-
1
-
-
84858263654
-
Ensemble classiers for steganalysis of digital media
-
Kodovsky, J., Fridrich, J., and Holub, V.,Ensemble classiers for steganalysis of digital media," IEEE Transactions on Information Forensics and Security 7(2), 432-444 ((2012).
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovsky, J.1
Fridrich, J.2
Holub, V.3
-
2
-
-
84878455879
-
Random projections of residuals as an alternative to cooccurrences in steganalysis
-
Holub, V., Fridrich, J., and Denemark, T. Random projections of residuals as an alternative to cooccurrences in steganalysis," in [Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents XIV] 8665, 0L01-0L11 2013).
-
(2013)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents XIV]
, vol.8665
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
3
-
-
84897573740
-
A theory of learning from dierent domains
-
Ben-David, S., Blitzer, J., Crammer, K., Kulesza, A., Pereira, F., and Vaughan, J. W.,A theory of learning from dierent domains," Machine Learning 79(1-2), 151-175 (2010).
-
(2010)
Machine Learning
, vol.79
, Issue.1-2
, pp. 151-175
-
-
Ben-David, S.1
Blitzer, J.2
Crammer, K.3
Kulesza, A.4
Pereira, F.5
Vaughan, J.W.6
-
4
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
Pevny, T., Bas, P., and Fridrich, J.,Steganalysis by subtractive pixel adjacency matrix," IEEE Transac-Tions on Information Forensics and Security 5(2), 215-224 (2010).
-
(2010)
IEEE Transac-Tions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
5
-
-
84867479507
-
Steganalysis with mismatched covers: Do simple classiers help?
-
(MM&Sec (2012)] , ACM
-
Lubenko, I. and Ker, A. D.,Steganalysis with mismatched covers: do simple classiers help?," in [Proc. 13th ACM Workshop on Multimedia and Security (MM&Sec (2012)], 11-18, ACM ((2012).
-
(2012)
Proc. 13th ACM Workshop on Multimedia and Security
, pp. 11-18
-
-
Lubenko, I.1
Ker, A.D.2
-
6
-
-
78049366470
-
Forensics aided steganalysis of heterogeneous images
-
Barni, M., Cancelli, G., and Esposito, A.,Forensics aided steganalysis of heterogeneous images," in [Proc. IEEE Conference on Acoustics Speech and Signal Processing], 1690-1693 (2010).
-
(2010)
Proc. IEEE Conference on Acoustics Speech and Signal Processing
, pp. 1690-1693
-
-
Barni, M.1
Cancelli, G.2
Esposito, A.3
-
7
-
-
84880060316
-
Moving steganography and steganalysis from the laboratory into the real world
-
ACM
-
Ker, A. D., Bas, P., Bohme, R., Cogranne, R., Craver, S., Filler, S., Fridrich, J., and Pevny, T.,Moving steganography and steganalysis from the laboratory into the real world," in [Proc. 1st ACM Workshop on Information Hiding and Multimedia Security], 45-58, ACM (2013).
-
(2013)
Proc. 1st ACM Workshop on Information Hiding and Multimedia Security
, pp. 45-58
-
-
Ker, A.D.1
Bas, P.2
Bohme, R.3
Cogranne, R.4
Craver, S.5
Filler, S.6
Fridrich, J.7
Pevny, T.8
-
8
-
-
71449111258
-
-
PhD thesis, Binghamton University, SUNY, NY
-
Pevny, T., Kernel methods in steganalysis, PhD thesis, Binghamton University, SUNY, NY (2008).
-
(2008)
Kernel Methods in Steganalysis
-
-
Pevny, T.1
-
9
-
-
84878463479
-
Exploring multitask learning for steganalysis
-
Makelberge, J. and Ker, A. D.,Exploring multitask learning for steganalysis," in [Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents XI] 8665, 0N01-0N10 2013).
-
(2013)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents
, vol.9
, Issue.8665
-
-
Makelberge, J.1
Ker, A.D.2
-
10
-
-
84858246718
-
Steganalysis of JPEG images using rich models
-
Kodovsky, J. and Fridrich, J.,Steganalysis of JPEG images using rich models," in [Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents XIV] 8303, 0A01-0A13 (2012).
