-
1
-
-
84880088358
-
Digital image steganography: Survey and analysis of current methods
-
2009
-
Cheddad, A., Condell, J. Curran, K. and Kevitt, P. (2009). Digital Image Steganography: Survey and Analysis of Current Methods. Journal of Signal Processing, 2009.
-
(2009)
Journal of Signal Processing
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, P.4
-
3
-
-
48649102003
-
An overview of image steganography
-
Sandton, South Africa
-
Morkel, T., Eloff, J. H. P. and Olivier, M. S. (2005). An Overview of Image Steganography. Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa.
-
(2005)
Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005)
-
-
Morkel, T.1
Eloff, J.H.P.2
Olivier, M.S.3
-
5
-
-
70349904506
-
Improving security and capacity for arabic text steganography using Kashida extensions
-
10-13 May 2009, Rabat Morocco
-
Fard, A.-H., Adnan, G., Khalid, A.-K. and Jameel, H. (2009). Improving Security and Capacity for Arabic Text Steganography Using Kashida Extensions. The Proceeding of the IEEE/ACS International Conference on Computer Systems and Applications, 10-13 May 2009, Rabat Morocco.
-
(2009)
The Proceeding of the IEEE/ACS International Conference on Computer Systems and Applications
-
-
Fard, A.-H.1
Adnan, G.2
Khalid, A.-K.3
Jameel, H.4
-
9
-
-
78049399830
-
Neural fuzzy based intelligent systems and applications in fusion of neural networks, fuzzy sets, and genetic algorithms: Industrial applications
-
CRC Press
-
Khan, E. (1999). Neural Fuzzy Based Intelligent Systems and Applications in Fusion of Neural Networks, Fuzzy Sets, and Genetic Algorithms: Industrial Applications, International Series on Computational Intelligence, CRC Press.
-
(1999)
International Series on Computational Intelligence
-
-
Khan, E.1
-
13
-
-
40649112060
-
Genetical swarm optimization : An evolutionary algorithm for antenna design
-
Gandelli, A., Grimaccia, F., Mussetta, M., Pirinoli, P. and Zich, R. E. (2006). Genetical Swarm Optimization : an Evolutionary Algorithm for Antenna Design, AUTOMATIKA (ATKAAF) 47 (2006), pp. 105-112.
-
(2006)
Automatika (ATKAAF)
, vol.47
, Issue.2006
, pp. 105-112
-
-
Gandelli, A.1
Grimaccia, F.2
Mussetta, M.3
Pirinoli, P.4
Zich, R.E.5
-
16
-
-
0043166439
-
Handwritten digit recognition: Bench-marking of state-of-the-art techniques
-
Liu, C., Nakashima, K., Sako, H. and Fujisawa, H. (2003). Handwritten Digit Recognition: Bench-marking of state-of-the-art techniques. Pattern Recognition, vol. 36, pp. 2271-2285.
-
(2003)
Pattern Recognition
, vol.36
, pp. 2271-2285
-
-
Liu, C.1
Nakashima, K.2
Sako, H.3
Fujisawa, H.4
-
17
-
-
84957069814
-
Text categorization with support vector machines: Learning with many relevant features
-
Joachims, T. (1998). Text Categorization with Support Vector Machines: Learning with Many Relevant Features. Proc. Europ. Conf. Mach. Learn, pp. 137-142.
-
(1998)
Proc. Europ. Conf. Mach. Learn
, pp. 137-142
-
-
Joachims, T.1
-
18
-
-
0030673582
-
Training support vector machines: An application to face detection
-
Jan. 1997
-
Osuna, E., Freund, R. and Girosi, F. (1997). Training Support Vector Machines: An Application to Face Detection. IEEE Conf. Computer Visual Pattern Recog., pp. 130-136, Jan. 1997.
-
(1997)
IEEE Conf. Computer Visual Pattern Recog.
, pp. 130-136
-
-
Osuna, E.1
Freund, R.2
Girosi, F.3
-
19
-
-
24944460442
-
Reliable information hiding based on support vector machine
-
2005
-
Fu, Y.-G. (2005). Reliable Information Hiding Based on Support Vector Machine. INFORMATICA, 2005, vol. 16, No. 3, pp. 333-346.
-
(2005)
Informatica
, vol.16
, Issue.3
, pp. 333-346
-
-
Fu, Y.-G.1
-
20
-
-
63049096383
-
Support vector and kernel methods
-
Computer Science Department
-
Joachims, T. (2003). Support Vector and Kernel Methods. SIGIR 2003 Tutorial, Computer Science Department,.
-
(2003)
SIGIR 2003 Tutorial
-
-
Joachims, T.1
-
21
-
-
78049371945
-
Basics of machine learning by support vector machines
-
(2005). Cornell University
-
Kecman, V. (2005). Basics of Machine Learning by Support Vector Machines. StudFuzz 179, pp. 49-103 (2005). Cornell University.
-
(2005)
StudFuzz
, vol.179
, pp. 49-103
-
-
Kecman, V.1
-
22
-
-
78049383639
-
A practical guide to support vector classification
-
2009
-
Hsu, C.-W., Chang, C.-C. and Lin, C.-J. (2009). A Practical Guide to Support Vector Classification. Bioinformatics (2009), vol. 1, Issue: 1, pp. 1-15.
-
(2009)
Bioinformatics
, vol.1
, Issue.1
, pp. 1-15
-
-
Hsu, C.-W.1
Chang, C.-C.2
Lin, C.-J.3
-
23
-
-
56549086219
-
Robust image watermarking scheme with general regression neural network and FCM algorithm
-
LNCS 5226
-
Jing, L., Liu, F. and Liu, B. (2008). Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm. ICIC 2008, LNCS 5226, pp. 243-250.
-
(2008)
ICIC 2008
, pp. 243-250
-
-
Jing, L.1
Liu, F.2
Liu, B.3
-
24
-
-
0036825821
-
Kernel methods: A survey of current techniques
-
Campbell, C. (2002). Kernel Methods: A Survey of Current Techniques. New Computings, 48, pp. 63-84.
-
(2002)
New Computings
, vol.48
, pp. 63-84
-
-
Campbell, C.1
-
26
-
-
69349084584
-
Advances in intelligent methodologies and techniques
-
Springer-Verlag Berlin Heidelberg 2009, SCI 217
-
Jain, L. C., and Lim, C. P. (2009). Advances in Intelligent Methodologies and Techniques. Intelligent System and Technologies, Springer-Verlag Berlin Heidelberg 2009, SCI 217, pp. 3-28.
-
(2009)
Intelligent System and Technologies
, pp. 3-28
-
-
Jain, L.C.1
Lim, C.P.2
-
27
-
-
0036627368
-
A survey of watermarking algorithms for image authentication
-
2002
-
Rey, C. and Dugelay, J.-L. (2002). A Survey of Watermarking Algorithms for Image Authentication. EURASIP Journal on Applied Signal Processing 2002:6, pp. 613-621.
-
(2002)
EURASIP Journal on Applied Signal Processing
, vol.6
, pp. 613-621
-
-
Rey, C.1
Dugelay, J.-L.2
-
28
-
-
0036030626
-
Security of fragile authentication watermarks with localization
-
Fridrich, J. (2002). Security of Fragile Authentication Watermarks with Localization. Proc. SPIE Vol. 4675, pp. 691-700.
-
(2002)
Proc. SPIE
, vol.4675
, pp. 691-700
-
-
Fridrich, J.1
-
29
-
-
78049398164
-
Embedding a large amount of information using high security neural based steganography algorithm
-
Winter 2008
-
Nameer, N. (2008). Embedding a Large Amount of Information Using High Security Neural Based Steganography Algorithm. International Journal of Signal Processing.(Volume 4 Number 1 Winter 2008).
-
(2008)
International Journal of Signal Processing
, vol.4
, Issue.1
-
-
Nameer, N.1
-
31
-
-
57649216061
-
Study on information hiding algorithm based on RBF and LSB
-
Zhou, K., Quan, T. and Kang, Y. (2008). Study on Information Hiding Algorithm Based on RBF and LSB. Proceedings of the 2008 Fourth International Conference on Natural Computation, Vol. 5, pp. 612-614.
-
(2008)
Proceedings of the 2008 Fourth International Conference on Natural Computation
, vol.5
, pp. 612-614
-
-
Zhou, K.1
Quan, T.2
Kang, Y.3
-
35
-
-
38149030079
-
Genetic algorithm based optimal block mapping for LSB substitution
-
Ji, R., Yao, H., Liu, H. and Wang, L. (2006). Genetic Algorithm Based Optimal Block Mapping for LSB Substitution. The IEEE Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06).
-
(2006)
The IEEE Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06)
-
-
Ji, R.1
Yao, H.2
Liu, H.3
Wang, L.4
-
37
-
-
55549099235
-
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding
-
(2009), Springer-Verlag
-
Chang, C.-C., Chen, Y.-H. and Lin, C.-C. (2008). A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding. Soft Computing (2009), 13. pp. 321-331, Springer-Verlag.
