-
1
-
-
75749141980
-
Faster dimension reduction
-
N. Ailon and B. Chazelle. Faster dimension reduction. Communications ACM, 53(2):97-104, 2010.
-
(2010)
Communications ACM
, vol.53
, Issue.2
, pp. 97-104
-
-
Ailon, N.1
Chazelle, B.2
-
2
-
-
33745869085
-
Random projection, margins, kernels, and feature-selection
-
M. Grobelnik, S. Gunn, and J. Shawe-Taylor, editors, Subspace, Latent Structure and Feature Selection, Statistical and Optimization Perspectives Workshop, Bohinj, Slovenia, February
-
A. Blum. Random projection, margins, kernels, and feature-selection. In M. Grobelnik, S. Gunn, and J. Shawe-Taylor, editors, Subspace, Latent Structure and Feature Selection, Statistical and Optimization Perspectives Workshop, volume 3940 of Lecture Notes in Computer Science, pages 52-78, Bohinj, Slovenia, February 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3940
, pp. 52-78
-
-
Blum, A.1
-
3
-
-
0030211964
-
Bagging predictors
-
L. Breiman. Bagging predictors. Machine Learning, 24:123-140, August 1996. (Pubitemid 126724382)
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
4
-
-
0035478854
-
Random forests
-
October
-
L. Breiman. Random forests. Machine Learning, 45:5-32, October 2001.
-
(2001)
Machine Learning
, vol.45
, pp. 5-32
-
-
Breiman, L.1
-
5
-
-
58049131290
-
A comparative study of ±1 steganalyzers
-
Cairns, Australia, October 8-10
-
G. Cancelli, G. Doërr, I. J. Cox, and M. Barni. A comparative study of ±1 steganalyzers. In Proceedings IEEE International Workshop on Multimedia Signal Processing, pages 791-796, Cairns, Australia, October 8-10, 2008.
-
(2008)
Proceedings IEEE International Workshop on Multimedia Signal Processing
, pp. 791-796
-
-
Cancelli, G.1
Doërr, G.2
Cox, I.J.3
Barni, M.4
-
9
-
-
0003922190
-
-
New York: John Wiley & Sons, Inc., 2nd edition
-
R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. New York: John Wiley & Sons, Inc., 2nd edition, 2001.
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
10
-
-
50949133669
-
LIBLINEAR: A library for large linear classification
-
Software available at
-
Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang-Rui Wang, and Chih-Jen Lin. LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research, 9:1871-1874, 2008. Software available at http://www.csie.ntu. edu.tw/~cjlin/liblinear.
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 1871-1874
-
-
Fan, R.-E.1
Chang, K.-W.2
Hsieh, C.-J.3
Wang, X.-R.4
Lin, C.-J.5
-
12
-
-
35048835739
-
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes
-
J. Fridrich, editor, Information Hiding, 6th International Workshop, Toronto, Canada, May 23-25, Springer-Verlag, New York
-
J. Fridrich. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In J. Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67-81, Toronto, Canada, May 23-25, 2004. Springer-Verlag, New York.
-
(2004)
Lecture Notes in Computer Science
, vol.3200
, pp. 67-81
-
-
Fridrich, J.1
-
13
-
-
80053047483
-
Steganalysis of content-adaptive steganography in spatial domain
-
T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Prague, Czech Republic, May 18-20
-
J. Fridrich, J. Kodovský, M. Goljan, and V. Holub. Steganalysis of content-adaptive steganography in spatial domain. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Workshop, Lecture Notes in Computer Science, Prague, Czech Republic, May 18-20, 2011.
-
(2011)
Lecture Notes in Computer Science
-
-
Fridrich, J.1
Kodovský, J.2
Goljan, M.3
Holub, V.4
-
14
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
J. Dittmann and J. Fridrich, editors, Dallas, TX, September 20-21
-
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In J. Dittmann and J. Fridrich, editors, Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
15
-
-
33645676686
-
New blind steganalysis and its implications
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 16-19
-
M. Goljan, J. Fridrich, and T. Holotyak. New blind steganalysis and its implications. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072, pages 1-13, San Jose, CA, January 16-19, 2006.
-
(2006)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII
, vol.6072
, pp. 1-13
-
-
Goljan, M.1
Fridrich, J.2
Holotyak, T.3
-
16
-
-
84864063983
-
A kernel method for the two-sample-problem
-
B. Schölkopf, J. Platt, and T. Hoffman, editors, MIT Press, Cambridge, MA
-
A. Gretton, K. M. Borgwardt, M. Rasch, B. Schölkopf, and A. J. Smola. A kernel method for the two-sample-problem. In B. Schölkopf, J. Platt, and T. Hoffman, editors, Advances in Neural Information Processing Systems 19, pages 513-520. MIT Press, Cambridge, MA, 2007.
