Search
Now showing items 1-10 of 75
Security Pattern Evaluation
Publisher: IEEE
Year: 2014
A New Fast and Efficient Active Steganalysis Based on Combined Geometrical Blind Source Separation
Year: 2014
Abstract:
We have presented a new active steganalysis method in order to break the block-discrete cosine transform (DCT) coefficients steganography. Our method is based on a combination of the Blind Source Separation (BSS) technique and Maximum A posteriori...
Active Steganalysis of Transform Domain Steganography Based on Sparse Component Analysis
Year: 2015
Abstract:
This paper presents a new active steganalysis method to break the transform domain steganography. Most of steganalysis techniques focus on detecting the presence or absence of a secret message in a cover (passive steganalysis), ...
Kinship verification using facial dynamics
Publisher: IEEE
Year: 2014
Efficient network service level agreement monitoring for cloud computing systems
Publisher: IEEE
Year: 2014
Development of optoelectronic system for subdural hematoma diagnostics
Publisher: IEEE
Year: 2014
Proceedings contents
Publisher: IEEE
Year: 2014
Robot manipulator control based on the inner-learning mechanism
Publisher: IEEE
Year: 2014