|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 687 occurrences of 262 keywords
|
|
|
Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
35 | Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu |
Digital invisible ink and its applications in steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 23-28, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital invisible ink, plausibly deniability, quantization-based watermarking, steganography, spread-spectrum watermarking |
35 | Jessica J. Fridrich |
Minimizing the embedding impact in steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 2-10, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
matrix embedding, perturbed quantization, syndrome coding, steganography, steganalysis, distortion |
35 | Cui-Qing Liu, Xijian Ping, Tao Zhang 0031, Linna Zhou, Yun-He Wang 0001 |
A Research on Steganography Method Based on Error-Correcting Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 377-380, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
error-correcting codes, steganography, steganalysis |
35 | Jessica J. Fridrich, Miroslav Goljan, David Soukal |
Perturbed quantization steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 11(2), pp. 98-107, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Perturbed quantization, Security, Adaptive, Steganography, Wet paper code |
35 | Daniel E. Stevenson, Michael R. Wick, Steven J. Ratering |
Steganography and cartography: interesting assignments that reinforce machine representation, bit manipulation, and discrete structures concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005, pp. 277-281, 2005, ACM, 1-58113-997-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
pedagogy, steganography, assignments, cartography, CS 1 |
35 | Jessica J. Fridrich, Miroslav Goljan, David Soukal |
Perturbed quantization steganography with wet paper codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 4-15, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, multimedia, adaptive, steganography, steganalysis, quantizer |
35 | Frank Y. Shih, Venkata Gopal Edupuganti |
A differential evolution based algorithm for breaking the visual steganalytic system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 13(4), pp. 345-353, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Genetic algorithm, Watermarking, Steganography, Differential evolution, Steganalysis |
35 | Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das 0001 |
A Secure Scheme for Image Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 490-493, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, internet, Communication, steganography |
35 | Pedro Comesaña, Fernando Pérez-González |
On the capacity of stegosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 15-24, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
costa's construction, steganography, lattice, capacity |
35 | Kaushal Solanki, Anindya Sarkar, B. S. Manjunath |
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 16-31, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
error correcting codes, steganography, supervised learning, data hiding, steganalysis |
35 | Greg Goth |
Steganalysis Gets Past the Hype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 6(4), 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, steganography, steganalysis, research initiatives |
35 | Ian Davidson, Goutam Paul 0001 |
Locating secret messages in images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 545-550, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
steganography, outlier detection, steganalysis |
32 | Rainer Böhme |
An Epistemological Approach to Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers, pp. 15-30, 2009, Springer, 978-3-642-04430-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Junji Shikata, Tsutomu Matsumoto |
Unconditionally Secure Steganography Against Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(6), pp. 2690-2705, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt |
Biometric Inspired Digital Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 15th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2008), 31 March - 4 April 2008, Belfast, Northern Ireland, pp. 159-168, 2008, IEEE Computer Society, 978-0-7695-3141-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub |
RGB Intensity Based Variable-Bits Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1322-1327, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Hui Tian 0002, Ke Zhou 0001, Yongfeng Huang 0001, Dan Feng 0001, Jin Liu 0017 |
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 647-652, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Andrew D. Ker |
Perturbation Hiding and the Batch Steganography Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 45-59, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Tomás Pevný, Jessica J. Fridrich |
Benchmarking for Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 251-267, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza |
Steganography in SMS by Sudoku puzzle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 844-847, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Fangjun Huang, Bin Li 0011, Jiwu Huang |
Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 401-404, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Benjamin M. Rodriguez, Gilbert L. Peterson |
Detecting Steganography Using Multi-Class Classification. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 193-204, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
support vector machine, Steganalysis, multi-class classification |
32 | Wenxiao Chen, Jing Cai, Siwei Li |
An Anti-statistical Analysis LSB Steganography Incorporating Extended Cat-Mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 7th International Symposium, APPT 2007, Guangzhou, China, November 22-23, 2007, Proceedings, pp. 468-476, 2007, Springer, 978-3-540-76836-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Lei Zheng, Ingemar J. Cox |
