|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 687 occurrences of 262 keywords
|
|
|
Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
99 | Ingemar J. Cox |
Watermarking, steganography and content forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 1-2, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
content forensics, steganography, digital watermarking, data hiding, steganalysis |
88 | Young-Shil Kim, Sang Park, Suk-Hee Wang, Seung Lee |
Information Hiding Method Using CDMA on Wave Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PARA ![In: Applied Parallel Computing, State of the Art in Scientific Computing, 7th International Workshop, PARA 2004, Lyngby, Denmark, June 20-23, 2004, Revised Selected Papers, pp. 1000-1008, 2004, Springer, 3-540-29067-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Stego-Data, Cover- Data, Wave file, Steganography, CDMA, Information Hiding |
85 | Junhui He, Jiwu Huang, Guoping Qiu |
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 1-14, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Zhili Chen, Liusheng Huang, Zhenshan Yu, Lingjun Li, Wei Yang 0011 |
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 558-563, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
linguistic steganalysis, distribution of words, statistical, detection, linguistic steganography |
78 | Karen Bailey, Kevin Curran |
An evaluation of image based steganography methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 30(1), pp. 55-88, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Steganography, Steganalysis |
78 | Junhui He, Jiwu Huang |
Steganalysis of stochastic modulation steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 49(3), pp. 273-285, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
stochastic modulation, statistical distribution models of difference, steganography, information hiding, steganalysis |
74 | Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang |
Analysis of Current Steganography Tools: Classifications & Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 384-387, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Hideki Noda, Tomonori Furuta, Michiharu Niimi, Eiji Kawaguchi |
Application of BPCS steganography to wavelet compressed video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the 2004 International Conference on Image Processing, ICIP 2004, Singapore, October 24-27, 2004, pp. 2147-2150, 2004, IEEE, 0-7803-8554-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
74 | Hideki Noda, Jeremiah Spaulding, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi |
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 295-309, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
70 | Hedieh Sajedi, Mansour Jamzad |
Secure Cover Selection Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 317-326, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cover Selection, Steganography Capacity, Steganography |
67 | Ma Xiu-ying, Lin Jia-jun |
HVS-Based Imperceptibility Evaluation for Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Scalable Information Systems, 4th International ICST Conference, Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers, pp. 152-161, 2009, Springer, 978-3-642-10484-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
evaluation, steganography, HVS, Peak Signal to Noise Ratio, imperceptibility |
67 | Diego F. de Carvalho, Rafael Chies, André Pimenta Freire, Luciana Andréia Fondazzi Martimiano, Rudinei Goularte |
Video steganography for confidential documents: integrity, privacy and version control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 26th Annual International Conference on Design of Communication, SIGDOC 2008, Lisbon, Portugal, September 22-24, 2008, pp. 199-206, 2008, ACM, 978-1-60558-083-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
document version control, multimedia, steganography, MPEG-4, collaborative systems |
67 | Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin |
Syntax and Semantics-Preserving Application-Layer Protocol Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, pp. 164-179, 2004, Springer, 3-540-24207-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
application protocols, semantics, steganography, syntax, SSH |
64 | Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang 0011, Lingjun Li, Xueling Zheng, Xinxin Zhao |
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 224-235, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Eiji Kawaguchi |
BPCS-Steganography - Principle and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (4) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part IV, pp. 289-299, 2005, Springer, 3-540-28897-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Luis von Ahn, Nicholas J. Hopper |
Public-Key Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 323-341, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Christopher B. Smith, Sos S. Agaian |
Denoising and the active warden. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 3317-3322, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Abdelrahman Desoky |
Listega: list-based steganography methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(4), pp. 247-261, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Steganography, Linguistic steganography |
56 | Zuzana Oplatková, Jiri Holoska, Ivan Zelinka, Roman Senkerik |
Steganography Detection by Means of Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 571-575, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
neural networks, classification, Steganography |
56 | Jeong-Chun Joo, Hae-Yeoun Lee, Cong Nguyen Bui, Won-Young Yoo, Heung-Kyu Lee |
Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2008, 9th Pacific Rim Conference on Multimedia, Tainan, Taiwan, December 9-13, 2008. Proceedings, pp. 476-485, 2008, Springer, 978-3-540-89795-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pixel-value differencing, Modulus function, Steganography, Steganalysis |
56 | Mohammad Shirali-Shahreza |
A New Persian/Arabic Text Steganography Using "La" Word. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSS (1) ![In: Advances in Computer and Information Sciences and Engineering, Proceedings of the 2007 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007, pp. 339-342, 2007, Springer, 978-1-4020-8740-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Feature Coding, Persian/Arabic Text, Unicode Standard, Information Security, Text Steganography |
56 | Weiming Zhang, Xinpeng Zhang 0001, Shuozhong Wang |
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 60-71, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stego-codes, covering codes, embedding efficiency, embedding rate, steganography, Hamming codes, wet paper codes |
56 | Rajarathnam Chandramouli |
A mathematical framework for active steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(3), pp. 303-311, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Security, Independent component analysis, Steganography, Steganalysis |
53 | Sajad Shirali-Shahreza, Mohammad T. Manzuri Shalmani |
High capacity error free wavelet Domain Speech Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 1729-1732, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Yuling Liu, Xingming Sun, Can Gan, Hong Wang 0009 |
An Efficient Linguistic Steganography for Chinese Text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 2094-2097, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Hwajong Oh, Kwangsoo Lee, Sangjin Lee 0002 |
Attack on JPEG2000 Steganography Using LRCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 268-281, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Regunathan Radhakrishnan, Mehdi Kharrazi, Nasir D. Memon |
Data Masking: A New Approach for Steganography? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 41(3), pp. 293-303, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy |
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 273-274, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu |
JPEG Compression Immune Steganography Using Wavelet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 704-708, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Rainer Böhme, Andreas Westfeld |
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 125-140, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir D. Memon |
Image Steganography and Steganalysis: Concepts and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, pp. 35-49, 2003, Springer, 3-540-21061-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Ren-Junn Hwang, Timothy K. Shih, Chuan-Ho Kao, Tsung-Ming Chang |
Lossy Compression Tolerant Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet ![In: The Human Society and the Internet - Internet Related Socio-Economic Issues, First International Conference, Human.Society@Internet 2001, Seoul, Korea, July 4-6 2001, Proceedings, pp. 427-435, 2001, Springer, 3-540-42313-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Zainab Famili, Karim Faez, Abbas Fadavi |
A New Steganography Based on chi2 Technic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIARP ![In: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, Mexico, November 15-18, 2009. Proceedings, pp. 1062-1069, 2009, Springer, 978-3-642-10267-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cover image, ? 2-test, Steganography, stego image |
46 | Weihui Dai, Yue Yu, Bin Deng |
BinText steganography based on Markov state transferring probability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1306-1311, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Markov transferring probability, online communication, information hiding, text steganography |
46 | Bin Liu 0008, Fenlin Liu, Chunfang Yang, Yifeng Sun |
Secure Steganography in Compressed Video Bitstreams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1382-1387, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Video Steganography, Statistical Invisibility, Data Hiding |
46 | Wojciech Mazurczyk, Krzysztof Szczypiorski |
Steganography of VoIP Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II, pp. 1001-1018, 2008, Springer, 978-3-540-88872-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
steganography, VoIP, information hiding |
46 | Johann Barbier, Kichenakoumar Mayoura |
Steganalysis of Multi Bit Plane Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 99-111, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multi bit plane image steganography, Fisher discriminant, RS steganalysis |
46 | Anna Lysyanskaya, Mira Meyerovich |
Provably Secure Steganography with Imperfect Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 123-139, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital signatures, Markov processes, steganography, Information hiding |
46 | Guillermo A. Francia III, Tyler S. Gomez |
Steganography obliterator: an attack on the least significant bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 85-91, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital copyright management, steganography, computer security, information hiding, digital forensics, intellectual property, enterprise application |
46 | Sos S. Agaian, Ravindranath Cherukuri |
Run Length Based Steganography for Binary Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PReMI ![In: Pattern Recognition and Machine Intelligence, First International Conference, PReMI 2005, Kolkata, India, December 20-22, 2005, Proceedings, pp. 481-484, 2005, Springer, 3-540-30506-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Run length, steganography, binary image |
46 | Dorian A. Flowers |
Investigating steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 468-469, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
JPEG Format, image processing, steganography |
46 | Elke Franz 0001, Antje Schneidewind |
Adaptive steganography based on dithering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 56-62, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
image processing, adaptivity, steganography |
46 | Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere |
Steganography for Executables and Code Transformation Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 425-439, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
code transformation signature, steganography, executables |
46 | Kai Fan, Weidong Kou |
A Secure Steganography Scheme Based on (N, t) Threshold. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 536-539, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
e-commerce, steganography, threshold |
46 | Malte Diehl |
Secure covert channels in multiplayer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 117-122, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, game theory, information theory, steganography, information hiding |
46 | Kisik Chang, Robert H. Deng, Feng Bao 0001, Sangjin Lee 0002, HyungJun Kim, Jongin Lim 0001 |
On Security Notions for Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 440-454, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
pseudoprocessingness, steganography, steganalysis |
46 | Ana Georgina Flesia, David L. Donoho |
Implications for Image Watermarking of Recent Work in Image Analysis and Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, First International Workshop, IWDW 2002, Seoul, Korea, November 21-22, 2002, Revised Papers, pp. 113-129, 2002, Springer, 3-540-01217-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Image Steganography, Natural Scene Statistics, Geometric Diffusion by Level Set Methods, Computational Harmonic Analysis, Wavelets, Interpolation, Discrete Cosine Transform, Inpainting, Image Watermarking, Total Variation |
43 | Nicholas J. Hopper, Luis von Ahn, John Langford 0001 |
Provably Secure Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 58(5), pp. 662-676, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Min-Wen Chao, Chao-Hung Lin, Cheng-Wei Yu, Tong-Yee Lee |
A High Capacity 3D Steganography Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 15(2), pp. 274-284, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Lifang Yu, Yao Zhao 0001, Rongrong Ni, Zhenfeng Zhu |
PM1 steganography in JPEG images using genetic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 13(4), pp. 393-400, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Kotaro Yamamoto, Munetoshi Iwakiri |
A Standard MIDI File Steganography Based on Fluctuation of Duration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 774-779, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Mohammad Shirali-Shahreza |
Pseudo-space Persian/Arabic text steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 864-868, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal 0001, Lalit M. Patnaik |
Genetic Algorithm Based Steganography Using Wavelets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 51-63, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Kenneth Sullivan, Kaushal Solanki, B. S. Manjunath, Upamanyu Madhow, Shivkumar Chandrasekaran |
Determining Achievable Rates for Secure, Zero Divergence, Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 121-124, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Cong Nguyen Bui, Sang Moon Yoon, Heung-Kyu Lee |
Multi Bit Plane Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 61-70, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | N. Santosh Arjun, Atul Negi |
A High Embedding Capacity Approach to Adaptive Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: First IEEE International Conference on Digital Information Management (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings, pp. 525-530, 2006, IEEE, 1-4244-0682-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs |
Implementation of LSB Steganography and Its Evaluation for Various Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: First IEEE International Conference on Digital Information Management (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings, pp. 173-178, 2006, IEEE, 1-4244-0682-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Michiharu Niimi, Tomohito Ei, Hideki Noda, Eiji Kawaguchi, Bruce Segee |
An attack to BPCS-steganography using complexity histogram and countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the 2004 International Conference on Image Processing, ICIP 2004, Singapore, October 24-27, 2004, pp. 733-736, 2004, IEEE, 0-7803-8554-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Xiangwei Kong, Rufeng Chu, Xiaohui Ba, Ting Zhang, Deli Yang |
A Perception Evaluation Scheme for Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning, 4th International Conference, IDEAL 2003, Hong Kong, China, March 21-23, 2003, Revised Papers, pp. 426-430, 2003, Springer, 3-540-40550-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter |
Spread spectrum image steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 8(8), pp. 1075-1083, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
43 | Scott Craver |
On Public-Key Steganography in the Presence of an Active Warden. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 355-368, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
43 | Neil F. Johnson 0001, Sushil Jajodia |
Steganalysis of Images Created Using Current Steganography Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 273-289, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Yali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal |
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 487-501, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Johann Barbier, Stéphanie Alt |
Practical Insecurity for Effective Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 195-208, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
practical steganalysis, security models |
40 | Christian Kraetzer, Jana Dittmann, Ronny Merkel |
WLAN steganography revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681903, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Adem Orsdemir, Oktay Altun, Gaurav Sharma 0001, Mark F. Bocko |
Steganalysis aware steganography: statistical indistinguishability despite high distortion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681915, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Anindya Sarkar, Kaushal Solanki, B. S. Manjunath |
Further study on YASS: steganography based on randomized embedding to resist blind steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681917, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Richard Bergmair |
A comprehensive bibliography of linguistic steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 28, 2007, pp. 65050W, 2007, SPIE, 978-0-8194-6618-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Andrew D. Ker |
Batch steganography and the threshold game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 28, 2007, pp. 650504, 2007, SPIE, 978-0-8194-6618-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Jessica J. Fridrich, Tomás Filler |
Practical methods for minimizing embedding impact in steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 28, 2007, pp. 650502, 2007, SPIE, 978-0-8194-6618-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Christian Kraetzer, Jana Dittmann |
Mel-cepstrum-based steganalysis for VoIP steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 28, 2007, pp. 650505, 2007, SPIE, 978-0-8194-6618-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Cüneyt M. Taskiran, Umut Topkara, Mercan Topkara, Edward J. Delp |
Attacks on lexical natural language steganography systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, January 15, 2006, pp. 607209, 2006, SPIE, 978-0-8194-6112-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Sos S. Agaian, Benjamin M. Rodriguez, Juan P. Perez |
Stego sensitivity measure and multibit plane based steganography using different color models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, January 15, 2006, pp. 60720Q, 2006, SPIE, 978-0-8194-6112-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Christian Kraetzer, Jana Dittmann, Andreas Lang 0001 |
Transparency benchmarking on audio watermarks and steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, January 15, 2006, pp. 60721L, 2006, SPIE, 978-0-8194-6112-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Younhee Kim, Zoran Duric, Dana Richards |
Limited distortion in LSB steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, January 15, 2006, pp. 60720N, 2006, SPIE, 978-0-8194-6112-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Mark T. Hogan, Félix Balado, Neil J. Hurley, Guénolé C. M. Silvestre |
New results on robustness of secure steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, January 15, 2006, pp. 60720U, 2006, SPIE, 978-0-8194-6112-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon |
Improving steganalysis by fusion techniques: a case study with image steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, January 15, 2006, pp. 607205, 2006, SPIE, 978-0-8194-6112-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Ying Wang 0021, Pierre Moulin |
Statistical modelling and steganalysis of DFT-based image steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, January 15, 2006, pp. 607202, 2006, SPIE, 978-0-8194-6112-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Pablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar |
Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings, pp. 465-473, 2005, SPIE, 978-0-8194-5654-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Mark T. Hogan, Neil J. Hurley, Guenole C. M. Silvestre, Félix Balado, Kevin M. Whelan |
ML detection of steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings, pp. 16-27, 2005, SPIE, 978-0-8194-5654-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Taras Holotyak, Jessica J. Fridrich, David Soukal |
Stochastic approach to secret message length estimation in ±k embedding steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings, pp. 673-684, 2005, SPIE, 978-0-8194-5654-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jana Dittmann, Danny Hesse, Reyk Hillert |
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings, pp. 607-618, 2005, SPIE, 978-0-8194-5654-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak |
Forensic steganalysis: determining the stego key in spatial domain steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings, pp. 631-642, 2005, SPIE, 978-0-8194-5654-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jessica J. Fridrich, David Soukal, Miroslav Goljan |
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, January 17-20, 2005, Proceedings, pp. 595-606, 2005, SPIE, 978-0-8194-5654-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Hideki Noda, Tomofumi Furuta, Michiharu Niimi, Eiji Kawaguchi |
