-
1
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
T. Pevny, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. Information Hiding Workshop (IH'2010), pp. 161-177, 2010.
-
(2010)
Proc. Information Hiding Workshop (IH'2010)
, pp. 161-177
-
-
Pevny, T.1
Filler, T.2
Bas, P.3
-
2
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
T. Pevny, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevny, T.1
Bas, P.2
Fridrich, J.3
-
3
-
-
84860434682
-
Rich models for steganalysis of digital images
-
J. Fridrich, and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.3
, pp. 868-882
-
-
Fridrich, J.1
Kodovsky, J.2
-
4
-
-
84888323613
-
Random projections of residuals for digital image steganalysis
-
V. Holub, and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1996-2006, 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 1996-2006
-
-
Holub, V.1
Fridrich, J.2
-
5
-
-
84927741168
-
Adaptive steganalysis against WOW embedding algorithm
-
W. Tang, H. Li, W. Luo, and J. Huang, "Adaptive steganalysis against WOW embedding algorithm," in Proc. 2nd ACM Information Hiding and Multimedia Security Workshop (IH&MMSec' 14), pp. 91-96, 2014.
-
(2014)
Proc. 2nd ACM Information Hiding and Multimedia Security Workshop (IH&MMSec' 14)
, pp. 91-96
-
-
Tang, W.1
Li, H.2
Luo, W.3
Huang, J.4
-
6
-
-
84858263654
-
Ensemble classifiers for steganalysis of digital media
-
J. Kodovsky, and J. Fridrich, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 432-444
-
-
Kodovsky, J.1
Fridrich, J.2
-
7
-
-
69349090197
-
Learning deep architectures for AI
-
Y. Bengio, "Learning deep architectures for AI," Foundations and Trends in Machine Learning, vol. 2, no. 1, pp. 1-127, 2009.
-
(2009)
Foundations and Trends in Machine Learning
, vol.2
, Issue.1
, pp. 1-127
-
-
Bengio, Y.1
-
8
-
-
0032203257
-
Gradient-based learning applied to document recognition
-
Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, "Gradient-based learning applied to document recognition," Proc. IEEE, vol. 86, no. 11, pp. 2278-2324, 1998.
-
(1998)
Proc. IEEE
, vol.86
, Issue.11
, pp. 2278-2324
-
-
Lecun, Y.1
Bottou, L.2
Bengio, Y.3
Haffner, P.4
-
9
-
-
79959353548
-
Stacked convolutional auto-encoders for hierarchical feature extraction
-
J. Masci, U. Meier, D. Ciresan, and J. Schmidhuber, "Stacked convolutional auto-encoders for hierarchical feature extraction," in Proc. 21th international conference on artificial neural networks (ICANN'11), 2011.
-
(2011)
Proc. 21th International Conference on Artificial Neural Networks (ICANN'11)
-
-
Masci, J.1
Meier, U.2
Ciresan, D.3
Schmidhuber, J.4
-
12
-
-
84897484337
-
Deep learning with COTS HPC systems
-
A. Coates, B. Huval, T. Wang, D. Wu, B. Catanzaro, and A. Ng, "Deep learning with COTS HPC systems", in Proc. 30th international conference on machine learning (ICML'13), 2013.
-
(2013)
Proc. 30th International Conference on Machine Learning (ICML'13)
-
-
Coates, A.1
Huval, B.2
Wang, T.3
Wu, D.4
Catanzaro, B.5
Ng, A.6
|