memory

K Sullivan, U Madhow… - Security …, 2005 - spiedigitallibrary.org
In this paper we study steganalysis, the detection of hidden data. Specifically we focus on
detecting data hidden in grayscale images with spread spectrum hiding. To accomplish this …

Detection of audio covert channels using statistical footprints of hidden messages

H Özer, B Sankur, N Memon, İ Avcıbaş - Digital Signal Processing, 2006 - Elsevier
We address the problem of detecting the presence of hidden messages in audio. The
detector is based on the characteristics of the denoised residuals of the audio file, which …

A survey of machine learning algorithms and their application in information security

M Stamp - Guide to vulnerability analysis for computer networks …, 2018 - Springer
A Survey of Machine Learning Algorithms and Their Application in Information Security |
SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …