The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for steganography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-1998 (19) 1999-2000 (22) 2001 (18) 2002 (30) 2003 (41) 2004 (148) 2005 (152) 2006 (171) 2007 (157) 2008 (187) 2009 (141) 2010 (138) 2011 (122) 2012 (113) 2013 (129) 2014 (126) 2015 (153) 2016 (160) 2017 (166) 2018 (207) 2019 (249) 2020 (271) 2021 (291) 2022 (247) 2023 (275) 2024 (79)
Publication types (Num. hits)
article(1873) book(3) data(2) incollection(17) inproceedings(1872) phdthesis(40) proceedings(5)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 687 occurrences of 262 keywords

Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
35Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu Digital invisible ink and its applications in steganography. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital invisible ink, plausibly deniability, quantization-based watermarking, steganography, spread-spectrum watermarking
35Jessica J. Fridrich Minimizing the embedding impact in steganography. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF matrix embedding, perturbed quantization, syndrome coding, steganography, steganalysis, distortion
35Cui-Qing Liu, Xijian Ping, Tao Zhang 0031, Linna Zhou, Yun-He Wang 0001 A Research on Steganography Method Based on Error-Correcting Codes. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF error-correcting codes, steganography, steganalysis
35Jessica J. Fridrich, Miroslav Goljan, David Soukal Perturbed quantization steganography. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Perturbed quantization, Security, Adaptive, Steganography, Wet paper code
35Daniel E. Stevenson, Michael R. Wick, Steven J. Ratering Steganography and cartography: interesting assignments that reinforce machine representation, bit manipulation, and discrete structures concepts. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF pedagogy, steganography, assignments, cartography, CS 1
35Jessica J. Fridrich, Miroslav Goljan, David Soukal Perturbed quantization steganography with wet paper codes. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, multimedia, adaptive, steganography, steganalysis, quantizer
35Frank Y. Shih, Venkata Gopal Edupuganti A differential evolution based algorithm for breaking the visual steganalytic system. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Genetic algorithm, Watermarking, Steganography, Differential evolution, Steganalysis
35Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das 0001 A Secure Scheme for Image Transformation. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, internet, Communication, steganography
35Pedro Comesaña, Fernando Pérez-González On the capacity of stegosystems. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF costa's construction, steganography, lattice, capacity
35Kaushal Solanki, Anindya Sarkar, B. S. Manjunath YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF error correcting codes, steganography, supervised learning, data hiding, steganalysis
35Greg Goth Steganalysis Gets Past the Hype. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, steganography, steganalysis, research initiatives
35Ian Davidson, Goutam Paul 0001 Locating secret messages in images. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF steganography, outlier detection, steganalysis
32Rainer Böhme An Epistemological Approach to Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Junji Shikata, Tsutomu Matsumoto Unconditionally Secure Steganography Against Active Attacks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt Biometric Inspired Digital Image Steganography. Search on Bibsonomy ECBS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub RGB Intensity Based Variable-Bits Image Steganography. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Hui Tian 0002, Ke Zhou 0001, Yongfeng Huang 0001, Dan Feng 0001, Jin Liu 0017 A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Andrew D. Ker Perturbation Hiding and the Batch Steganography Problem. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Tomás Pevný, Jessica J. Fridrich Benchmarking for Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza Steganography in SMS by Sudoku puzzle. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Fangjun Huang, Bin Li 0011, Jiwu Huang Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels. Search on Bibsonomy ICIP (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Benjamin M. Rodriguez, Gilbert L. Peterson Detecting Steganography Using Multi-Class Classification. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF support vector machine, Steganalysis, multi-class classification
32Wenxiao Chen, Jing Cai, Siwei Li An Anti-statistical Analysis LSB Steganography Incorporating Extended Cat-Mapping. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Lei Zheng, Ingemar J. Cox JPEG Based Conditional Entropy Coding for Correlated Steganography. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi 0001 Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Christian Hundt 0001, Maciej Liskiewicz, Ulrich Wölfel Provably Secure Steganography and the Complexity of Sampling. Search on Bibsonomy ISAAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier Using Image Steganography for Decryptor Distribution. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Silvia Torres-Maya, Mariko Nakano-Miyatake, Héctor M. Pérez Meana An Image Steganography Systems Based on BPCS and IWT. Search on Bibsonomy CONIELECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Tao Zhang 0031, Yan Zhang 0010, Xijian Ping, Mingwu Song Detection of LSB Steganography based on Image Smoothness. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Bin Liu 0008, Fenlin Liu, Bin Lu 0003, Xiangyang Luo Real-Time Steganography in Compressed Video. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang 0004, Jianchao Sun A New Steganalysis Method for Adaptive Spread Spectrum Steganography. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Embedding Simulation, Region Estimation, Image Restoration, Steganalysis, Spread Spectrum
