Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DM_2013_25_2_a12, author = {Yu. S. Kharin and E. V. Vecherko}, title = {Statistical estimation of parameters for binary {Markov} chain models with embeddings}, journal = {Diskretnaya Matematika}, pages = {135--148}, publisher = {mathdoc}, volume = {25}, number = {2}, year = {2013}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DM_2013_25_2_a12/} }
TY - JOUR AU - Yu. S. Kharin AU - E. V. Vecherko TI - Statistical estimation of parameters for binary Markov chain models with embeddings JO - Diskretnaya Matematika PY - 2013 SP - 135 EP - 148 VL - 25 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/DM_2013_25_2_a12/ LA - ru ID - DM_2013_25_2_a12 ER -
Yu. S. Kharin; E. V. Vecherko. Statistical estimation of parameters for binary Markov chain models with embeddings. Diskretnaya Matematika, Tome 25 (2013) no. 2, pp. 135-148. http://geodesic.mathdoc.fr/item/DM_2013_25_2_a12/
[1] Sullivan K., Madhow U., Chandrasekaran S., Manjunath B., “Steganalysis of spread spectrum data hiding exploiting cover memory”, Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, Proc. SPIE, 5681, San Jose, 2005, 38–46 | DOI
[2] Fridrich J., Pevny T., Kodovsky J., “Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities”, Proc. 9-th ACM Multimedia Security Workshop, Dallas, 2007, 3–14
[3] Pevny T., Bas P., Fridrich J., “Steganalysis by subtractive pixel adjacency matrix”, Proc. 11-th ACM Multimedia Security Workshop, Princeton, 2009, 75–84 | DOI
[4] Shi Y. Q., Chen C., Chen W., “A Markov process based approach to effective attacking JPEG steganography”, Lect. Notes Comput. Sci., 4437, 2006, 249–264 | DOI
[5] Kharin Yu. S., Vecherko E. V., “O nekotorykh zadachakh statisticheskoi proverki gipotez v steganografii”, Vesti NAN Belarusi. Ser. fiz.-mat. nauk, 2010, no. 4, 5–12 | MR
[6] Kharin Yu. S., Vecherko E. V., “On statistical hypotheses testing of embedding”, Proc. 9-th Int. Conf. Computer Data Analysis and Modeling, v. 2, Minsk, 2010, 26–29
[7] Ponomarev K. I., “Parametricheskaya model vkrapleniya i ee statisticheskii analiz”, Diskretnaya matematika, 21:4 (2009), 148–157 | DOI | MR | Zbl
[8] Bas P., Filler T., Pevny T., “Break Our Steganographic System – the ins and outs of organizing BOSS”, Proc. Inf. Hiding Conf., Prague, 2011
[9] Zubkov A. M., “Datchiki psevdosluchainykh chisel i ikh primeneniya”, Trudy II Mezhdunar. nauchn. konf. “Matematika bezopasnosti informatsionnykh tekhnologii”, Sb., MGU, 2003, 200–206
[10] Kemeni Dzh., Snell Dzh., Konechnye tsepi Markova, Nauka, 1982
[11] Kharin Yu. S., Bernik V. I., Matveev G. V., Agievich S. V., Matematicheskie i kompyuternye osnovy kriptologii, Novoe znanie, 2003
[12] Sharp T., “An Implementation of Key-Based Digital Signal Steganography”, Lect. Notes Comput. Sci., 2137, 2001, 13–26 | DOI | Zbl
[13] Ivchenko G. I., Medvedev Yu. I., Matematicheskaya statistika, Vysshaya shkola, Moskva, 1984 | MR | Zbl
[14] Borovkov A. A., Matematicheskaya statistika, Nauka, Moskva, 1984 | MR | Zbl
[15] Billingsley P., “Statistical methods in Markov chains”, Ann. Math. Statist., 32:1 (1961), 12–40 | DOI | MR | Zbl
[16] Rabiner L. R., “A tutorial on hidden Markov models and selected applications in speech recognition”, Proc. of the IEEE, 77:2 (1989), 257–286 | DOI