JPEG Based Conditional Entropy Coding for Correlated Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 1251-1254, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi 0001 |
Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 101-104, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow, B. S. Manjunath, Shivkumar Chandrasekaran |
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 125-128, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Christian Hundt 0001, Maciej Liskiewicz, Ulrich Wölfel |
Provably Secure Steganography and the Complexity of Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 17th International Symposium, ISAAC 2006, Kolkata, India, December 18-20, 2006, Proceedings, pp. 754-763, 2006, Springer, 3-540-49694-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier |
Using Image Steganography for Decryptor Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 322-330, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Silvia Torres-Maya, Mariko Nakano-Miyatake, Héctor M. Pérez Meana |
An Image Steganography Systems Based on BPCS and IWT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONIELECOMP ![In: 16th International Conference on Electronics, Communications, and Computers (CONIELECOMP 2006), 27 February 2005 - 1 March 2006, Cholula, Puebla, Mexico, pp. 51, 2006, IEEE Computer Society, 0-7695-2505-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Tao Zhang 0031, Yan Zhang 0010, Xijian Ping, Mingwu Song |
Detection of LSB Steganography based on Image Smoothness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 1377-1380, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Bin Liu 0008, Fenlin Liu, Bin Lu 0003, Xiangyang Luo |
Real-Time Steganography in Compressed Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MRCS ![In: Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings, pp. 43-48, 2006, Springer, 3-540-39392-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang 0004, Jianchao Sun |
A New Steganalysis Method for Adaptive Spread Spectrum Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 365-368, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Embedding Simulation, Region Estimation, Image Restoration, Steganalysis, Spread Spectrum |
32 | Richard Bergmair, Stefan Katzenbeisser 0001 |
Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 109-123, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Yun Q. Shi 0001, Chunhua Chen 0001, Wen Chen 0002 |
A Markov Process Based Approach to Effective Attacking JPEG Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 249-264, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Andrew D. Ker |
Batch Steganography and Pooled Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 265-281, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Hideki Noda, Yohsuke Tsukamizu, Michiharu Niimi |
JPEG2000 Steganography Possibly Secure Against Histogram-Based Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2006, 7th Pacific Rim Conference on Multimedia, Hangzhou, China, November 2-4, 2006, Proceedings, pp. 80-87, 2006, Springer, 3-540-48766-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Alvaro Martín, Guillermo Sapiro, Gadiel Seroussi |
Is image steganography natural? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 14(12), pp. 2040-2050, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Hideki Noda, Michiharu Niimi, Eiji Kawaguchi |
Application of QIM with dead zone for histogram preserving JPEG steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (2) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 1082-1085, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Guangjie Liu, Jinwei Wang, Yuewei Dai, Zhiquan Wang |
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (3) ![In: Advances in Natural Computation, First International Conference, ICNC 2005, Changsha, China, August 27-29, 2005, Proceedings, Part III, pp. 976-979, 2005, Springer, 3-540-28320-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Konstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis 0001 |
Alternatives for Multimedia Messaging System Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 589-596, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Michiharu Niimi, Hideki Noda, Bruce Segee |
A Study on Visual Attack to BPCS-Steganography and Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLBV ![In: Visual Content Processing and Representation, 9th International Workshop, VLBV 2005, Sardinia, Italy, September 15-16, 2005, Revised Selected Papers, pp. 29-36, 2005, Springer, 3-540-33578-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Abdelkader H. Ouda, Mahmoud R. El-Sakka |
A Step Towards Practical Steganography Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR ![In: Image Analysis and Recognition, Second International Conference, ICIAR 2005, Toronto, Canada, September 28-30, 2005, Proceedings, pp. 1158-1166, 2005, Springer, 3-540-29069-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Yeshwanth Srinivasan, Brian Nutter, Sunanda Mitra, Benny Phillips, Daron Ferris |
Secure Transmission of Medical Records Using High Capacity Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 2004), 24-25 June 2004, Bethesda, MD, USA, pp. 122-127, 2004, IEEE Computer Society, 0-7695-2104-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Andrew D. Ker |
Improved Detection of LSB Steganography in Grayscale Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, pp. 97-115, 2004, Springer, 3-540-24207-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Phil Sallee |
Model-Based Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, pp. 154-167, 2003, Springer, 3-540-21061-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Nicholas J. Hopper, John Langford 0001, Luis von Ahn |
Provably Secure Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 77-92, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Chunfang Yang, Xiangyang Luo, Fenlin Liu |