32Richard Bergmair, Stefan Katzenbeisser 0001 Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Yun Q. Shi 0001, Chunhua Chen 0001, Wen Chen 0002 A Markov Process Based Approach to Effective Attacking JPEG Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Andrew D. Ker Batch Steganography and Pooled Steganalysis. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Hideki Noda, Yohsuke Tsukamizu, Michiharu Niimi JPEG2000 Steganography Possibly Secure Against Histogram-Based Attack. Search on Bibsonomy PCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Alvaro Martín, Guillermo Sapiro, Gadiel Seroussi Is image steganography natural? Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Application of QIM with dead zone for histogram preserving JPEG steganography. Search on Bibsonomy ICIP (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Guangjie Liu, Jinwei Wang, Yuewei Dai, Zhiquan Wang On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. Search on Bibsonomy ICNC (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Konstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis 0001 Alternatives for Multimedia Messaging System Steganography. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Michiharu Niimi, Hideki Noda, Bruce Segee A Study on Visual Attack to BPCS-Steganography and Countermeasure. Search on Bibsonomy VLBV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Abdelkader H. Ouda, Mahmoud R. El-Sakka A Step Towards Practical Steganography Systems. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Yeshwanth Srinivasan, Brian Nutter, Sunanda Mitra, Benny Phillips, Daron Ferris Secure Transmission of Medical Records Using High Capacity Steganography. Search on Bibsonomy CBMS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Phil Sallee Model-Based Steganography. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Nicholas J. Hopper, John Langford 0001, Luis von Ahn Provably Secure Steganography. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Chunfang Yang, Xiangyang Luo, Fenlin Liu Embedding Ratio Estimating for Each Bit Plane of Image. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Xiangyang Luo, Fenlin Liu, Jianming Chen, Yining Zhang Image universal steganalysis based on wavelet packet transform. Search on Bibsonomy MMSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Rainer Böhme Weighted Stego-Image Steganalysis for JPEG Covers. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Lisa M. Marvel, Brian Henz, Charles G. Boncelet Jr. Fusing rate-specific SVM Classifiers for +/-1 embedding steganalysis. Search on Bibsonomy CISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Christopher B. Smith Steganalysis using Noise Variance Estimation. Search on Bibsonomy ICIP (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Andreas Westfeld Steganalysis in the Presence of Weak Cryptography and Encoding. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Gary Cantrell, David A. Dampier Experiments in hiding data inside the file structure of common office documents: a stegonography application. Search on Bibsonomy ISICT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Edward J. Delp III, Ping Wah Wong, Jana Dittmann, Nasir D. Memon (eds.) Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008 Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  BibTeX  RDF
29Peter Günther, Dagmar Schönfeld, Antje Winkler Reduced embedding complexity using BP message passing for LDGM codes. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Pedro Comesaña, Neri Merhav, Mauro Barni Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Claus Vielhauer, Maik Schott, Christian Krätzer, Jana Dittmann Nested object watermarking: transparency and capacity evaluation. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Andrew D. Ker Steganographic strategies for a square distortion function. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Christian Kraetzer, Jana Dittmann Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Xiaoyi Yu, Noboru Babaguchi, Yunhong Wang Isotropy-based steganalysis in multiple least significant bits. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Anindya Sarkar, Kenneth Sullivan, B. S. Manjunath Steganographic capacity estimation for the statistical restoration framework. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29William Puech, Marc Chaumont, Olivier Strauss A reversible data hiding method for encrypted images. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Baris Coskun, Mehmet Kivanç Mihçak Perceptual hash based blind geometric synchronization of images for watermarking. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Renato Villán, Thierry Pun Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Bijan G. Mobasseri, Preethi Krishnamurthy Establishing target track history by digital watermarking. