Index
2-D adjacency histogram
χ2 attack
χ2 test
± 1 embedding
AC coefficients
AC-10
AC-4
accuracy
adjacency HCF-COM
AI, see artificial intelligence
ALE features
first-order
second-order
ALE-10
amplitude of local extrema
analysis filter bank
analysis of variance
angular correlation
ANOVA, see analysis of variance
area under the curve
artifact
artificial intelligence
asset
asymmetry
AUC, see area under the curve
authentication
image authentication
autocorrelation
autocorrelation matrix
availability
bandwidth
batch steganography
Bayes' law
Bayesian statistics
Bernoulli trial
binary similarity measures
binning
binomial distribution
bit plane
blockiness attack
blockiness features
boosting feature selection
bootstrap method
boundary hyperplanes
broadcast monitoring
calibrated feature
difference
ratio
calibration
JPEG
capacity
of F5
capturing device
Cartesian calibrated feature
Cartesian calibration
Cartesian product
central moment
centre of mass
multi-dimensional
characteristic function
chrominance
cipher text
ciphers
class skew
classification
classification score
classifier
classifier system
cluster analysis, see also clustering
clustering
coin toss
colour palette
conditional probability features
confidence interval
confidentiality
confusion matrix
convolution
Convolution Theorem
co-occurrence features
co-occurrence matrix
of JPEG matrix
correlation coefficient
cover
cover estimate
cover selection
cover-source mismatch
crosscorrelation
cross-validation
cryptography
curse of dimensionality
Czekanowski distance
Daubechies wavelet
DC coefficient
DCT coefficient
DCT transform
dead-drop
dead-drop steganography
denoising
detection probability
DFT, see discrete Fourier transform
difference array
difference calibrated feature
difference calibrated feature vector
difference matrix
second-order
differential entropy
discrete classifiers
discrete cosine transform
discrete Fourier transform
discrete wavelet transform
distance
divergence transform
docstring
double compression
downsample
downsampling
dual histogram
duck typing
e-jihad
EM-108
empirical accuracy
empirical matrix
encrypt
encryption
entropy
eraser transform
error bound
estimate
estimator
Euclidean norm
experiment
EzStego
F5
java implementation
false negative
false positive
Farid-72
fast wavelet transform
feature selection
feature subset selection
application in steganalysis
scalar
feature vector
filter bank
filter search
first-order utility
Fisher linear discriminant
FLD, see Fisher linear discriminant
floating search
forward sequential search
Fourier transform
discrete
FRI-23
fusion
feature-level
game
Gaussian kernel
Gaussian smoothing filter
GIF
Gini coefficient
gradient energy
grid search
Haar wavelet
HAR2D-6
HAR3D-3
hard decision
hash
HCF, see histogram characteristic function
2-D
HCF moments
HCF-39
HCF-COM
high-pass component
high-pass filter
histogram
second-order
histogram characteristic function
Huffmann coding
HUGO
human visual system
hyperplane
hypothesis testing
IJG
image fidelity
image forensics
image quality measures
image space
imperceptibility
information
information theory
inner product
integrity
interaction information
ipython
IQM, see image quality measures
joint mutual information
JPEG
calibration
programming API
JPEG compatibility
JPEG compression
JPEG images
JPEG matrix
JPEG Toolbox
JPEG2000
JSteg
Jython
KDE, see kernel density estimator
Kerckhoffs' Principle
kernel
kernel density estimator
kernel trick
key
key-recovery attacks
K-means clustering
python code
k-means clustering
Kullbach–Leibler divergence, see relative entropy
kurtosis
label
labels
LAW-ML
adaptive
least-squares
libSVM
Python API
linear classifier
linear predictor
linearly separable
local extremum
locally adaptive window-based denoising
loss function
low-pass component
low-pass filter
LSB ±, see LSB matching
LSB embedding
LSB matching
LSB plane
LSB replacement
luminance
machine learning
magnitude-phase form
Mallat's herringbone algorithm
marginal moment
Markov chain
Markov model
second-order
Markov model-based features
Matlab
mean square error
Mercer's theorem
message authentication
message length
message-recovery attacks
method of least squares
Minkowsky norm
model
moment
moment about the mean, see central moment
Monte Carlo simulation
multi-class classifier
multi-layer classification
multivariate mutual information
multivariate regression analysis
mutual information
naïve Bayes classifier
noise
noise residual
γ-norm
normalisation
normalised mean square HVS error
null hypothesis
numpy
one-against-all
one-against-one
Outguess
Outguess 0.1
Outguess 0.2
over-embedding
overfitting
padding
pairs-of-values
palette image
parallel reference
parameter estimation
parameters
passive warden
pattern recognition
perfectly secure
pickle
PIL
pixel selection
PMF
population
precision
predicted class
prediction
prediction error
prediction error image
prisoners' problem
probability
probability distribution
probability mass function, see PMF
progressive randomisation
pure stego-system
pylab
pysteg library
Python
pywt
QMF, see quadratic mirror filters
QMF-9
quadratic mirror filters
quality factor
quantisation
quantisation matrix
quantisation table
radial basis function
rate
ratio-calibrated
RBF, see radial basis function
recall
receiver operating characteristic, see also ROC curve
reference image
reference transform
region of confidence
regression
linear
support vector regression
relative entropy
reliability
response variable
RGB
ROC, see receiver operating characteristic
ROC curve
rounding
RS steganalysis
run length
run-length features
sample
sampling theory
scalar product
secure
ϵ-secure
security criteria
self-restoration
sequential forward selection
significance level
similarity measures
skewness
slack variables
SPAM, see subtractive pixel adjacency model
SPAM-848
Spam-Mimic
spectral magnitude distortion
spread spectrum image steganography, see SSIS
square-root law
SSIS
standard error
statistical bias
statistical model
statistical steganalysis
statistics-aware
statistics-aware embedding
steganalyser
basic
steganalysis
blind
extended
learning
pooled
quantitative
statistical
structural
targeted
visual
steganalyst strategy
steganalytic system
steganography
by cover synthesis
by modification
stego estimate
stego-system
public-key
secret-key
stencil function
S-Tools
storage steganography
strategy
subtractive pixel adjacency matrix
subtractive pixel adjacency model
sum image
supervised learning
see SVM
support vector regression
support vectors
SVM
one-class
synthesis filter bank
tamper detection
targeted blind steganalysis
taxicab norm
test set
testing error rate
texture
texture unit
total error probability
totalled image
training error rate
training set
transition probabilities
transition probability matrix
true accuracy
true class
true label
underfitting
undetectability
undetectable
unsupervised learning
utility
variance
variation
visual steganalysis
WAM, see wavelet absolute moments
WAM features
watermarking
wavelet absolute moments
Weinberger prediction
wrapper search
YCbCr
zig-zag scanning
3.147.70.247