Information Sciences Volume 180, Issue 9, pp. 1643-1655, May 2010
Cited by
Year 2013 : 3 citations
Steganography content detection by means of feedforward neural network
ZK Oplatková, J Hološka, R Šenke?ík - International Journal of …, 2013 - Inderscience
Blind Steganalysis with Modified Markov Features and RBFNN
RL Priya, P Eswaran, SLP Kamakshi - International Journal of Engineering, 2013 - ijert.org
Multi-class JPEG Steganalysis using Extreme Learning Machine
V Bhasin, P Bedi - Advances in Computing, Communications …, 2013 - ieeexplore.ieee.org
Year 2012 : 10 citations
Steganalysis of JPEG images using rich models
J Kodovský, J Fridrich - IS&T/SPIE …, 2012 - proceedings.spiedigitallibrary.org
An intelligent chaotic embedding approach to enhance stego-image quality
R Amirtharajan, JB Balaguru Rayappan - Information Sciences, 2012 - Elsevier
Improved contourlet-based steganalysis using binary particle swarm optimization and radial basis neural networks
M Sheikhan, M Pezhmanpour, MS Moin - Neural Computing and …, 2012 - Springer
Steganalysis of Digital Images Using Rich Image Representations and Ensemble Classifiers
J Kodovský - 2012 - dde.binghamton.edu
Identification of smartphone-image source and manipulation
Q Liu, X Li, L Chen, H Cho, PA Cooper, Z Chen… - Advanced Research in …, 2012 - Springer
Novel robust image watermarking based on subsampling and DWT
W Lu, W Sun, H Lu - Multimedia Tools and Applications, 2012 - Springer
MP3 audio steganalysis
M Qiao, AH Sung, Q Liu - Information Sciences, 2012 - Elsevier
Steganography: Dct Coefficient Replacement Method and Compare With Jsteg Algorithm
H Sheisi, J Mesgarian, M Rahmani - International Journal of Computer …, 2012 - ijcee.org
Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
Q Liu, X Li, PA Cooper, X Hu - … of the Twelfth International Workshop on …, 2012 - dl.acm.org
Efficient steganalysis of images: learning is good for anticipation
D Ziou, R Jafari - Pattern Analysis and Applications, 2012 - Springer
Year 2011 : 12 citations
Neighboring joint density-based JPEG steganalysis
Q Liu, AH Sung, M Qiao - ACM Transactions on Intelligent Systems and …, 2011 - dl.acm.org
Covered CDMA multi-user writing on spatially divided image
R Amirtharajan, JBB Rayappan - … , Information Theory and …, 2011 - ieeexplore.ieee.org
Tabu search based multi-watermarks embedding algorithm with multiple description coding
HC Huang, SC Chu, JS Pan, CY Huang, BY Liao - Information Sciences, 2011 - Elsevier
Applying electromagnetism-like mechanism for feature selection
CT Su, HC Lin - Information Sciences, 2011 - Elsevier
Gene selection and classification for cancer microarray data based on machine learning and similarity measures
Q Liu, A Sung, Z Chen, J Liu, L Chen, M Qiao… - BMC …, 2011 - biomedcentral.com
Blind steganalysis with high generalization capability for different image databases using L-GEM
WWY Ng, ZM He, PPK Chan… - Machine Learning and …, 2011 - ieeexplore.ieee.org
Steganalysis of Internet data, a feasibility study
I Gholampour, H Khalilian… - … Systems (CNDS), 2011 …, 2011 - ieeexplore.ieee.org
A JPEG-based statistically invisible steganography
Q Liu, AH Sung, Z Chen, X Huang - Proceedings of the Third …, 2011 - dl.acm.org
Feature Mining and Pattern Recognition in Multimedia Forensics—Detection of JPEG Image Based Steganography, Double-Compression, Interpolation and WAV …
Q Liu, AH Sung, M Qiao, B Ribeiro, Z Chen - … , Machine Intelligence and …, 2011 - Springer
Convergence between fuzzy logic and steganography for high payload data embedding and more security
MH Goodarzi, A Zaeim… - … Systems, Services, and …, 2011 - ieeexplore.ieee.org
Renkli ?mgelerde Gizlenen Verilerin Görsel Ataklara Kar?? Dayan?kl?l???n?n Tespiti ?çin Bir Steganografi Uygulamas?
TT? Do?an, E Avc? - firat.edu.tr
Year 2010 : 6 citations
Revealing real quality of double compressed MP3 audio
M Qiao, AH Sung, Q Liu - Proceedings of the international conference on …, 2010 - dl.acm.org
Detection of double MP3 compression
Q Liu, AH Sung, M Qiao - Cognitive Computation, 2010 - Springer
Predicting embedding strength in audio steganography
M Qiao, AH Sung, Q Liu - Cognitive Informatics (ICCI), 2010 9th …, 2010 - ieeexplore.ieee.org
A novel source MPEG-2 video identification algorithm
Y Su, J Xu, B Dong, J Zhang, Q Liu - International Journal of Pattern …, 2010 - World Scientific
Improved Approaches to Steganalysis and Seam-carved Forgery Detection in JPEG Images
Q LIU, Z CHEN - 2010 - tist.acm.org