A data mapping method for steganography and its application to images

H Wu, JL Dugelay, Y Cheung - … Workshop, IH 2008, Santa Barbara, CA …, 2008 - Springer
In this paper, a new steganographic method that preserves the first-order statistics of the
cover is proposed. Suitable for the passive warden scenario, the proposed method is not …

Multikoc: Multi-one-class classifier based k-means clustering

L Abdallah, M Badarna, W Khalifa, M Yousef - Algorithms, 2021 - mdpi.com
In the computational biology community there are many biological cases that are considered
as multi-one-class classification problems. Examples include the classification of multiple …

Steganalysis using logistic regression

I Lubenko, AD Ker - Media Watermarking, Security, and …, 2011 - spiedigitallibrary.org
We advocate Logistic Regression (LR) as an alternative to the Support Vector Machine
(SVM) classifiers commonly used in steganalysis. LR offers more information than traditional …

Active steganalysis for histogram-shifting based reversible data hiding

DC Lou, CL Chou, HK Tso, CC Chiu - Optics Communications, 2012 - Elsevier
This paper presents an innovative active steganalysis algorithm for reversible data hiding
schemes based on histogram shifting. These schemes use histogram shifting to embed …

Measurement of and at LEP using double-tag methods

L3 Collaboration, M Acciarri - The European Physical Journal C-Particles …, 2000 - Springer
We present a combined measurement of R_b=Γ(Z→b̄b)/Γ(Z→hadrons) and the
semileptonic branching ratio of b quarks in Z decays, Br(b→ℓνX), using double-tag methods …

[PDF][PDF] Bio-inspired computational algorithms for improved image steganalysis

JA Christaline, R Ramesh, D Vaishali - Indian J Sci Technol, 2016 - researchgate.net
Acquiring the best image features that best distinguishes a stego and clean image is a
challenge in image steganalysis. Though higher order models acquire all these features …

Steganography and steganalysis in digital multimedia: Hype or hallelujah?

A Rocha, S Goldenstein - Revista de Informática Teórica e Aplicada, 2008 - seer.ufrgs.br
In this tutorial, we introduce the basic theory behind Steganography and Steganalysis, and
present some recent algorithms and developments of these fields. We show how the existing …

Determining the stego algorithm for JPEG images

T Pevný, J Fridrich - IEE Proceedings-Information Security, 2006 - IET
The goal of forensic steganalysis is to detect the presence of embedded data and to
eventually extract the secret message. A necessary step towards extracting the data is …

[PDF][PDF] Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images.

Q Liu, AH Sung - IJCAI, 2007 - academia.edu
In this paper, we present a scheme based on feature mining and neuro-fuzzy inference
system for detecting LSB matching steganography in grayscale images, which is a very …

A new multi-class SVM algorithm based on one-class SVM

XY Yang, J Liu, MQ Zhang, K Niu - … Conference, Beijing, China, May 27-30 …, 2007 - Springer
Multi-class classification is an important and on-going research subject in machine learning
and data mining. In this paper, we propose a new support vector algorithm, called OC-K …