|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3873 occurrences of 1970 keywords
|
|
|
Results
Found 10233 publication records. Showing 10233 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | K. A. Moustafa, Wael M. Badawy |
(Color/Gray) Image in Color Cover Hiding Using Modification of Spatial Domain Hiding Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 56-61, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Aris Gkoulalas-Divanis, Vassilios S. Verykios |
Hiding sensitive knowledge without side effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 20(3), pp. 263-299, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Association rule hiding, Borders of frequent itemsets, Data mining, Parallelization |
74 | Kaiquan Shi, JianLi Zhao |
Function S-rough sets and security-authentication of hiding law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(7), pp. 924-935, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
function S-rough sets, law-hiding, the security-authentication of hiding law, elliptic curve |
68 | Shaohui Liu, Hongxun Yao, Wen Gao 0001, Dingguo Yang |
Minimizing the Distortion Spatial Data Hiding Based on Equivalence Class. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 667-678, 2007, Springer, 978-3-540-74170-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data hiding, Equivalence class, LSB |
66 | Radu Sion |
Power: A Metric for Evaluating Watermarking Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2002 International Symposium on Information Technology (ITCC 2002), 8-10 April 2002, Las Vegas, NV, USA, pp. 95-99, 2002, IEEE Computer Society, 0-7695-1506-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Watermarking Model, Information Hiding Metrics, Watermarking Algorithms |
63 | Xin-guang Zou, Sheng-He Sun |
Information Hiding Using Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (1) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 484-487, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Rongyue Zhang, Vasiliy Sachnev, Hyoung-Joong Kim |
Fast BCH Syndrome Coding for Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers, pp. 48-58, 2009, Springer, 978-3-642-04430-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
syndrome coding, error correction code, steganography, data hiding, BCH coding |
62 | Aris Gkoulalas-Divanis, Vassilios S. Verykios |
A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 349-363, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Exact knowledge hiding, Binary integer programming, Parallelization, Constraints satisfaction problems |
62 | Chung-Chuan Wang, Chin-Chen Chang 0001, Xinpeng Zhang 0001, Jinn-ke Jan |
Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCAM ![In: Multimedia Content Analysis and Mining, International Workshop, MCAM 2007, Weihai, China, June 30 - July 1, 2007, Proceedings, pp. 351-360, 2007, Springer. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
visual perception, PSNR, reversible data hiding |
58 | Peizhong Lu, Dan Wang |
A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 267-278, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data hiding, affine transformations, fast correlation attacks, geometrical attacks |
58 | Valeri Korjik, Guillermo Morales-Luna |
Information Hiding through Noisy Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pp. 42-50, 2001, Springer, 3-540-42733-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
cover message, wire-trap channel concept, information-theoretically secure model, randomized encoding, linear binary codes, Information hiding |
56 | Zhicheng Ni, Yun Q. Shi 0001, Nirwan Ansari, Wei Su 0001, Qibin Sun, Xiao Lin 0001 |
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 18(4), pp. 497-509, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Wen-Chung Kuo, Dong-Jin Jiang, Yu-Chih Huang |
Reversible Data Hiding Based on Histogram. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 1152-1161, 2007, Springer, 978-3-540-74201-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Histogram, Reversible data hide |
56 | Kaushal Solanki, Noah Jacobsen, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran |
Robust image-adaptive data hiding using erasure and error correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 13(12), pp. 1627-1639, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel |
Reducing Complexity Assumptions for Statistically-Hiding Commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(3), pp. 283-310, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Statistical hiding, Regular one way functions, Bit commitment |
55 | Yongsu Park, Yookun Cho |
On Minimizing Distortion in Secure Data-Hiding for Binary Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (1) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part I, pp. 572-577, 2004, Springer, 3-540-23974-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, Data hiding, binary image |
55 | Yu-Chee Tseng, Hsiang-Kuang Pan |
Data Hiding in 2-Color Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 51(7), pp. 873-880, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Binary image processing, prisoners' problem, security, cryptography, steganography, coding, information hiding |
53 | Andrew D. Ker |
Perturbation Hiding and the Batch Steganography Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 45-59, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Ashwin Swaminathan, Yinian Mao, Min Wu 0001, Krishnan Kailas |
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 357-371, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Lin Yuan, Gang Qu 0001 |
Information Hiding in Finite State Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, pp. 340-354, 2004, Springer, 3-540-24207-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Scott Craver, Bede Liu, Wayne H. Wolf |
Detectors for Echo Hiding Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 247-257, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Joshua R. Smith 0001, Bing Jiang, Sumit Roy 0001, Matthai Philipose, Kishore Sundara-Rajan, Alexander V. Mamishev |
ID Modulation: Embedding Sensor Data in an RFID Timeseries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 234-246, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Xiao-Ping (Steven) Zhang, Kan Li, Xiaofeng Wang 0008 |
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 18(6), pp. 769-776, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Stanislaw Jarecki, Xiaomin Liu |
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 715-726, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Charles Song, Vibha Sazawal |
Information-Hiding URLs for EasierWebsite Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSE ![In: Eighth IEEE International Workshop on Web Site Evolution (WSE 2006), 22-24 September 2006, Philadelphia, Pennsylvania, USA, pp. 95-102, 2006, IEEE Computer Society, 0-7695-2696-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Fan Zhang 0028, Xianxing Liu, Jie Li, Xinhong Zhang |
The Maximum Capacity and Minimum Detectable Capacity of Information Hiding in Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 59-66, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Jim Chou, Kannan Ramchandran, Antonio Ortega |
High Capacity Audio Data Hiding For Noisy Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2001 International Symposium on Information Technology (ITCC 2001), 2-4 April 2001, Las Vegas, NV, USA, pp. 108-, 2001, IEEE Computer Society, 0-7695-1062-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Jianquan Xie, Chunhua Yang 0001, Dazu Huang, Duosi Xie |
A Large Capacity Blind Information Hiding Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 934-937, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DCT transformation, uniform spectrum, blind extracting, information hiding, quantification |
48 | Yi-Hung Wu, Chia-Ming Chiang, Arbee L. P. Chen |
Hiding Sensitive Association Rules with Limited Side Effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 19(1), pp. 29-42, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
rule hiding, data mining, Association rules, mining methods and algorithms |
48 | Semin Kim, Wesley De Neve, Yong Man Ro |
A Statistical and Iterative Method for Data Hiding in Palette-Based Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings, pp. 170-183, 2009, Springer, 978-3-642-03687-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
palette-based images, steganography, information hiding, data hiding |
47 | Chin-Feng Lee, Hsing-Ling Chen |
Data Concealment Scheme for HTML Documents Based on Color Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 632-635, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
text hiding, document hiding, data hiding |
46 | Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González |
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 146-160, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Boris Shimanovsky, Jessica Feng, Miodrag Potkonjak |
Hiding Data in DNA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 373-386, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Kymie M. C. Tan, John McHugh, Kevin S. Killourhy |
Hiding Intrusions: From the Abnormal to the Normal and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 1-17, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Daniel Gruhl, Walter Bender |
Information Hiding to Foil the Casual Counterfeiter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 1-15, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
46 | Lan Ma, Zhijun Wu 0001, Wei Yang |
Approach to Hide Secret Speech Information in G.721 Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 1315-1324, 2007, Springer, 978-3-540-74170-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Analysis-By-Synthesis (ABS), Embed, Information Hiding, Speech, Extract |
46 | Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, Xiamu Niu |
Focus on the Generalized Information Hiding Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 605-608, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Chia-Chen Lin 0001, Chin-Chen Chang 0001 |
An Image Hiding Scheme Based on Du's Disk Allocation Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 617-620, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
disk allocation method, Declustering, image hiding |
44 | Shang-Kuan Chen, Ran-Zan Wang |
High-Payload Image Hiding Scheme Using k-Way Block Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 70-73, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
steganography, data hiding, block matching, image hiding |
43 | Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg |
Natural Language Watermarking and Tamperproofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 196-212, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Aris Gkoulalas-Divanis, Vassilios S. Verykios |
Exact Knowledge Hiding through Database Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 21(5), pp. 699-713, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Yong Cao, Qingxin Zhu |
Improved Metrics for Encapsulation Based on Information Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 742-747, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel |
Reducing Complexity Assumptions for Statistically-Hiding Commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 58-77, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Bin Liu 0013, Zhitang Li, Zhanchun Li |
An Image Hiding Algorithm Based on Bit Plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 611-616, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Chin-Chen Chang 0001, Chia-Chen Lin 0001, Jun-Bin Yeh |
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 567-572, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Nalini K. Ratha, Miguel A. Figueroa-Villanueva, Jonathan H. Connell, Ruud M. Bolle |
A Secure Protocol for Data Hiding in Compressed Fingerprint Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV Workshop BioAW ![In: Biometric Authentication, ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15, 2004, Proceedings, pp. 205-216, 2004, Springer, 3-540-22499-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Hongmei Liu 0001, Zhang Zhefeng, Jiwu Huang, Huang Xialing, Yun Q. Shi 0001 |
A high capacity distortion-free data hiding algorithm for palette image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (2) ![In: Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS 2003, Bangkok, Thailand, May 25-28, 2003, pp. 916-919, 2003, IEEE, 0-7803-7761-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Ming Sun Fu, Oscar C. Au |
Data hiding watermarking for halftone images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 11(4), pp. 477-484, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Xin Li 0005, Hong Heather Yu |
Transparent and Robust Audio Data Hiding in Subband Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2000 International Symposium on Information Technology (ITCC 2000), 27-29 March 2000, Las Vegas, NV, USA, pp. 74-81, 2000, IEEE Computer Society, 0-7695-0540-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
42 | Tsung-Yuan Liu, Wen-Hsiang Tsai |
Robust Watermarking in Slides of Presentations by Blank Space Coloring: A New Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security IV, pp. 49-64, 2009, Springer, 978-3-642-01756-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
slide presentation, Microsoft PowerPoint, OpenOffice Impress, watermarking, information hiding |
42 | Kaushal Solanki, Anindya Sarkar, B. S. Manjunath |
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 16-31, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
error correcting codes, steganography, supervised learning, data hiding, steganalysis |
42 | Jack Brassil |
Tracing the Source of a Shredded Document. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 387-399, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
jigsaw puzzle reconstruction, machine identification, detection theory, forensic science, image analysis, information hiding |
42 | Shaohui Liu, Hongxun Yao, Shengping Zhang, Wen Gao 0001 |
A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security VI, pp. 58-82, 2011, Springer, 978-3-642-24555-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
42 | Adam L. Young, Moti Yung |
Hiding Information Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 161-171, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Zutao Zhu, Wenliang Du |
K-anonymous association rule hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 305-309, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
association rule hiding, k-anonymity |
42 | Iftach Haitner, Alon Rosen, Ronen Shaltiel |
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 220-237, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Witness-Hiding, Arthur Merlin protocols, Zero-Knowledge, Black-box reductions |
42 | Tzu-Chuen Lu, Ying-Hsuan Huang |
An efficient block-based lossless information hiding technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 342-347, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distortion control, lossless information hiding, wavelet technique |
42 | Saurabh Srivastava 0001, Michael Hicks 0001, Jeffrey S. Foster, Patrick Jenkins |
Modular Information Hiding and Type-Safe Linking for C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 34(3), pp. 357-376, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Reliability, Information hiding, Modules, packages, Code design, Coding Tools and Techniques |
42 | Christian Schridde, Bernd Freisleben |
On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 344-354, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
?-Hiding assumption, Jacobi symbol, Euler’s totient function |
42 | Kyung-Su Kim 0001, Min-Jeong Lee, Heung-Kyu Lee, Young-Ho Suh |
Histogram-based reversible data hiding technique using subsampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 69-74, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
histogram modification, watermarking, subsampling, reversible data hiding, contents authentication |
42 | Rabia Sirhindi, Saeed Murtaza, Mehreen Afzal |
Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 376-386, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
