Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/6070
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, Liyun | - |
dc.contributor.author | Sencar, Hüsrev Taha | - |
dc.contributor.author | Memon, Nasir | - |
dc.date.accessioned | 2021-09-11T15:34:52Z | - |
dc.date.available | 2021-09-11T15:34:52Z | - |
dc.date.issued | 2013 | en_US |
dc.identifier.citation | Conference on Media Watermarking, Security, and Forensics -- FEB 05-07, 2013 -- Burlingame, CA | en_US |
dc.identifier.isbn | 978-0-8194-9438-2 | - |
dc.identifier.issn | 0277-786X | - |
dc.identifier.issn | 1996-756X | - |
dc.identifier.uri | https://doi.org/10.1117/12.2008527 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/6070 | - |
dc.description.abstract | An important issue concerning real-world deployment of steganalysis systems is the computational cost of acquiring features used in building steganalyzers. Conventional approach to steganalyzer design crucially assumes that all features required for steganalysis have to be computed in advance. However, as the number of features used by typical steganalyzers grow into thousands and timing constraints are imposed on how fast a decision has to be made, this approach becomes impractical. To address this problem, we focus on machine learning aspect of steganalyzer design and introduce a decision tree based approach to steganalysis. The proposed steganalyzer system can minimize the average computational cost for making a steganalysis decision while still maintaining the detection accuracy. To demonstrate the potential of this approach, a series of experiments are performed on well known steganography and steganalysis techniques. | en_US |
dc.description.sponsorship | Soc Imaging Sci & Technol, SPIE, Qualcomm Inc | en_US |
dc.language.iso | en | en_US |
dc.publisher | Spie-Int Soc Optical Engineering | en_US |
dc.relation.ispartof | Media Watermarking, Security, And Forensics 2013 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | computational cost effective | en_US |
dc.subject | decision tree | en_US |
dc.subject | steganography | en_US |
dc.title | A Cost-Effective Decision Tree Based Approach To Steganalysis | en_US |
dc.type | Conference Object | en_US |
dc.relation.ispartofseries | Proceedings of SPIE | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.volume | 8665 | en_US |
dc.identifier.wos | WOS:000329576200023 | en_US |
dc.identifier.scopus | 2-s2.0-84878432433 | en_US |
dc.institutionauthor | Sencar, Hüsrev Taha | - |
dc.identifier.doi | 10.1117/12.2008527 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.relation.conference | Conference on Media Watermarking, Security, and Forensics | en_US |
dc.identifier.scopusquality | - | - |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
1
checked on Dec 21, 2024
Page view(s)
68
checked on Dec 16, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.