![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
BibTeX record conf/mediaforensics/LiSM13
@inproceedings{DBLP:conf/mediaforensics/LiSM13, author = {Liyun Li and Husrev Taha Sencar and Nasir D. Memon}, editor = {Adnan M. Alattar and Nasir D. Memon and Chad Heitzenrater}, title = {A cost-effective decision tree based approach to steganalysis}, booktitle = {Media Watermarking, Security, and Forensics 2013, Burlingame, CA, USA, February 5-7, 2013, Proceedings}, series = {{SPIE} Proceedings}, volume = {8665}, pages = {86650P}, publisher = {{SPIE}}, year = {2013}, url = {https://doi.org/10.1117/12.2008527}, doi = {10.1117/12.2008527}, timestamp = {Mon, 05 Feb 2024 20:35:05 +0100}, biburl = {https://dblp.org/rec/conf/mediaforensics/LiSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.