|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 75 occurrences of 47 keywords
|
|
|
Results
Found 211 publication records. Showing 211 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | Hung-Hsu Tsai, Ji-Shiung Cheng |
Adaptive Signal-Dependent Audio Watermarking Based on Human Auditory System and Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 23(3), pp. 191-206, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
audio authentication, human auditory system, neural networks, data hiding, audio watermarking |
16 | Abdelkader H. Ouda, Mahmoud R. El-Sakka |
Localization and security enhancement of block-based image authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 673-676, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Hsi-Chun Wang, Wei-Chiang Wang |
Data Hiding in a Hologram by Modified Digital Halftoning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 1086-1092, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee 0001, Jong In Lim 0001 |
Efficient Authentication for Low-Cost RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part I, pp. 619-627, 2005, Springer, 3-540-25860-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Ari Juels, Stephen A. Weis |
Authenticating Pervasive Devices with Human Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 293-308, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jian Zhao 0002, Mingquan Zhou, Hongmei Xie, Jinye Peng, Xin Zhou |
A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence and Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2004, International Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part II, pp. 663-668, 2004, Springer, 3-540-22843-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
neural network, wavelet transform, Digital Watermarking, Chaotic Sequence |
16 | Fred Thomas |
Penny Tag Technologies for Removable Data Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 36(8), pp. 70-76, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Sviatoslav Voloshynovskiy, Alexander Herrigel, Thierry Pun |
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pp. 330-339, 2001, Springer, 3-540-42733-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Tomas Sander, Amnon Ta-Shma, Moti Yung |
Blind, Auditable Membership Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 53-71, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Kazuo J. Ezawa, Gregory Napiorkowski |
Assessment of Threats for Smart Card Based Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings, pp. 58-72, 1998, Springer, 3-540-64951-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Daniel Gruhl, Walter Bender |
Information Hiding to Foil the Casual Counterfeiter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 1-15, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #211 of 211 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3] |
|