-
1Conference
المؤلفون: Chang, Ya-Ting, Wu, Min-Hao, Wang, Shiuh-Jeng
المساهمون: Central Police University (CPU), National Central University Taiwan (NCU), David Hutchison, Takeo Kanade, Bernhard Steffen, Demetri Terzopoulos, Doug Tygar, Gerhard Weikum, Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You, Josef Kittler, Jon M. Kleinberg, Alfred Kobsa, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, TC 5, TC 8
المصدر: Lecture Notes in Computer Science ; 2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia) ; https://hal.inria.fr/hal-01397281 ; 2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.633-642, ⟨10.1007/978-3-642-55032-4_65⟩
مصطلحات موضوعية: Steganalysis, data hiding detection, vector quantization, group strategy, [INFO]Computer Science [cs], [SHS.INFO]Humanities and Social Sciences/Library and information sciences
Relation: hal-01397281; https://hal.inria.fr/hal-01397281; https://hal.inria.fr/hal-01397281/document; https://hal.inria.fr/hal-01397281/file/978-3-642-55032-4_65_Chapter.pdf