Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/6070
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLi, Liyun-
dc.contributor.authorSencar, Hüsrev Taha-
dc.contributor.authorMemon, Nasir-
dc.date.accessioned2021-09-11T15:34:52Z-
dc.date.available2021-09-11T15:34:52Z-
dc.date.issued2013en_US
dc.identifier.citationConference on Media Watermarking, Security, and Forensics -- FEB 05-07, 2013 -- Burlingame, CAen_US
dc.identifier.isbn978-0-8194-9438-2-
dc.identifier.issn0277-786X-
dc.identifier.issn1996-756X-
dc.identifier.urihttps://doi.org/10.1117/12.2008527-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/6070-
dc.description.abstractAn important issue concerning real-world deployment of steganalysis systems is the computational cost of acquiring features used in building steganalyzers. Conventional approach to steganalyzer design crucially assumes that all features required for steganalysis have to be computed in advance. However, as the number of features used by typical steganalyzers grow into thousands and timing constraints are imposed on how fast a decision has to be made, this approach becomes impractical. To address this problem, we focus on machine learning aspect of steganalyzer design and introduce a decision tree based approach to steganalysis. The proposed steganalyzer system can minimize the average computational cost for making a steganalysis decision while still maintaining the detection accuracy. To demonstrate the potential of this approach, a series of experiments are performed on well known steganography and steganalysis techniques.en_US
dc.description.sponsorshipSoc Imaging Sci & Technol, SPIE, Qualcomm Incen_US
dc.language.isoenen_US
dc.publisherSpie-Int Soc Optical Engineeringen_US
dc.relation.ispartofMedia Watermarking, Security, And Forensics 2013en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectcomputational cost effectiveen_US
dc.subjectdecision treeen_US
dc.subjectsteganographyen_US
dc.titleA Cost-Effective Decision Tree Based Approach to Steganalysisen_US
dc.typeConference Objecten_US
dc.relation.ispartofseriesProceedings of SPIEen_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.volume8665en_US
dc.identifier.wosWOS:000329576200023en_US
dc.identifier.scopus2-s2.0-84878432433en_US
dc.institutionauthorSencar, Hüsrev Taha-
dc.identifier.doi10.1117/12.2008527-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.relation.conferenceConference on Media Watermarking, Security, and Forensicsen_US
dc.identifier.scopusquality--
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextnone-
item.fulltextNo Fulltext-
item.openairetypeConference Object-
item.cerifentitytypePublications-
item.languageiso639-1en-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

1
checked on Mar 23, 2024

Page view(s)

24
checked on Mar 25, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.