Kontaktujte nás | Jazyk: čeština English
dc.title | Steganography detection by means of neural networks | en |
dc.contributor.author | Komínková Oplatková, Zuzana | |
dc.contributor.author | Hološka, Jiří | |
dc.contributor.author | Zelinka, Ivan | |
dc.contributor.author | Šenkeřík, Roman | |
dc.relation.ispartof | DEXA 2008: 19th International Conference on Database and Expert Systems Applications, Proceedings | |
dc.identifier.issn | 1529-4188 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-0-7695-3299-8 | |
dc.date.issued | 2008 | |
dc.citation.spage | 571 | |
dc.citation.epage | 575 | |
dc.event.title | 19th International Conference on Database and Expert Systems Applications | |
dc.event.location | Turin | |
utb.event.state-en | Italy | |
utb.event.state-cs | Itálie | |
dc.event.sdate | 2008-09-01 | |
dc.event.edate | 2008-09-05 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | The Institute of Electrical and Electronics Engineers (IEEE) | en |
dc.identifier.doi | 10.1109/DEXA.2008.82 | |
dc.relation.uri | http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4624651&arnumber=4624778&count=160&index=126&tag=1 | |
dc.description.abstract | Cryptography is one of very much spoken word nowadays. Security of messages transfer is very important and specialists have a work to think a new cryptography up. Cryptography, on the other hand, can be and is very often used by jailbirds, so cryptanalysts have also very important job to detect and reveal and then decode the coded messages. Steganography is additional method leading to better secure up messages which goes hand by hand with cryptography, that why reveal of such a message is not easy. This paper deals with neural network models that are able to detect steganography content coded by a program OutGuess. Neural networks are methods which are very flexible in learning to different and difficult problems. Results in this article show that used model had almost 100% success in revealing steganography by means of OutGuess. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1001856 | |
utb.identifier.rivid | RIV/70883521:28140/08:63507088!RIV09-GA0-28140___ | |
utb.identifier.obdid | 43857089 | |
utb.identifier.scopus | 2-s2.0-57849140790 | |
utb.identifier.wok | 000259487400096 | |
utb.source | d-wok | |
dc.date.accessioned | 2011-08-09T07:34:06Z | |
dc.date.available | 2011-08-09T07:34:06Z | |
utb.contributor.internalauthor | Komínková Oplatková, Zuzana | |
utb.contributor.internalauthor | Hološka, Jiří | |
utb.contributor.internalauthor | Zelinka, Ivan | |
utb.contributor.internalauthor | Šenkeřík, Roman |