Embedding Ratio Estimating for Each Bit Plane of Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers, pp. 59-72, 2009, Springer, 978-3-642-04430-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Xiangyang Luo, Fenlin Liu, Jianming Chen, Yining Zhang |
Image universal steganalysis based on wavelet packet transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMSP ![In: International Workshop on Multimedia Signal Processing, MMSP 2008, October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia, pp. 780-784, 2008, IEEE Signal Processing Society, 978-1-4244-2295-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Rainer Böhme |
Weighted Stego-Image Steganalysis for JPEG Covers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 178-194, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Lisa M. Marvel, Brian Henz, Charles G. Boncelet Jr. |
Fusing rate-specific SVM Classifiers for +/-1 embedding steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISS ![In: 42nd Annual Conference on Information Sciences and Systems, CISS 2008, Princeton, NJ, USA, 19-21 March 2008, pp. 361-364, 2008, IEEE, 978-1-4244-2246-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Christopher B. Smith |
Steganalysis using Noise Variance Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 417-420, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Andreas Westfeld |
Steganalysis in the Presence of Weak Cryptography and Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 19-34, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Gary Cantrell, David A. Dampier |
Experiments in hiding data inside the file structure of common office documents: a stegonography application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICT ![In: Proceedings of the Intenational Symposium on Information and Communication Technologies, Las Vegas, Nevada, USA, June 16-18, 2004, pp. 146-151, 2004, Trinity College Dublin, 1-59593-170-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Edward J. Delp III, Ping Wah Wong, Jana Dittmann, Nasir D. Memon (eds.) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![SPIE, 978-0-8194-6991-5 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
29 | Peter Günther, Dagmar Schönfeld, Antje Winkler |
Reduced embedding complexity using BP message passing for LDGM codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681919, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Pedro Comesaña, Neri Merhav, Mauro Barni |
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681909, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Claus Vielhauer, Maik Schott, Christian Krätzer, Jana Dittmann |
Nested object watermarking: transparency and capacity evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681918, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Andrew D. Ker |
Steganographic strategies for a square distortion function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681904, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Christian Kraetzer, Jana Dittmann |
Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190Y, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Xiaoyi Yu, Noboru Babaguchi, Yunhong Wang |
Isotropy-based steganalysis in multiple least significant bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681913, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Anindya Sarkar, Kenneth Sullivan, B. S. Manjunath |
Steganographic capacity estimation for the statistical restoration framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681916, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | William Puech, Marc Chaumont, Olivier Strauss |
A reversible data hiding method for encrypted images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68191E, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Baris Coskun, Mehmet Kivanç Mihçak |
Perceptual hash based blind geometric synchronization of images for watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68191G, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Renato Villán, Thierry Pun |
Error exponent analysis of person identification based on fusion of dependent/independent modalities: multiple hypothesis testing case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190P, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Bijan G. Mobasseri, Preethi Krishnamurthy |
Establishing target track history by digital watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190W, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari |
A joint asymmetric watermarking and image encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68191A, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Peter Meerwald, Andreas Uhl |
Toward robust watermarking of scalable video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190J, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli |
Nonparametric steganalysis of QIM data hiding using approximate entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681914, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Thierry Pun |
Secure surface identification codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190D, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Tobias Scheidat, Claus Vielhauer |
Biometric hashing for handwriting: entropy-based feature selection and semantic fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190N, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Manabu Yamakoshi, Junichi Tanaka, Makoto Furuie, Masashi Hirabayashi, Tsutomu Matsumoto |
Individuality evaluation for paper based artifact-metrics using transmitted light image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190H, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Bin Li 0011, Jiwu Huang, Yun Q. Shi 0001 |