Video steganography based on bit-plane decomposition of wavelet-transformed video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, January 18-22, 2004, Proceedings, pp. 345-353, 2004, SPIE, 978-0-8194-5209-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Rajarathnam Chandramouli, Shalin P. Trivedi, R. N. Uma |
On the complexity and hardness of the steganography embedding problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, January 18-22, 2004, Proceedings, pp. 496-500, 2004, SPIE, 978-0-8194-5209-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Toshiyuki Umeda, Ana B. Batolomeu, Filipe A. Francob, Damien Delannay, Benoît Macq |
Rate-distortion analysis of steganography for conveying stereovision disparity maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, January 18-22, 2004, Proceedings, pp. 268-273, 2004, SPIE, 978-0-8194-5209-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Shalin P. Trivedi, Rajarathnam Chandramouli |
Locally most-powerful detector for secret key estimation in spread spectrum image steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, January 18-22, 2004, Proceedings, pp. 1-12, 2004, SPIE, 978-0-8194-5209-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Jessica J. Fridrich, Miroslav Goljan |
On estimation of secret message length in LSB steganography in spatial domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Steganography, and Watermarking of Multimedia Contents ![In: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, California, USA, January 18-22, 2004, Proceedings, pp. 23-34, 2004, SPIE, 978-0-8194-5209-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Kalavathi Alla, R. Siva Rama Prasad |
A New Approach to Hindi Text Steganography Using Matraye, Core Classification and HHK Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 1223-1224, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Hindi OCR, Information hiding, Text Steganography, Linguistic steganography |
39 | Kalavathi Alla, R. Siva Rama Prasad |
An Evolution of Hindi Text Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 1577-1578, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hindi Text, Hindi OCR, Cryptography, Steganography, Text Steganography |
39 | Jessica J. Fridrich, Miroslav Goljan, Rui Du |
Reliable detection of LSB steganography in color and grayscale images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 4th workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, October 5, 2001, pp. 27-30, 2001, ACM, 1-58113-393-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
LSB embedding, detection of LSB steganography - algorithms, steganography, attacks, steganalysis, results |
35 | Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell |
Upper and Lower Bounds on Black-Box Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(3), pp. 365-394, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Rejection sampling, Pseudorandomnness, Huge random objects, Lower bound, Steganography, Information hiding, Covert communication |
35 | Katia Kermanidis, Emmanouil Magkos |
Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICLing ![In: Computational Linguistics and Intelligent Text Processing, 10th International Conference, CICLing 2009, Mexico City, Mexico, March 1-7, 2009. Proceedings, pp. 535-546, 2009, Springer, 978-3-642-00381-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
steganography, supervised learning, shallow parsing, paraphrasing |
35 | Hui Tian 0002, Ke Zhou 0001, Hong Jiang 0001, Dan Feng 0001 |
Digital logic based encoding strategies for steganography on voice-over-IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 17th International Conference on Multimedia 2009, Vancouver, British Columbia, Canada, October 19-24, 2009, pp. 777-780, 2009, ACM, 978-1-60558-608-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
steganography, VoIP, transparency, digital logic |
35 | Rongyue Zhang, Vasiliy Sachnev, Hyoung-Joong Kim |
Fast BCH Syndrome Coding for Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers, pp. 48-58, 2009, Springer, 978-3-642-04430-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
syndrome coding, error correction code, steganography, data hiding, BCH coding |
35 | Mansour Jamzad, Zahra Zahedi Kermani |
Secure Steganography Using Gabor Filter and Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security III, pp. 33-49, 2008, Springer, 978-3-540-69016-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Texture similarity, Kohonen Neural Networks, Steganography, DCT, Image database, Gabor Filter |
35 | Jae-Gil Yu, Eun-Joon Yoon, Sang-Ho Shin, Kee-Young Yoo |
A New Image Steganography Based on 2k Correction and Edge-Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 563-568, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
indexcolor, graycolor, image, steganography, PSNR |
35 | Hafiz Malik |
Steganalysis of QIM steganography using irregularity measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 149-158, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
kullback-liebler divergence, tsallis-divergence, steganography, steganalysis, kernel density estimation, divergence, higher-order statistics, quantization index modulation |
35 | Jessica J. Fridrich, Tomás Pevný, Jan Kodovský |
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 3-14, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
steganography, capacity, steganalysis, JPEG, blind steganalysis |
Displaying result #1 - #100 of 3812 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|