-
(2007)
Advances in Neural Information Processing Systems
, vol.19
, pp. 513-520
-
-
Gretton, A.1
Borgwardt, K.M.2
Rasch, M.3
Schölkopf, B.4
Smola, A.J.5
-
17
-
-
70449646940
-
Calibration revisited
-
J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
-
J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63-74, Princeton, NJ, September 7-8, 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 63-74
-
-
Kodovský, J.1
Fridrich, J.2
-
18
-
-
77951862698
-
Modern steganalysis can detect YASS
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, San Jose, CA, January 17-21
-
J. Kodovský, T. Pevný, and J. Fridrich. Modern steganalysis can detect YASS. In N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, editors, Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, volume 7541, pages 02-01-02-11, San Jose, CA, January 17-21, 2010.
-
(2010)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII
, vol.7541
, pp. 201-211
-
-
Kodovský, J.1
Pevný, T.2
Fridrich, J.3
-
20
-
-
34047125755
-
Embedded methods
-
I. Guyon, S. Gunn, M. Nikravesh, and L. A. Zadeh, editors, Physica-Verlag, Springer
-
T. N. Lal, O. Chapelle, J.Weston, and A. Elisseeff. Embedded methods. In I. Guyon, S. Gunn, M. Nikravesh, and L. A. Zadeh, editors, Feature Extraction: Foundations and Applications, Studies in Fuzziness and Soft Computing, pages 137-165. Physica-Verlag, Springer, 2006.
-
(2006)
Feature Extraction: Foundations and Applications, Studies in Fuzziness and Soft Computing
, pp. 137-165
-
-
Lal, T.N.1
Chapelle, O.2
Weston, J.3
Elisseeff, A.4
-
21
-
-
33749266714
-
The support vector decomposition machine
-
Pittsburgh, PA
-
F. Pereira and G. Gordon. The support vector decomposition machine. In Proceedings of the 23rd international conference on Machine learning, ICML '06, pages 689-696, Pittsburgh, PA, 2006.
-
(2006)
Proceedings of the 23rd International Conference on Machine Learning, ICML '06
, pp. 689-696
-
-
Pereira, F.1
Gordon, G.2
-
22
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
June
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2):215-224, June 2010.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
23
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, Calgary, Canada, June 28-30, Springer-Verlag, New York
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In R. Böhme and R. Safavi-Naini, editors, Information Hiding, 12th International Workshop, volume 6387 of Lecture Notes in Computer Science, pages 161-177, Calgary, Canada, June 28-30, 2010. Springer-Verlag, New York.
-
(2010)
Lecture Notes in Computer Science
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
24
-
-
34548232251
-
MergingMarkov and DCT features for multi-class JPEG steganalysis
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 29-February 1
-
T. Pevný and J. Fridrich. MergingMarkov and DCT features for multi-class JPEG steganalysis. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1-3 14, San Jose, CA, January 29-February 1, 2007.
-
(2007)
Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
, pp. 31-314
-
-
Pevný, T.1
Fridrich, J.2
-
25
-
-
42949166748
-
Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis
-
E. J. Delp and P. W. Wong, editors, San Jose, CA, January 27-31
-
A. Sarkar, K. Solanki, and B. S. Manjunath. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. In E. J. Delp and P. W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 16-31, San Jose, CA, January 27-31, 2008.
-
(2008)
Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
, pp. 16-31
-
-
Sarkar, A.1
Solanki, K.2
Manjunath, B.S.3
-
26
-
-
0037806811
-
The boosting approach to machine learning: An overview
-
D. D. Denison, M. H. Hansen, C. Holmes, B. Mallick, and B. Yu, editors, Springer
-
R. E. Schapire. The boosting approach to machine learning: An overview. In D. D. Denison, M. H. Hansen, C. Holmes, B. Mallick, and B. Yu, editors, Nonlinear Estimation and Classification. Springer, 2003.
-
(2003)
Nonlinear Estimation and Classification
-
-
Schapire, R.E.1
-
27
-
-
38049166461
-
A Markov process based approach to effective attacking JPEG steganography
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, Alexandria, VA, July 10-12, Springer-Verlag, New York
-
Y. Q. Shi, C. Chen, and W. Chen. A Markov process based approach to effective attacking JPEG steganography. In J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, editors, Information Hiding, 8th International Workshop, volume 4437 of Lecture Notes in Computer Science, pages 249-264, Alexandria, VA, July 10-12, 2006. Springer-Verlag, New York.
-
(2006)
Lecture Notes in Computer Science
, vol.4437
, pp. 249-264
-
-
Shi, Y.Q.1
Chen, C.2
Chen, W.3
|