extended visual secret sharing, LSB encoding, adaptive LSB encoding, data hiding, Visual cryptography |
42 | Lan Ma, Zhijun Wu 0001, Yun Hu, Wei Yang |
An Information-Hiding Model for Secure Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 1305-1314, 2007, Springer, 978-3-540-74170-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Information hiding model, Security, Steganography, Speech, Secure communication |
42 | Tirtha Shankar Das, Ayan K. Sau, Subir Kumar Sarkar |
Multimedia Data Hiding in Spatial and Transformed Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Third International Conference, ICDCIT 2006, Bhubaneswar, India, December 20-23, 2006, Proceedings, pp. 447-456, 2006, Springer, 3-540-68379-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Spatial and Transform domain, multimedia data hiding, data embedding rate, Zigzag modulation, DCT, interference, RGB |
42 | Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi 0001, Zhicheng Ni |
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 323-332, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Histogram Shifting, Lossless Data Hiding, Integer Wavelets |
42 | Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Emre Topak, José-Emilio Vila-Forcén, Thierry Pun |
On reversibility of random binning based data-hiding techniques: security perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 89-96, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
random binning, security leakage analysis, cryptography, information theory, data-hiding, reversibility, exhaustive search |
42 | Emre Topak, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Mehmet Kivanç Mihçak, Thierry Pun |
Towards geometrically robust data-hiding with structured codebooks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 11(2), pp. 121-132, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Robust data-hiding, Structured codebooks, Geometrical synchronization, Security analysis, Multiple access channel |
42 | Emmanuel D. Pontikakis, Yannis Theodoridis, Achilleas A. Tsitsonis, LiWu Chang, Vassilios S. Verykios |
A quantitative and qualitative ANALYSIS of blocking in association rule hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 29-30, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
association rules hiding, blocking technique, data mining, privacy |
42 | Ming-Ni Wu, Min-Hui Lin 0001, Chin-Chen Chang 0001 |
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 219-229, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
LSB substitution, genetic algorithm, image hiding |
42 | Chin-Chen Chang 0001, Pei-Yu Lin |
A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 3rd International Conference on Cyberworlds (CW 2004), 18-20 November 2004, Tokyo, Japan, pp. 369-375, 2004, IEEE Computer Society, 0-7695-2140-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
vector quantization, Data hiding, principle component analysis |
42 | Neal S. Coulter |
Information hiding, the Intel iAPX 432, and Ada. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 20th Annual Southeast Regional Conference, 1982, Knoxville, Tennessee, USA, April 1-3, 1982, pp. 160-167, 1982, ACM, 0-89791-071-0. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
Intel iAPX 432, Ada, information hiding, object-oriented software, access rights |
41 | Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang 0001, Yu-Lin Huang |
A reversible data hiding scheme based on dual steganographic images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 228-237, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
irreversible data hiding, steganographic image, steganography, reversible data hiding |
41 | Chi-Shiang Chan, Chin-Chen Chang 0001 |
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM (2) ![In: Advances in Multimedia Modeling, 13th International Multimedia Modeling Conference, MMM 2007, Singapore, January 9-12, 2007. Proceedings, Part II, pp. 461-470, 2007, Springer, 978-3-540-69428-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
image differencing, color palette, Data hiding, image hiding |
39 | Fernando Esponda |
Hiding a Needle in a Haystack Using Negative Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 15-29, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Luis Pérez-Freire, Fernando Pérez-González |
Exploiting Security Holes in Lattice Data Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 159-173, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Matthias Kirchner, Rainer Böhme |
Tamper Hiding: Defeating Image Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 326-341, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Hao-Tian Wu, Yiu-ming Cheung |
A High-Capacity Data Hiding Method for Polygonal Meshes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 188-200, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Luis Pérez-Freire, Pedro Comesaña, Fernando Pérez-González |
Information-Theoretic Analysis of Security in Side-Informed Data Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 131-145, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter |
Reliable Blind Information Hiding for Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 48-61, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
39 | Imtiaz Awan, Syed Asif Mahmood Gilani, S. A. Shah |
