Publikace UTB
Repozitář publikační činnosti UTB

Steganography detection by means of neural networks

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Steganography detection by means of neural networks en
dc.contributor.author Komínková Oplatková, Zuzana
dc.contributor.author Hološka, Jiří
dc.contributor.author Zelinka, Ivan
dc.contributor.author Šenkeřík, Roman
dc.relation.ispartof DEXA 2008: 19th International Conference on Database and Expert Systems Applications, Proceedings
dc.identifier.issn 1529-4188 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-0-7695-3299-8
dc.date.issued 2008
dc.citation.spage 571
dc.citation.epage 575
dc.event.title 19th International Conference on Database and Expert Systems Applications
dc.event.location Turin
utb.event.state-en Italy
utb.event.state-cs Itálie
dc.event.sdate 2008-09-01
dc.event.edate 2008-09-05
dc.type conferenceObject
dc.language.iso en
dc.publisher The Institute of Electrical and Electronics Engineers (IEEE) en
dc.identifier.doi 10.1109/DEXA.2008.82
dc.relation.uri http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4624651&arnumber=4624778&count=160&index=126&tag=1
dc.description.abstract Cryptography is one of very much spoken word nowadays. Security of messages transfer is very important and specialists have a work to think a new cryptography up. Cryptography, on the other hand, can be and is very often used by jailbirds, so cryptanalysts have also very important job to detect and reveal and then decode the coded messages. Steganography is additional method leading to better secure up messages which goes hand by hand with cryptography, that why reveal of such a message is not easy. This paper deals with neural network models that are able to detect steganography content coded by a program OutGuess. Neural networks are methods which are very flexible in learning to different and difficult problems. Results in this article show that used model had almost 100% success in revealing steganography by means of OutGuess. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1001856
utb.identifier.rivid RIV/70883521:28140/08:63507088!RIV09-GA0-28140___
utb.identifier.obdid 43857089
utb.identifier.scopus 2-s2.0-57849140790
utb.identifier.wok 000259487400096
utb.source d-wok
dc.date.accessioned 2011-08-09T07:34:06Z
dc.date.available 2011-08-09T07:34:06Z
utb.contributor.internalauthor Komínková Oplatková, Zuzana
utb.contributor.internalauthor Hološka, Jiří
utb.contributor.internalauthor Zelinka, Ivan
utb.contributor.internalauthor Šenkeřík, Roman
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam