Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An overview of steganography techniques applied to the protection of biometric data
Identification of persons by way of biometric features is an emerging phenomenon. Over the
years, biometric recognition has received much attention due to its need for security …
years, biometric recognition has received much attention due to its need for security …
Three-dimensional mesh steganography and steganalysis: A review
Three-dimensional (3-D) meshes are commonly used to represent virtual surfaces and
volumes. Over the past decade, 3-D meshes have emerged in industrial, medical, and …
volumes. Over the past decade, 3-D meshes have emerged in industrial, medical, and …
Applications of machine learning in cryptography: a survey
MM Alani - Proceedings of the 3rd International Conference on …, 2019 - dl.acm.org
Machine learning techniques have had a long list of applications in recent years. However,
the use of machine learning in information and network security is not new. Machine …
the use of machine learning in information and network security is not new. Machine …
Compact image steganalysis for LSB-matching steganography
O Juarez-Sandoval… - … on Biometrics and …, 2017 - ieeexplore.ieee.org
In this paper, we propose a compact image steganalysis method for the LSB-matching
steganography, in which a feature vector composed by only 12 elements is extracted from …
steganography, in which a feature vector composed by only 12 elements is extracted from …
Moderate embed cross validated and feature reduced Steganalysis using principal component analysis in spatial and transform domain with Support Vector Machine …
The fast evolution of Information and Digital technology had given way for internet to be an
effective medium for communication. This has also paved way for data exploitation …
effective medium for communication. This has also paved way for data exploitation …
Passive steganalysis evaluation: reliabilities of modern quantitative steganalysis algorithms
N Prokhozhev, O Mikhailichenko, A Sivachev… - Proceedings of the First …, 2016 - Springer
This paper presents initial results from experiments which perform statistically accurate
evaluation of the reliability of modern quantitative statistical steganalysis algorithms. The …
evaluation of the reliability of modern quantitative statistical steganalysis algorithms. The …
UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media
This paper presents the general goals of Horizon 2020 project UNCOVER, whose overall
purpose is to close the gap between academic work and operational needs in the fields of …
purpose is to close the gap between academic work and operational needs in the fields of …
A hybrid of clustering and quantum genetic algorithm for relevant genes selection for cancer microarray data
In order to efficiently explore and exploit large search space, quantum variant of genetic
algorithm has been suggested in literature. It utilizes quantum computing principle and …
algorithm has been suggested in literature. It utilizes quantum computing principle and …
Feature selection for steganalysis based on modified Stochastic Diffusion Search using Fisher score
The steganalysis process comprises of two major components feature extraction and
classification based on the extracted features. The high dimension of feature sets used for …
classification based on the extracted features. The high dimension of feature sets used for …
Steganalysis using LSB-focused statistical features
In this paper, we present an image steganalysis model with a new texture feature set that is
designed to take into consideration the pattern of embedding locations in a cover image …
designed to take into consideration the pattern of embedding locations in a cover image …