4.6 Article

Deep residual learning for image steganalysis

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

How important is location information in saliency detection of natural images

Tongwei Ren et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

Underwater image de-scattering and classification by deep neural network

Yujie Li et al.

COMPUTERS & ELECTRICAL ENGINEERING (2016)

Article Computer Science, Theory & Methods

Content-Adaptive Steganography by Minimizing Statistical Detectability

Vahid Sedighi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Artificial Intelligence

Query-oriented unsupervised multi-document summarization via deep learning model

Sheng-hua Zhong et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Theory & Methods

A Strategy of Clustering Modification Directions in Spatial Image Steganography

Bin Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

A reversible data hiding method with contrast enhancement for medical images

Hao-Tian Wu et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2015)

Article Computer Science, Information Systems

Standard Plane Localization in Fetal Ultrasound via Domain Transferred Deep Neural Networks

Hao Chen et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2015)

Article Computer Science, Information Systems

Soft-assigned bag of features for object tracking

Tongwei Ren et al.

MULTIMEDIA SYSTEMS (2015)

Article Computer Science, Artificial Intelligence

On the Complexity of Neural Network Classifiers: A Comparison Between Shallow and Deep Architectures

Monica Bianchini et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2014)

Article Computer Science, Theory & Methods

Random Projections of Residuals for Digital Image Steganalysis

Vojtech Holub et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Theory & Methods

Ensemble Classifiers for Steganalysis of Digital Media

Jan Kodovsky et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Rich Models for Steganalysis of Digital Images

Jessica Fridrich et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Steganalysis by Subtractive Pixel Adjacency Matrix

Tomas Pevny et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Review Engineering, Electrical & Electronic

Digital image steganography: Survey and analysis of current methods

Abbas Cheddad et al.

SIGNAL PROCESSING (2010)

Article Computer Science, Theory & Methods

Steganalysis of YASS

Bin Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)

Article Computer Science, Hardware & Architecture

Cyber warfare: Steganography vs. steganalysis

HQ Wang et al.

COMMUNICATIONS OF THE ACM (2004)