Adaptive control processes : a guided tour, 1961. ,
An Information-Theoretic Model for Steganography, Information Hiding : 2nd International Workshop, pp.306-318, 1998. ,
DOI : 10.1007/3-540-49380-8_21
High-dimensional data analysis : optimal metrics and feature selection, 2006. ,
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, Information Hiding : 6th International Workshop, pp.67-81, 2004. ,
DOI : 10.1007/978-3-540-30114-1_6
A Graph???Theoretic Approach to Steganography, CMS 2005, pp.119-128, 2005. ,
DOI : 10.1007/11552055_12
Extreme learning machine: Theory and applications, Neurocomputing, vol.70, issue.1-3, pp.1-3489, 2006. ,
DOI : 10.1016/j.neucom.2005.12.126
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.217.3692
An Introduction to the Bootstrap, Chapman et al, 1994. ,
DOI : 10.1007/978-1-4899-4541-9
Modified Matrix Encoding Technique for Minimal Distortion Steganography, Information Hiding, pp.314-327, 2007. ,
DOI : 10.1007/978-3-540-74124-4_21
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, 5th International Workshop on Information Hiding, 2002. ,
DOI : 10.1007/3-540-36415-3_22
Secret Messages Come in .Wavs Online Newspaper : Wired News, p.12834186100, 2001. ,
A methodology for building regression models using extreme learning machine : OP-ELM, ESANN 2008, European Symposium on Artificial Neural Networks, 2008. ,
Extracting relevant features of steganographic schemes by feature selection techniques, Wacha'07 : Third Wavilla Challenge, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00166700
A Feature Selection Methodology for Steganalysis, MRCS06, International Workshop on Multi- 26 ,
DOI : 10.1007/11848035_9
URL : https://hal.archives-ouvertes.fr/hal-00166578
Merging Markov and DCT features for multi-class JPEG steganalysis, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007. ,
DOI : 10.1117/12.696774
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.353.37
Defending against statistical steganalysis, 10th USENIX Security Symposium, pp.323-335, 2001. ,
Detecting steganographic content on the internet, Network and Distributed System Security Symposium, 2002. ,
Mutual information for the selection of relevant variables in spectrometric nonlinear modelling, Chemometrics and Intelligent Laboratory Systems, vol.80, issue.2, pp.215-226, 2006. ,
DOI : 10.1016/j.chemolab.2005.06.010
URL : https://hal.archives-ouvertes.fr/inria-00174077
Model-Based Steganography, Digital Watermarking, pp.154-167, 2004. ,
DOI : 10.1007/978-3-540-24624-4_12
A Markov Process Based Approach to Effective Attacking JPEG Steganography, ICME'06 : Internation Conference on Multimedia and Expo, pp.9-12 ,
DOI : 10.1007/978-3-540-74124-4_17
Long-term prediction of time series using NNE-based projection and OP-ELM, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), 2008. ,
DOI : 10.1109/IJCNN.2008.4634173
The Curse of Dimensionality in Data Mining and Time Series Prediction, IWANN'05 : 8th International Work- Conference on Artificial Neural Network, pp.758-770, 2005. ,
DOI : 10.1007/11494669_93
F5???A Steganographic Algorithm, Information Hiding : 4th International Workshop, pp.289-302, 2001. ,
DOI : 10.1007/3-540-45496-9_21
Attacks on Steganographic Systems, IH '99 : Proceedings of the Third International Workshop on Information Hiding, pp.61-76, 2000. ,
DOI : 10.1007/10719724_5