• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,132
Next 10 →

Weighted stego-image steganalysis for JPEG covers

by Rainer Böhme - INFORMATION HIDING. LNCS 5284 , 2008
"... This paper contains two new results for the quantitative detector of LSB replacement steganography based on a weighted stegoimage (WS). First, for spatial domain steganalysis, a variant of the WS method is known to be highly accurate only when cover images have never been subject to lossy compress ..."
Abstract - Cited by 15 (2 self) - Add to MetaCart
compression. We propose a new variant of WS which increases the accuracy for JPEG pre-processed covers by one order of magnitude, thus leaving behind the best structural detectors which were known to be more robust on JPEG pre-compressed covers than WS. Second, we explain why WS-like estimators can also

PRE-PROCESSING METHOD WITH SURROGATE CONSTRAINT ALGORITHM FOR THE SET COVERING PROBLEM

by Y. Xu, et al.
"... In this article, we present a pre-processing method with surrogate constraint algorithm for non-unicost set-covering problems. Computational results, based upon problems involving up to 400 rows and 4000 columns, indicate that the enhanced algorithm produces better quality results than other heurist ..."
Abstract - Add to MetaCart
In this article, we present a pre-processing method with surrogate constraint algorithm for non-unicost set-covering problems. Computational results, based upon problems involving up to 400 rows and 4000 columns, indicate that the enhanced algorithm produces better quality results than other

Pre-processing of Bilingual Corpora for Mandarin-English EBMT

by Ying Zhang, Ralf Brown, Robert Frederking, Alon Lavie - Proceedings of MT Summit VIII. 2001 , 2001
"... Pre-processing of bilingual corpora plays an important role in Example-Based Machine Translation (EBMT) and Statistical-Based Machine Translation (SBMT). For our Mandarin-English EBMT system, pre-processing includes segmentation for Mandarin, bracketing for English and building a statistical diction ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Pre-processing of bilingual corpora plays an important role in Example-Based Machine Translation (EBMT) and Statistical-Based Machine Translation (SBMT). For our Mandarin-English EBMT system, pre-processing includes segmentation for Mandarin, bracketing for English and building a statistical

Steganalysis of JPEG Images: Breaking the F5 Algorithm

by Jessica Fridrich, Miroslav Goljan, Dorin Hogea - in 5th International Workshop on Information Hiding , 2002
"... Abstract. In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done by decompress ..."
Abstract - Cited by 79 (5 self) - Add to MetaCart
Abstract. In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done

Time Series Data Analysis and Pre-process on

by Large Databases Gongde, Gongde Guo, Hui Wang, David Bell , 2002
"... In this paper we introduce a novel classification algorithm called MCC (Minimal Cover Classification), which works well for numerical data and categorical data. Given a new data tuple, it provides values for each class that measures the likelihood of the tuple belonging to that class. We then apply ..."
Abstract - Add to MetaCart
in the time domain. The experimental result shows that the MCC algorithm is comparable to C4.5. Using MCC as a mining algorithm to predict the `upward' or `downward' trend of k-day stock returns, the average hit rate on pre-processed data is 20.55% higher than that on the original data. This means

Semi-Fragile Watermarking for Authenticating JPEG Visual Content

by Ching-Yung Lin, Shih-fu Chang , 2000
"... In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation of the ..."
Abstract - Cited by 75 (8 self) - Add to MetaCart
In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation

Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes

by Jessica Fridrich - in Proc. Inf. Hiding Workshop, Springer LNCS
"... Abstract. In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embedding mechanisms. The detection method is a linear classifier trained on feature vectors corresponding to cove ..."
Abstract - Cited by 110 (13 self) - Add to MetaCart
Abstract. In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embedding mechanisms. The detection method is a linear classifier trained on feature vectors corresponding

Evaluation of Image Pre-Processing Techniques for Eigenface Based Face Recognition

by Thomas Heseltine, Nick Pears, Jim Austin , 2002
"... We present a range of image processing techniques as potential pre-processing steps, which attempt to improve the performance of the eigenface method of face recognition. Verification tests are carried out by applying thresholds to gather false acceptance rate (FAR) and false rejection rate (FRR) re ..."
Abstract - Cited by 23 (4 self) - Add to MetaCart
We present a range of image processing techniques as potential pre-processing steps, which attempt to improve the performance of the eigenface method of face recognition. Verification tests are carried out by applying thresholds to gather false acceptance rate (FAR) and false rejection rate (FRR

Data Reduction with Design of Experiments (DoE) for Data Mining Pre-Processing

by unknown authors
"... Abstract—Building analytical solutions on a data warehouse or departmental data mart often require a serious process of data preparation which poses a serious effort challenge in choosing the quantum and quality of variables that are most appropriate for analysis. While many techniques are used toda ..."
Abstract - Add to MetaCart
the choice of techniques and this paper presents how one such technique – the Design of Experiments or more popularly DoE, can tremendously help in data reduction during pre-processing of data for data mining initiatives, thereby indicating a significant saving in costs and time. The paper covers a short

IMAGE TRANSMORPHING WITH JPEG

by Lin Yuan, Touradj Ebrahimi
"... Picture-related applications are extremely popular because pictures present attractive and vivid information. Nowadays, people record everyday life, communicate with each other, and enjoy entertainment using various interesting imaging applications. In many cases, processed images need to be re-cove ..."
Abstract - Add to MetaCart
version while preserving sufficient information about the original image in the processed im-age. It does this by inserting partial information about the original image in the application markers of the processed JPEG image file, so that the original image can be later re-covered. Experiments
Next 10 →
Results 1 - 10 of 1,132
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University