메뉴 건너뛰기




Volumn 7880, Issue , 2011, Pages

Steganalysis in high dimensions: Fusing classifiers built on random subspaces

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX SUPPORT; CURSE OF DIMENSIONALITY; ENSEMBLE CLASSIFIERS; FEATURE SETS; GENERALIZATION ABILITY; HIGH DIMENSIONALITY; HIGH DIMENSIONS; HIGH-DIMENSIONAL; INDIVIDUAL CLASSIFIERS; KEY PROBLEMS; LOW COMPLEXITY; MACHINE-LEARNING; OVER CURRENT; RANDOM SUBSPACES; STATE OF THE ART; STEGANALYSIS; STEGANOGRAPHIC ALGORITHMS; TRAINING DATA; WEAK CLASSIFIERS;

EID: 79954474492     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.872279     Document Type: Conference Paper
Times cited : (124)

References (28)
  • 1
    • 75749141980 scopus 로고    scopus 로고
    • Faster dimension reduction
    • N. Ailon and B. Chazelle. Faster dimension reduction. Communications ACM, 53(2):97-104, 2010.
    • (2010) Communications ACM , vol.53 , Issue.2 , pp. 97-104
    • Ailon, N.1    Chazelle, B.2
  • 2
    • 33745869085 scopus 로고    scopus 로고
    • Random projection, margins, kernels, and feature-selection
    • M. Grobelnik, S. Gunn, and J. Shawe-Taylor, editors, Subspace, Latent Structure and Feature Selection, Statistical and Optimization Perspectives Workshop, Bohinj, Slovenia, February
    • A. Blum. Random projection, margins, kernels, and feature-selection. In M. Grobelnik, S. Gunn, and J. Shawe-Taylor, editors, Subspace, Latent Structure and Feature Selection, Statistical and Optimization Perspectives Workshop, volume 3940 of Lecture Notes in Computer Science, pages 52-78, Bohinj, Slovenia, February 2005.
    • (2005) Lecture Notes in Computer Science , vol.3940 , pp. 52-78
    • Blum, A.1
  • 3
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • L. Breiman. Bagging predictors. Machine Learning, 24:123-140, August 1996. (Pubitemid 126724382)
    • (1996) Machine Learning , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 4
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • October
    • L. Breiman. Random forests. Machine Learning, 45:5-32, October 2001.
    • (2001) Machine Learning , vol.45 , pp. 5-32
    • Breiman, L.1
  • 10
    • 50949133669 scopus 로고    scopus 로고
    • LIBLINEAR: A library for large linear classification
    • Software available at
    • Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang-Rui Wang, and Chih-Jen Lin. LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research, 9:1871-1874, 2008. Software available at http://www.csie.ntu. edu.tw/~cjlin/liblinear.
    • (2008) Journal of Machine Learning Research , vol.9 , pp. 1871-1874
    • Fan, R.-E.1    Chang, K.-W.2    Hsieh, C.-J.3    Wang, X.-R.4    Lin, C.-J.5
  • 12
    • 35048835739 scopus 로고    scopus 로고
    • Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
    • J. Fridrich, editor, Information Hiding, 6th International Workshop, Toronto, Canada, May 23-25, Springer-Verlag, New York
    • J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J. Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67-81, Toronto, Canada, May 23-25, 2004. Springer-Verlag, New York.
    • (2004) Lecture Notes in Computer Science , vol.3200 , pp. 67-81
    • Fridrich, J.1
  • 13
    • 80053047483 scopus 로고    scopus 로고
    • Steganalysis of content-adaptive steganography in spatial domain
    • T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
    • J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Steganalysis of content-adaptive steganography in spatial domain. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20, 2011.
    • (2011) Lecture Notes in Computer Science
    • Fridrich, J.1    Kodovský, J.2    Goljan, M.3    Holub, V.4
  • 14
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • J. Dittmann and J. Fridrich, editors, Dallas, TX, September 20-21
    • J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
    • (2007) Proceedings of the 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 17
    • 70449646940 scopus 로고    scopus 로고
    • Calibration revisited
    • J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
    • J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63-74, Princeton, NJ, September 7-8, 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 63-74
    • Kodovský, J.1    Fridrich, J.2
  • 18
    • 77951862698 scopus 로고    scopus 로고
    • Modern steganalysis can detect YASS
    • N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Jose, CA, January 17-21
    • J. Kodovský, T. Pevný, and J. Fridrich. Modern steganalysis can detect YASS. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, volume 7541, pages 02-01-02-11, San Jose, CA, January 17-21, 2010.
    • (2010) Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII , vol.7541 , pp. 201-211
    • Kodovský, J.1    Pevný, T.2    Fridrich, J.3
  • 23
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, Calgary, Canada, June 28-30, Springer-Verlag, New York
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
    • (2010) Lecture Notes in Computer Science , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 26
    • 0037806811 scopus 로고    scopus 로고
    • The boosting approach to machine learning: An overview
    • D. D. Denison, M. H. Hansen, C. Holmes, B. Mallick, and B. Yu, editors, Springer
    • R. E. Schapire. The boosting approach to machine learning: An overview. In D. D. Denison, M. H. Hansen, C. Holmes, B. Mallick, and B. Yu, editors, Nonlinear Estimation and Classification. Springer, 2003.
    • (2003) Nonlinear Estimation and Classification
    • Schapire, R.E.1
  • 27
    • 38049166461 scopus 로고    scopus 로고
    • A Markov process based approach to effective attacking JPEG steganography
    • J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, Alexandria, VA, July 10-12, Springer-Verlag, New York
    • Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249-264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
    • (2006) Lecture Notes in Computer Science , vol.4437 , pp. 249-264
    • Shi, Y.Q.1    Chen, C.2    Chen, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.