Research progress of zero-shot learning

X Sun, J Gu, H Sun - Applied Intelligence, 2021 - Springer
Although there have been encouraging breakthroughs in supervised learning since the
renaissance of deep learning, the recognition of large-scale object classes remains a …

[PDF][PDF] Steganalysis of LSB embedded images using gray level co-occurrence matrix

HB Kekre, AA Athawale, SA Patki - International Journal of image …, 2011 - Citeseer
This paper proposes a steganalysis technique for both grayscale and color images. It uses
the feature vectors derived from gray level co-occurrence matrix (GLCM) in spatial domain …

Audio postprocessing detection based on amplitude cooccurrence vector feature

D Luo, M Sun, J Huang - IEEE Signal Processing Letters, 2016 - ieeexplore.ieee.org
Authentication of audio signals is an important problem in multimedia forensics. Tampering
is typically followed by postprocessing that aims to remove the traces of the forgery. The …

Feature selection for steganalysis based on modified Stochastic Diffusion Search using Fisher score

V Bhasin, P Bedi, A Singhal - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
The steganalysis process comprises of two major components feature extraction and
classification based on the extracted features. The high dimension of feature sets used for …

[PDF][PDF] Improved steganalysis of lsb embedded color images based on stego-sensitive threshold close color pair signature

HB Kekre, AA Athawale, SA Patki - International Journal of …, 2011 - researchgate.net
This paper proposes a method for the detection of the Least Significant Bit (LSB)
steganography using images as cover objects. Steganography methods attempt to insert …

Transparent authentication in E-learning

NF Fadhel, GB Wills, D Argles - International Conference on …, 2011 - ieeexplore.ieee.org
In the context of on-line assessment in E-learning a problem arises is that someone taking
an exam may wish to cheat by handing over personal credentials to someone to take their …

FS-EHS: harmony search based feature selection algorithm for steganalysis using ELM

V Bhasin, P Bedi, N Singh, C Aggarwal - … (IBICA 2015) held in Kochi, India …, 2016 - Springer
The process of steganalysis involves feature extraction and classification based on feature
sets. The high dimension of feature sets used for steganalysis makes classification a …

Steganography forensics method for detecting least significant bit replacement attack

X Wang, C Wei, X Han - Journal of Electronic Imaging, 2015 - spiedigitallibrary.org
We present an image forensics method to detect least significant bit replacement
steganography attack. The proposed method provides fine-grained forensics features by …

FS-SDS: Feature selection for JPEG steganalysis using stochastic diffusion search

P Bedi, V Bhasin, N Mittal… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Feature extraction and classification based on feature sets are two major components of
steganalysis process. The high dimension of feature sets used for steganalysis makes …

StegTrack: tracking images with hidden content

V Bhasin, P Bedi, A Goel, S Gupta - Proceedings of the Third …, 2015 - dl.acm.org
This paper presents the design and implementation of StegTrack, a novel proactive
steganalysis tool. StegTrack is an antivirus like tool to track steganograms among images on …