Statistical estimation of parameters for binary Markov chain models with embeddings
Diskretnaya Matematika, Tome 25 (2013) no. 2, pp. 135-148.

Voir la notice de l'article provenant de la source Math-Net.Ru

@article{DM_2013_25_2_a12,
     author = {Yu. S. Kharin and E. V. Vecherko},
     title = {Statistical estimation of parameters for binary {Markov} chain models with embeddings},
     journal = {Diskretnaya Matematika},
     pages = {135--148},
     publisher = {mathdoc},
     volume = {25},
     number = {2},
     year = {2013},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/DM_2013_25_2_a12/}
}
TY  - JOUR
AU  - Yu. S. Kharin
AU  - E. V. Vecherko
TI  - Statistical estimation of parameters for binary Markov chain models with embeddings
JO  - Diskretnaya Matematika
PY  - 2013
SP  - 135
EP  - 148
VL  - 25
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/DM_2013_25_2_a12/
LA  - ru
ID  - DM_2013_25_2_a12
ER  - 
%0 Journal Article
%A Yu. S. Kharin
%A E. V. Vecherko
%T Statistical estimation of parameters for binary Markov chain models with embeddings
%J Diskretnaya Matematika
%D 2013
%P 135-148
%V 25
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/DM_2013_25_2_a12/
%G ru
%F DM_2013_25_2_a12
Yu. S. Kharin; E. V. Vecherko. Statistical estimation of parameters for binary Markov chain models with embeddings. Diskretnaya Matematika, Tome 25 (2013) no. 2, pp. 135-148. http://geodesic.mathdoc.fr/item/DM_2013_25_2_a12/

[1] Sullivan K., Madhow U., Chandrasekaran S., Manjunath B., “Steganalysis of spread spectrum data hiding exploiting cover memory”, Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, Proc. SPIE, 5681, San Jose, 2005, 38–46 | DOI

[2] Fridrich J., Pevny T., Kodovsky J., “Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities”, Proc. 9-th ACM Multimedia Security Workshop, Dallas, 2007, 3–14

[3] Pevny T., Bas P., Fridrich J., “Steganalysis by subtractive pixel adjacency matrix”, Proc. 11-th ACM Multimedia Security Workshop, Princeton, 2009, 75–84 | DOI

[4] Shi Y. Q., Chen C., Chen W., “A Markov process based approach to effective attacking JPEG steganography”, Lect. Notes Comput. Sci., 4437, 2006, 249–264 | DOI

[5] Kharin Yu. S., Vecherko E. V., “O nekotorykh zadachakh statisticheskoi proverki gipotez v steganografii”, Vesti NAN Belarusi. Ser. fiz.-mat. nauk, 2010, no. 4, 5–12 | MR

[6] Kharin Yu. S., Vecherko E. V., “On statistical hypotheses testing of embedding”, Proc. 9-th Int. Conf. Computer Data Analysis and Modeling, v. 2, Minsk, 2010, 26–29

[7] Ponomarev K. I., “Parametricheskaya model vkrapleniya i ee statisticheskii analiz”, Diskretnaya matematika, 21:4 (2009), 148–157 | DOI | MR | Zbl

[8] Bas P., Filler T., Pevny T., “Break Our Steganographic System – the ins and outs of organizing BOSS”, Proc. Inf. Hiding Conf., Prague, 2011

[9] Zubkov A. M., “Datchiki psevdosluchainykh chisel i ikh primeneniya”, Trudy II Mezhdunar. nauchn. konf. “Matematika bezopasnosti informatsionnykh tekhnologii”, Sb., MGU, 2003, 200–206

[10] Kemeni Dzh., Snell Dzh., Konechnye tsepi Markova, Nauka, 1982

[11] Kharin Yu. S., Bernik V. I., Matveev G. V., Agievich S. V., Matematicheskie i kompyuternye osnovy kriptologii, Novoe znanie, 2003

[12] Sharp T., “An Implementation of Key-Based Digital Signal Steganography”, Lect. Notes Comput. Sci., 2137, 2001, 13–26 | DOI | Zbl

[13] Ivchenko G. I., Medvedev Yu. I., Matematicheskaya statistika, Vysshaya shkola, Moskva, 1984 | MR | Zbl

[14] Borovkov A. A., Matematicheskaya statistika, Nauka, Moskva, 1984 | MR | Zbl

[15] Billingsley P., “Statistical methods in Markov chains”, Ann. Math. Statist., 32:1 (1961), 12–40 | DOI | MR | Zbl

[16] Rabiner L. R., “A tutorial on hidden Markov models and selected applications in speech recognition”, Proc. of the IEEE, 77:2 (1989), 257–286 | DOI