-
2
-
-
0037592480
-
Evolution strategies - A comprehensive introduction
-
Beyer H, Schwefel H (2004) Evolution strategies - a comprehensive introduction. Nat Comput 1: 3-52
-
(2004)
Nat Comput
, vol.1
, pp. 3-52
-
-
Beyer, H.1
Schwefel, H.2
-
5
-
-
0242497150
-
New methodology for breaking steganographic techniques for JPEGs
-
In: Santa Clara, CA
-
Fridrich J, Goljan M, Hogea D (2003) New methodology for breaking steganographic techniques for JPEGs. In: Proc. of SPIE Electronic Imaging, Santa Clara, CA, pp 143-155
-
(2003)
Proc. of SPIE Electronic Imaging
, pp. 143-155
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
7
-
-
3142742523
-
A simple and global optimization algorithm for engineering problems: Differential evolution algorithm
-
Karboga D, Okdem S (2004) A simple and global optimization algorithm for engineering problems: Differential evolution algorithm. Turk J Electr Eng Comput Sci 12(1): 53-60
-
(2004)
Turk J Electr Eng Comput Sci
, vol.12
, Issue.1
, pp. 53-60
-
-
Karboga, D.1
Okdem, S.2
-
8
-
-
33847675252
-
An overview of steganography for the computer forensics examiner
-
Kessler GC (2004) An overview of steganography for the computer forensics examiner. Forensic Sci Commun 6(3): 1-29
-
(2004)
Forensic Sci Commun
, vol.6
, Issue.3
, pp. 1-29
-
-
Kessler, G.C.1
-
9
-
-
11244317744
-
-
Pan JS, Huang HC, Jain LC (eds) World Scientific Publishing Company, Singapore
-
Pan JS, Huang HC, Jain LC (eds) (2004) Intelligent watermarking techniques. World Scientific Publishing Company, Singapore
-
(2004)
Intelligent Watermarking Techniques
-
-
-
11
-
-
3042742327
-
Hide and seek: An introduction to steganography
-
Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE Secur Priv Mag 1(3): 32-44
-
(2003)
IEEE Secur Priv Mag
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
12
-
-
0346216903
-
Genetic watermarking based on transform domain techniques
-
Shieh CS, Huang HC, Wang FH, Pan JS (2004) Genetic watermarking based on transform domain techniques. Pattern Recognit 37(3): 555-565
-
(2004)
Pattern Recognit
, vol.37
, Issue.3
, pp. 555-565
-
-
Shieh, C.S.1
Huang, H.C.2
Wang, F.H.3
Pan, J.S.4
-
15
-
-
0001849187
-
Attacks on steganographic systems breaking the steganographic utilities Ezstego, Jsteg, Steganos and S-tools and some lessons learned
-
In: Dresden, Germany
-
Westfeld A, Pfitzmann A (1999a) Attacks on steganographic systems breaking the steganographic utilities Ezstego, Jsteg, Steganos and S-tools and some lessons learned. In: Proc. of Third Intl. Workshop on Information Hiding, Dresden, Germany, pp 61-76
-
(1999)
Proc. of Third Intl. Workshop on Information Hiding
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
16
-
-
0001849187
-
Attacks on steganographic systems
-
In: Springer, Berlin
-
Westfeld A, Pfitzmann A (1999b) Attacks on steganographic systems. In: Proc. of Third Intl. Workshop on Information Hiding, Lecture Notes in Computer Science. Springer, Berlin, vol 1768, pp 61-76
-
(1999)
Proc. of Third Intl. Workshop on Information Hiding, Lecture Notes in Computer Science
, vol.1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
-
17
-
-
31744433507
-
Genetic algorithm based methodology for breaking the steganalytic systems
-
Wu Y, Shih FY (2006) Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans Syst Man Cybern 36(1): 24-29
-
(2006)
IEEE Trans Syst Man Cybern
, vol.36
, Issue.1
, pp. 24-29
-
-
Wu, Y.1
Shih, F.Y.2
|