Back to Results
First PageMeta Content
Steganography / Computer vision / Steganalysis / JPEG / Embedding / Discrete cosine transform / Pose / Calibrated geometry / Before Present / Mathematics / Mathematical analysis / Topology


Calibration Revisited Jan Kodovský Jessica Fridrich SUNY Binghamton
Add to Reading List

Document Date: 2009-08-04 13:58:39


Open Document

File Size: 382,90 KB

Share Result on Facebook

City

Princeton / Berlin / Springer-Verlag / Cambridge / Toronto / Salzburg / Noordwijkerhout / San Jose / /

Company

Neural Information Processing Systems / MIT Press / Case / Information Hiding / /

Country

Austria / United States / Netherlands / Canada / /

Currency

USD / /

/

IndustryTerm

machine learning tool / detectable algorithms / machine learning algorithms / nsF5 algorithm / steganographic algorithms / steganographic algorithm / secure algorithm / /

Organization

SUNY Binghamton Department of ECE Binghamton / PE PEV / MIT / U.S. Government / Calibration Revisited Jan Kodovský Jessica Fridrich SUNY Binghamton Department of ECE Binghamton / Air Force office of Scientific Research / U.S. Securities and Exchange Commission / /

Person

S. S. Keerthi / V / YASS YASS YASS YASS / Jan Kodovský Jessica Fridrich / /

/

Position

editor / Prime Minister / General / /

ProvinceOrState

New Jersey / New York / California / Massachusetts / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

nsF5 algorithm / JPEG / applying machine learning algorithms / YASS algorithm / steganographic algorithms / steganographic algorithm / machine learning / Image Processing / MME3 algorithm / F5 algorithm / /

SocialTag