Research progress of zero-shot learning
X Sun, J Gu, H Sun - Applied Intelligence, 2021 - Springer
Although there have been encouraging breakthroughs in supervised learning since the
renaissance of deep learning, the recognition of large-scale object classes remains a …
renaissance of deep learning, the recognition of large-scale object classes remains a …
[PDF][PDF] Steganalysis of LSB embedded images using gray level co-occurrence matrix
HB Kekre, AA Athawale, SA Patki - International Journal of image …, 2011 - Citeseer
This paper proposes a steganalysis technique for both grayscale and color images. It uses
the feature vectors derived from gray level co-occurrence matrix (GLCM) in spatial domain …
the feature vectors derived from gray level co-occurrence matrix (GLCM) in spatial domain …
Audio postprocessing detection based on amplitude cooccurrence vector feature
Authentication of audio signals is an important problem in multimedia forensics. Tampering
is typically followed by postprocessing that aims to remove the traces of the forgery. The …
is typically followed by postprocessing that aims to remove the traces of the forgery. The …
Feature selection for steganalysis based on modified Stochastic Diffusion Search using Fisher score
The steganalysis process comprises of two major components feature extraction and
classification based on the extracted features. The high dimension of feature sets used for …
classification based on the extracted features. The high dimension of feature sets used for …
[PDF][PDF] Improved steganalysis of lsb embedded color images based on stego-sensitive threshold close color pair signature
HB Kekre, AA Athawale, SA Patki - International Journal of …, 2011 - researchgate.net
This paper proposes a method for the detection of the Least Significant Bit (LSB)
steganography using images as cover objects. Steganography methods attempt to insert …
steganography using images as cover objects. Steganography methods attempt to insert …
Transparent authentication in E-learning
In the context of on-line assessment in E-learning a problem arises is that someone taking
an exam may wish to cheat by handing over personal credentials to someone to take their …
an exam may wish to cheat by handing over personal credentials to someone to take their …
FS-EHS: harmony search based feature selection algorithm for steganalysis using ELM
The process of steganalysis involves feature extraction and classification based on feature
sets. The high dimension of feature sets used for steganalysis makes classification a …
sets. The high dimension of feature sets used for steganalysis makes classification a …
Steganography forensics method for detecting least significant bit replacement attack
X Wang, C Wei, X Han - Journal of Electronic Imaging, 2015 - spiedigitallibrary.org
We present an image forensics method to detect least significant bit replacement
steganography attack. The proposed method provides fine-grained forensics features by …
steganography attack. The proposed method provides fine-grained forensics features by …
FS-SDS: Feature selection for JPEG steganalysis using stochastic diffusion search
Feature extraction and classification based on feature sets are two major components of
steganalysis process. The high dimension of feature sets used for steganalysis makes …
steganalysis process. The high dimension of feature sets used for steganalysis makes …
StegTrack: tracking images with hidden content
This paper presents the design and implementation of StegTrack, a novel proactive
steganalysis tool. StegTrack is an antivirus like tool to track steganograms among images on …
steganalysis tool. StegTrack is an antivirus like tool to track steganograms among images on …