On dangers of overtraining steganography to incomplete cover model.
Jan KodovskýJessica J. FridrichVojtech HolubPublished in: MM&Sec (2011)
Keyphrases
- computational model
- formal model
- probabilistic model
- mathematical model
- statistical model
- artificial neural networks
- experimental data
- high level
- hierarchical structure
- em algorithm
- theoretical analysis
- analytical model
- database
- missing values
- digital images
- motion estimation
- cost function
- objective function
- information systems