Extracting relevant features of steganographic schemes by feature selection techniques
暂无分享,去创建一个
Amaury Lendasse | Yoan Miche | Olli Simula | Christian Jutten | Patrick Bas | C. Jutten | O. Simula | Y. Miché | P. Bas | A. Lendasse
[1] Richard Bellman,et al. Adaptive Control Processes: A Guided Tour , 1961, The Mathematical Gazette.
[2] A. Wayne Whitney,et al. A Direct Method of Nonparametric Measurement Selection , 1971, IEEE Transactions on Computers.
[3] Josef Kittler,et al. Pattern recognition : a statistical approach , 1982 .
[4] W. R. Schucany,et al. Gaussian‐based kernels , 1990 .
[5] Jooyoung Park,et al. Universal Approximation Using Radial-Basis-Function Networks , 1991, Neural Computation.
[6] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[7] S. T. Buckland,et al. An Introduction to the Bootstrap , 1994 .
[8] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[9] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[10] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[11] Joachim M. Buhmann,et al. Feature selection for support vector machines , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[12] Hoon Kim,et al. Monte Carlo Statistical Methods , 2000, Technometrics.
[13] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[14] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[15] Michel Verleysen,et al. On the Effects of Dimensionality on Data Analysis with Neural Networks , 2009, IWANN.
[16] Christian P. Robert,et al. Monte Carlo Statistical Methods , 2005, Springer Texts in Statistics.
[17] Jessica J. Fridrich,et al. Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes , 2004, Information Hiding.
[18] Michel Verleysen,et al. The Curse of Dimensionality in Data Mining and Time Series Prediction , 2005, IWANN.
[19] Amaury Lendasse,et al. A Feature Selection Methodology for Steganalysis , 2006, MRCS.
[20] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[21] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[22] D. François. High-dimensional data analysis : optimal metrics and feature selection/ , 2007 .
[23] M. Kenward,et al. An Introduction to the Bootstrap , 2007 .