Textural features based universal steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681912, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Alisher Kholmatov, Berrin A. Yanikoglu |
Realization of correlation attack against the fuzzy vault scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190O, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Tomás Pevný, Jessica J. Fridrich |
Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681911, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Francesca Uccheddu, C.-C. Jay Kuo, Mauro Barni |
Anticollusion watermarking of 3D meshes by prewarping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190S, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jean-François Jourdas, Pierre Moulin |
A high-rate fingerprinting code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190A, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Andrew D. Ker, Rainer Böhme |
Revisiting weighted stego-image steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681905, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jan Kodovský, Jessica J. Fridrich |
Influence of embedding strategies on security of steganographic methods in the JPEG domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681902, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Sascha Zmudzinski, Martin Steinebach |
Robust audio hashing for audio authentication watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190L, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Pascal Bourdon, Sylvain Thiebaud, Didier Doyen |
A theoretical analysis of spatial/temporal modulation-based systems for prevention of illegal recordings in movie theaters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190U, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Orhan Bulan, Vishal Monga, Gaurav Sharma 0001, Basak Oztan |
Data embedding in hardcopy images via halftone-dot orientation modulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190C, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Peining Tao, Scott D. Dexter, Ahmet M. Eskicioglu |
Robust digital image watermarking in curvelet domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68191B, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Matthias Kirchner |
On the detectability of local resampling in digital images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190F, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Patrick Wolf, Enrico Hauer, Martin Steinebach |
The video watermarking container: efficient real-time transaction watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190K, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Yanjun Yan, Lisa Ann Osadciw |
Bridging biometrics and forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190Q, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fokko Beekhof, Thierry Pun |
Security analysis of robust perceptual hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681906, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp |
Scanner identification with extension to forgery detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190G, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fokko Beekhof, Thierry Pun |
Analysis of physical unclonable identification based on reference list decoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190B, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Elke Franz 0001 |
Embedding considering dependencies between pixels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68191D, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Bertrand Chupeau, Ayoub Massoudi, Frédéric Lefèbvre |
In-theater piracy: finding where the pirate was. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190T, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jean-François Jourdas, Pierre Moulin |
A low-rate fingerprinting code and its application to blind image fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681907, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Michael Gschwandtner, Andreas Uhl |
Toward DRM for 3D geometry data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190V, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Michela Cancellaro, Federica Battisti, Marco Carli, Giulia Boato, Francesco G. B. De Natale, Alessandro Neri 0001 |
A joint digital watermarking and encryption method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68191C, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Weiqi Luo 0001, Min Wu 0001, Jiwu Huang |
MPEG recompression detection based on block artifacts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190X, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Miroslav Goljan, Jessica J. Fridrich, Jan Lukás |
Camera identification from printed images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190I, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Martin Steinebach, Sascha Zmudzinski |
Evaluation of robustness and transparency of multiple audio watermark embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190Z, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Aweke N. Lemma, Stefan Katzenbeisser 0001, Mehmet Utku Celik, Serap Kirbiz |
Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681910, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Miroslav Goljan, Jessica J. Fridrich |
Camera identification from cropped and scaled images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190E, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Stefan Jenisch, Stefan Lukesch, Andreas Uhl |
Comparison of compression algorithms' impact on iris recognition accuracy II: revisiting JPEG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 68190M, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Younhee Kim, Zoran Duric, Dana Richards |
Improved lower bounds on embedding distortion in information hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681908, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 3812 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|