메뉴 건너뛰기




Volumn , Issue , 2008, Pages

The Unseen Challenge data sets

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER VISION; DIGITAL ARITHMETIC; FEATURE EXTRACTION; IMAGE PROCESSING; PATTERN RECOGNITION;

EID: 51849099846     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CVPRW.2008.4562987     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 1
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding - a survey
    • July
    • F. Petitcolas, R. Anderson, and M. Kuhn, "Information hiding - a survey," Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999.
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.1    Anderson, R.2    Kuhn, M.3
  • 2
    • 51849145995 scopus 로고    scopus 로고
    • S. V. Hart, Forensic examination of digital evidence: a guide for law enforcement, National Institute of Justice NIJ-US, Washington DC, USA, Tech. Rep. NCJ 199408, September 2004.
    • S. V. Hart, "Forensic examination of digital evidence: a guide for law enforcement," National Institute of Justice NIJ-US, Washington DC, USA, Tech. Rep. NCJ 199408, September 2004.
  • 8
    • 0038576916 scopus 로고    scopus 로고
    • Getting the message
    • April
    • P. Wallich, "Getting the message," IEEE Spectrum, vol. 40, no. 4, pp. 38-40, April 2003.
    • (2003) IEEE Spectrum , vol.40 , Issue.4 , pp. 38-40
    • Wallich, P.1
  • 9
    • 0037900670 scopus 로고    scopus 로고
    • Listening in
    • April
    • S. Cass, "Listening in," IEEE Spectrum, vol. 40, no. 4, pp. 32-37, April 2003.
    • (2003) IEEE Spectrum , vol.40 , Issue.4 , pp. 32-37
    • Cass, S.1
  • 10
    • 0038576933 scopus 로고    scopus 로고
    • Mission impossible?
    • April
    • J. Kumagai, "Mission impossible?" IEEE Spectrum, vol. 40, no. 4, pp. 26-31, April 2003.
    • (2003) IEEE Spectrum , vol.40 , Issue.4 , pp. 26-31
    • Kumagai, J.1
  • 11
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography
    • March
    • N. Provos and P. Honeyman, "Hide and seek: an introduction to steganography," IEEE Security & Privacy Magazine., vol. 1, no. 3, pp. 32-44, March 2003.
    • (2003) IEEE Security & Privacy Magazine , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 16
    • 84937814312 scopus 로고    scopus 로고
    • A. Westfeld, F5 - a steganographic algorithm: High capacity despite better steganalysis, in Intl. Workshop in Information Hiding (IHW), 2001, pp. 289?-302.
    • A. Westfeld, "F5 - a steganographic algorithm: High capacity despite better steganalysis," in Intl. Workshop in Information Hiding (IHW), 2001, pp. 289?-302.
  • 18
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • N. Provos, "Defending against statistical steganalysis," in Usenix Security Symposium, vol. 10, 2001, pp. 24-36.
    • (2001) Usenix Security Symposium , vol.10 , pp. 24-36
    • Provos, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.