Login / Signup
Detecting novel steganography with an anomaly-based strategy.
Jacob T. Jackson
Gregg H. Gunsch
Roger L. Claypoole Jr.
Gary B. Lamont
Published in:
J. Electronic Imaging (2004)
Keyphrases
</>
detecting anomalies
anomaly detection
intrusion detection
artificial intelligence
data sets
knowledge base
image processing
information security
real time
databases
real world
learning algorithm
website
multi agent
data hiding