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari A joint asymmetric watermarking and image encryption scheme. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Peter Meerwald, Andreas Uhl Toward robust watermarking of scalable video. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli Nonparametric steganalysis of QIM data hiding using approximate entropy. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Thierry Pun Secure surface identification codes. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Tobias Scheidat, Claus Vielhauer Biometric hashing for handwriting: entropy-based feature selection and semantic fusion. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Manabu Yamakoshi, Junichi Tanaka, Makoto Furuie, Masashi Hirabayashi, Tsutomu Matsumoto Individuality evaluation for paper based artifact-metrics using transmitted light image. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Bin Li 0011, Jiwu Huang, Yun Q. Shi 0001 Textural features based universal steganalysis. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Alisher Kholmatov, Berrin A. Yanikoglu Realization of correlation attack against the fuzzy vault scheme. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Tomás Pevný, Jessica J. Fridrich Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Francesca Uccheddu, C.-C. Jay Kuo, Mauro Barni Anticollusion watermarking of 3D meshes by prewarping. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jean-François Jourdas, Pierre Moulin A high-rate fingerprinting code. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Andrew D. Ker, Rainer Böhme Revisiting weighted stego-image steganalysis. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jan Kodovský, Jessica J. Fridrich Influence of embedding strategies on security of steganographic methods in the JPEG domain. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Sascha Zmudzinski, Martin Steinebach Robust audio hashing for audio authentication watermarking. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Pascal Bourdon, Sylvain Thiebaud, Didier Doyen A theoretical analysis of spatial/temporal modulation-based systems for prevention of illegal recordings in movie theaters. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Orhan Bulan, Vishal Monga, Gaurav Sharma 0001, Basak Oztan Data embedding in hardcopy images via halftone-dot orientation modulation. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Peining Tao, Scott D. Dexter, Ahmet M. Eskicioglu Robust digital image watermarking in curvelet domain. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Matthias Kirchner On the detectability of local resampling in digital images. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Patrick Wolf, Enrico Hauer, Martin Steinebach The video watermarking container: efficient real-time transaction watermarking. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Yanjun Yan, Lisa Ann Osadciw Bridging biometrics and forensics. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fokko Beekhof, Thierry Pun Security analysis of robust perceptual hashing. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp Scanner identification with extension to forgery detection. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fokko Beekhof, Thierry Pun Analysis of physical unclonable identification based on reference list decoding. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Elke Franz 0001 Embedding considering dependencies between pixels. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Bertrand Chupeau, Ayoub Massoudi, Frédéric Lefèbvre In-theater piracy: finding where the pirate was. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Jean-François Jourdas, Pierre Moulin A low-rate fingerprinting code and its application to blind image fingerprinting. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Michael Gschwandtner, Andreas Uhl Toward DRM for 3D geometry data. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Michela Cancellaro, Federica Battisti, Marco Carli, Giulia Boato, Francesco G. B. De Natale, Alessandro Neri 0001 A joint digital watermarking and encryption method. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Weiqi Luo 0001, Min Wu 0001, Jiwu Huang MPEG recompression detection based on block artifacts. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Miroslav Goljan, Jessica J. Fridrich, Jan Lukás Camera identification from printed images. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Martin Steinebach, Sascha Zmudzinski Evaluation of robustness and transparency of multiple audio watermark embedding. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Aweke N. Lemma, Stefan Katzenbeisser 0001, Mehmet Utku Celik, Serap Kirbiz Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Miroslav Goljan, Jessica J. Fridrich Camera identification from cropped and scaled images. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Stefan Jenisch, Stefan Lukesch, Andreas Uhl Comparison of compression algorithms' impact on iris recognition accuracy II: revisiting JPEG. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Younhee Kim, Zoran Duric, Dana Richards Improved lower bounds on embedding distortion in information hiding. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 3812 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license