2021
DOI: 10.1016/j.image.2020.116052
|View full text |Cite
|
Sign up to set email alerts
|

Transfer subspace learning based on structure preservation for JPEG image mismatched steganalysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…The previous steganalysis methods habitually assumed that the training data set and the test set have the same probability distribution (for example, from the same data set). But in practice, this constraining assumption is difficult to be fulfilled [8,15,18]. For example, the model we trained in the source domain (such as Twitter) may encounter the text from the movie review domain or news domain at the test time, which, unfortunately, have almost no labeled data.…”
Section: Domain Mismatch In Text Steganalysismentioning
confidence: 99%
See 1 more Smart Citation
“…The previous steganalysis methods habitually assumed that the training data set and the test set have the same probability distribution (for example, from the same data set). But in practice, this constraining assumption is difficult to be fulfilled [8,15,18]. For example, the model we trained in the source domain (such as Twitter) may encounter the text from the movie review domain or news domain at the test time, which, unfortunately, have almost no labeled data.…”
Section: Domain Mismatch In Text Steganalysismentioning
confidence: 99%
“…Recent research attempts to train a multi-classifier to recognize Image Processing Pipeline (IPP) first, and then select the training set corresponding to the IPP to train a steganalysis classifier [2]. There are also studies projecting training and testing data into a common subspace, learning domain-invariant representations, and directly applying classifiers trained on source-domain data to target instances [8,15]. These methods are effective for images, but for generative text steganography trained on large-scale corpora, the distribution of steganographic text is more complex.…”
Section: Introductionmentioning
confidence: 99%
“…It is relevant, contrary to the atomistic approach, when dealing with unseen cover-sources. This approach is promising but can suffer from the double impact of steganography and CSM on current state-of-the-art features [25].…”
Section: Introductionmentioning
confidence: 99%
“…Bessaoudi et al [3] proposed a linear multi-perspective subspace learning method for face kinship verification in the wild. Yang et al [4] proposed a transfer subspace learning method by preserving the image structure, which is used to analyze encrypted images. Qin et al [5] developed a structured subspace learning method that induces symmetric non-negative matrix factorization to learn similar subspaces and latent subspaces.…”
Section: Introductionmentioning
confidence: 99%