-
(2008)
Soft Computing
, vol.13
, pp. 321-331
-
-
Chang, C.-C.1
Chen, Y.-H.2
Lin, C.-C.3
-
39
-
-
55549107155
-
PM1 steganography in JPEG images using genetic algorithm
-
(2009), Springer-Verlag
-
Yu, L., Zhao, Y., Ni, R. and Zhu, Z. (2008). PM1 Steganography in JPEG Images Using Genetic Algorithm. Soft Computing (2009), 13. pp. 393-400, Springer-Verlag.
-
(2008)
Soft Computing
, vol.13
, pp. 393-400
-
-
Yu, L.1
Zhao, Y.2
Ni, R.3
Zhu, Z.4
-
40
-
-
33746050990
-
SVM based watermarking technique
-
Yen, S.-H. and Wang, C.-J. (2006). SVM Based Watermarking Technique. Tamkang Journal of Science and Engineering, Vol. 9, No. 2, pp. 141-150.
-
(2006)
Tamkang Journal of Science and Engineering
, vol.9
, Issue.2
, pp. 141-150
-
-
Yen, S.-H.1
Wang, C.-J.2
-
41
-
-
60349085636
-
A novel blind image watermarking scheme based on support vector machine in DCT domain
-
Dec. 2008, Suzhou, China. (CIS 2008)
-
Meng, F., Peng, H., Pei, Z. and Wang, J. (2008). A Novel Blind Image Watermarking Scheme Based on Support Vector Machine in DCT Domain. Proceeding of the 2008 International Conference on Computational Intelligence and Security, Dec. 2008, Suzhou, China. (CIS 2008).
-
(2008)
Proceeding of the 2008 International Conference on Computational Intelligence and Security
-
-
Meng, F.1
Peng, H.2
Pei, Z.3
Wang, J.4
-
42
-
-
78049527280
-
Color image watermarking scheme based on efficient preprocessing and SVM
-
Communications in Computer and Information Science, ISBN 978-3-540-85929-1. Springer-Verlag Berlin Heidelberg, 2008
-
Findik, O., Bayrak, M. Babaoglu, I. and Comak, E. (2008). Color Image Watermarking Scheme Based on Efficient Preprocessing and SVM. Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Communications in Computer and Information Science, Vol. 15. ISBN 978-3-540-85929-1. Springer-Verlag Berlin Heidelberg, 2008, pp. 398.
-
(2008)
Advanced Intelligent Computing Theories and Applications. with Aspects of Contemporary Intelligent Computing Techniques
, vol.15
, pp. 398
-
-
Findik, O.1
Bayrak, M.2
Babaoglu, I.3
Comak, E.4
-
43
-
-
34047234908
-
A robust image hiding method based on sign embedding and fuzzy classification
-
June 21-23, 2006, Dalian, China
-
Li, Q., Yu, C. and Chu, D. (2006). A Robust Image Hiding Method Based on Sign Embedding and Fuzzy Classification. Proceeding of the 6th World Congress on Intelligent Control and Automation, June 21-23, 2006, Dalian, China.
-
(2006)
Proceeding of the 6th World Congress on Intelligent Control and Automation
-
-
Li, Q.1
Yu, C.2
Chu, D.3
-
49
-
-
57049095869
-
An new initialization method for fuzzy C-means algorithm
-
2008
-
Zou, K., Wang, Z. and Hu, M. (2008). An New Initialization Method for Fuzzy C-Means Algorithm. Fuzzy Optimal Decision Making (2008) 7: 409-416.
-
(2008)
Fuzzy Optimal Decision Making
, vol.7
, pp. 409-416
-
-
Zou, K.1
Wang, Z.2
Hu, M.3
-
50
-
-
84992413774
-
Medical image segmentation using FCM, Learning Vector Quantization (LVQ) and user interaction
-
CCIS 15, 2008. Springer-Verlag Berlin Heidelberg 2008
-
Balafar et al. (2008). Medical Image Segmentation Using FCM, Learning Vector Quantization (LVQ) and User Interaction. ICIC 2008, CCIS 15, pp. 177-184, 2008. Springer-Verlag Berlin Heidelberg 2008.
-
(2008)
ICIC 2008
, pp. 177-184
-
-
Balafar1
-
51
-
-
4644290661
-
Training algorithms for fuzzy support vector machines with noisy data
-
Lin, C.-F. and Wang, S.-D. (2004). Training Algorithms for Fuzzy Support Vector Machines with Noisy Data. Pattern Recognition Letters 25, pp. 1647-1656.
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 1647-1656
-
-
Lin, C.-F.1
Wang, S.-D.2
|