-
(2012)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents
, vol.14
, Issue.8303
-
-
Kodovsky, J.1
Fridrich, J.2
-
11
-
-
84878455879
-
Random projections of residuals as an alternative to cooccurrences in steganalysis
-
Holub, V., Fridrich, J., and Denemark, T. Random projections of residuals as an alternative to cooccurrences in steganalysis," in[Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents XV] 8665, 0L01-0L11 (2013).
-
(2013)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents
, vol.15
, Issue.8665
-
-
Holub, V.1
Fridrich, J.2
Denemark, T.3
-
12
-
-
84858191862
-
From blind to quantitative steganalysis
-
Pevny, T., Fridrich, J., and Ker, A. D.,From blind to quantitative steganalysis," IEEE Transactions on Information Forensics and Security 7(2), 445-454 ((2012).
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 445-454
-
-
Pevny, T.1
Fridrich, J.2
Ker, A.D.3
-
13
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
Springer
-
Ker, A. D.,Batch steganography and pooled steganalysis," in [Proc. 8th Information Hiding Workshop], LNCS 4437, 265-281, Springer (2006).
-
(2006)
Proc. 8th Information Hiding Workshop LNCS
, vol.4437
, pp. 265-281
-
-
Ker . A, D.1
-
14
-
-
84878426306
-
The challenges of rich features in universal steganalysis
-
Pevny, T. and Ker, A. D.,The challenges of rich features in universal steganalysis," in Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents XV] 8665, 0M01-0M15 (2013).
-
(2013)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents
, vol.15
, Issue.8665
-
-
Pevny, T.1
Ker, A.D.2
-
15
-
-
79954525968
-
Steganalysis using logistic regression
-
SPIE
-
Lubenko, I. and Ker, A. D.,Steganalysis using logistic regression," in[Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents XIII] 7880, 0K01-0K11, SPIE 2011).
-
(2011)
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents
, vol.8
, Issue.7880
-
-
Lubenko, I.1
Ker, A.D.2
-
16
-
-
38149036628
-
A new multi-class SVM algorithm based on one-class SVM
-
Part III: ICCS 2007] Springer, Berlin, Heidelberg
-
Yang, X.-Y., Liu, J., Zhang, M.-Q., and Niu, K.,A new multi-class SVM algorithm based on one-class SVM," in [Proc. 7th international conference on Computational Science, Part III: ICCS 2007] 677-684 Springer, Berlin, Heidelberg (2007).
-
(2007)
Proc. 7th International Conference on Computational Science
, pp. 677-684
-
-
Yang, X.-Y.1
Liu, J.2
Zhang, M.-Q.3
Niu, K.4
-
17
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Scholkopf, B., Platt, J. C., Shawe-Taylor, J., Smola, A. J., and Williamson, R. C.,Estimating the support of a high-dimensional distribution," Neural computation 13(7), 1443-1471 (2001).
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Scholkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
18
-
-
84897514005
-
Domain adaptation under target and conditional shift
-
Zhang, K., Scholkopf, B., Muandet, K., and Wang, Z.,Domain adaptation under target and conditional shift," in [Proc. 30th International Conference on Machine Learning (ICML 2013)], (2013).
-
(2013)
Proc. 30th International Conference on Machine Learning (ICML 2013)]
-
-
Zhang, K.1
Scholkopf, B.2
Muandet, K.3
Wang, Z.4
-
19
-
-
80053005547
-
Break Our Steganographic System': The ins and outs of organizing BOSS
-
Springer
-
Bas, P., Filler, T., and Pevny, T.,̀Break Our Steganographic System': The ins and outs of organizing BOSS," in [Proc. 13th Information Hiding Workshop], LNCS 6958, 59-70, Springer (2011).
-
(2011)
Proc. 13th Information Hiding Workshop LNCS
, vol.6958
, pp. 59-70
-
-
Bas, P.1
Filler, T.2
Pevny, T.3
|