Related references
Note: Only part of the references are listed.How important is location information in saliency detection of natural images
Tongwei Ren et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
Underwater image de-scattering and classification by deep neural network
Yujie Li et al.
COMPUTERS & ELECTRICAL ENGINEERING (2016)
Content-Adaptive Steganography by Minimizing Statistical Detectability
Vahid Sedighi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Query-oriented unsupervised multi-document summarization via deep learning model
Sheng-hua Zhong et al.
EXPERT SYSTEMS WITH APPLICATIONS (2015)
A Strategy of Clustering Modification Directions in Spatial Image Steganography
Bin Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
A reversible data hiding method with contrast enhancement for medical images
Hao-Tian Wu et al.
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2015)
Standard Plane Localization in Fetal Ultrasound via Domain Transferred Deep Neural Networks
Hao Chen et al.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2015)
Soft-assigned bag of features for object tracking
Tongwei Ren et al.
MULTIMEDIA SYSTEMS (2015)
On the Complexity of Neural Network Classifiers: A Comparison Between Shallow and Deep Architectures
Monica Bianchini et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2014)
Random Projections of Residuals for Digital Image Steganalysis
Vojtech Holub et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Ensemble Classifiers for Steganalysis of Digital Media
Jan Kodovsky et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Rich Models for Steganalysis of Digital Images
Jessica Fridrich et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Steganalysis by Subtractive Pixel Adjacency Matrix
Tomas Pevny et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)
Digital image steganography: Survey and analysis of current methods
Abbas Cheddad et al.
SIGNAL PROCESSING (2010)
Steganalysis of YASS
Bin Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)
Cyber warfare: Steganography vs. steganalysis
HQ Wang et al.
COMMUNICATIONS OF THE ACM (2004)