Utilization of Maximum Data Hiding Capacity in Object-Based Text Document Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 597-600, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Hao Luo 0001, Jeng-Shyang Pan 0001, Zhe-Ming Lu, Hsiang-Cheh Huang |
Reversible Data Hiding for 3D Point Cloud Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 487-490, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Chuang Lin 0001, Jeng-Shyang Pan 0001, Chin-Shiuh Shieh, Peng Shi 0001 |
An Information Hiding Scheme for OFDM Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 51-54, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Weina Jiang, Anthony T. S. Ho, Helen Treharne |
A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security IV, pp. 65-83, 2009, Springer, 978-3-642-01756-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Guorong Xuan, Yun Q. Shi 0001, Peiqi Chai, Jianzhong Teng, Zhicheng Ni, Xuefeng Tong |
Optimum Histogram Pair Based Image Lossless Data Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security IV, pp. 84-102, 2009, Springer, 978-3-642-01756-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
optimum histogram pair, reversible (lossless) data embedding, selection of best threshold, adaptive histogram modification, selection of suitable embedding region, integer wavelets |
36 | Hao-Tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung |
A Data Mapping Method for Steganography and Its Application to Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 236-250, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
LSB?+? algorithm, bijective mapping, first-order statistics, sample pair analysis, Steganography |
36 | Younhee Kim, Zoran Duric, Dana Richards |
Modified Matrix Encoding Technique for Minimal Distortion Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 314-327, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Guorong Xuan, Yun Q. Shi 0001, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen 0001, Wen Chen 0002 |
Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 262-277, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater |
Cerebral Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 62-72, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Manoj Prabhakaran 0001, Rui Xue 0001 |
Statistically Hiding Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 100-116, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Oscal T.-C. Chen, Wen-Chih Wu |
Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Speech Audio Process. ![In: IEEE Trans. Speech Audio Process. 16(3), pp. 629-638, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Daqi Zhang, Shiru Qu, Baosheng Kang |
A New Digital Image Hiding Approach Using Multi-Image Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 553-557, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jithendra K. Paruchuri, Sen-Ching S. Cheung |
Joint optimization of data hiding and video compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 3021-3024, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Chin-Chen Chang 0001, Wei-Liang Tai, Kuo-Nan Chen |
Lossless Data Hiding Based on Histogram Modification for Image Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (1) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume I, pp. 506-511, 2008, IEEE Computer Society, 978-0-7695-3492-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Malcolm Taylor, Chi-En Daniel Yin, Min Wu, Gang Qu 0001 |
A Hardware-Assisted Data Hiding Based Approach in Building High-Performance Trusted Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: IEEE International Workshop on Hardware-Oriented Security and Trust, HOST 2008, Anaheim, CA, USA, June 9, 2008. Proceedings, pp. 93-96, 2008, IEEE Computer Society, 978-1-4244-2401-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Shyue-Liang Wang, Dipen Patel, Ayat Jafari, Tzung-Pei Hong |
Hiding collaborative recommendation association rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 27(1), pp. 67-77, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Association rule, Privacy preserving data mining, Collaborative recommendation |
36 | Yang Hu, Chuntian Zhang, Yuting Su |
Information Hiding Based on Intra Prediction Modes for H.264/AVC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 1231-1234, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Siamak Yousefi, Hamid R. Rabiee, E. Yousefi, Mohammed Ghanbari 0001 |
Reversible Date Hiding using Multi Level Integer Wavelet Decomposition and Intelligent Coefficient Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 2130-2133, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Xiaoming Zhang |
Research on Rule Hiding Algorithm of Transaction Adding and Removing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 3, pp. 643-647, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Chin-Chen Chang 0001, Wei-Liang Tai, Chia-Chen Lin 0001 |
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 16(10), pp. 1301-1308, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Zhicheng Ni, Yun-Qing Shi 0001, Nirwan Ansari, Wei Su 0001 |
Reversible data hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 16(3), pp. 354-362, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Fan Zhang 0028, Ruixin Liu, Xinhong Zhang |
The Minimum Detectable Capacity of Digital Image Information Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part III, pp. 279-284, 2006, Springer, 3-540-34482-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 10233 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|