|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 687 occurrences of 262 keywords
|
|
|
Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | David L. Robie, Russell M. Mersereau |
Video error correction using steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the 2001 International Conference on Image Processing, ICIP 2001, Thessaloniki, Greece, October 7-10, 2001, pp. 930-933, 2001, IEEE, 0-7803-6725-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Rajarathnam Chandramouli, Nasir D. Memon |
Analysis of LSB based image steganography techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the 2001 International Conference on Image Processing, ICIP 2001, Thessaloniki, Greece, October 7-10, 2001, pp. 1019-1022, 2001, IEEE, 0-7803-6725-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Toby Sharp |
An Implementation of Key-Based Digital Signal Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pp. 13-26, 2001, Springer, 3-540-42733-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Chin-Chen Chang 0001, Jyh-Chiang Yeh, Ju Yuan Hsiao |
A Novel Scheme for Securing Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pacific Rim Conference on Multimedia ![In: Advances in Multimedia Information Processing - PCM 2001, Second IEEE Pacific Rim Conference on Multimedia, Bejing, China, October 24-26, 2001, Proceedings, pp. 804-811, 2001, Springer, 3-540-42680-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Christian Cachin |
An Information-Theoretic Model for Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 306-318, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu 0008 |
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(4), pp. 662-672, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Fangjun Huang, Bin Li 0011, Jiwu Huang |
Universal JPEG steganalysis based on microscopic and macroscopic calibration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 2068-2071, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen |
The Security Threat Posed by Steganographic Content on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 794-798, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Bin Li 0011, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi 0001 |
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 143-157, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mehdi Kharrazi, Husrev Taha Sencar, Nasir D. Memon |
Cover Selection for Steganographic Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 117-120, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Shirali-Shahreza |
M-Quiz by SMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, ICALT 2006, Kerkrade, The Netherlands, July 5-7, 2006, pp. 726-729, 2006, IEEE Computer Society, 0-7695-2632-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | V. Suresh, S. Maria Sophia, C. E. Veni Madhavan |
Resampling Operations as Features for Detecting LSB Replacement and LSB Matching in Color Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MRCS ![In: Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings, pp. 249-256, 2006, Springer, 3-540-39392-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Satoshi Kondo, Qiangfu Zhao |
A Novel Steganographic Technique Based on Image Morphing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 806-815, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Paul Andrew Watters, Frances H. Martin, H. Steffen Stripf |
Visual Steganalysis of LSB-Encoded Natural Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (1) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 746-751, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Kwangsoo Lee, Changho Jung, Sangjin Lee 0002, HyungJun Kim, Jongin Lim 0001 |
Applying LR Cube Analysis to JSteg Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 275-276, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Steven J. Murdoch, Stephen Lewis |
Embedding Covert Channels into TCP/IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 247-261, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ashish Gehani, Thomas H. LaBean, John H. Reif |
DNA-based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Aspects of Molecular Computing ![In: Aspects of Molecular Computing, Essays Dedicated to Tom Head on the Occasion of His 70th Birthday, pp. 167-188, 2004, Springer, 3-540-20781-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Peizhong Lu, Xiangyang Luo, Qingyang Tang, Shen Li |
An Improved Sample Pairs Method for Detection of LSB Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, pp. 116-127, 2004, Springer, 3-540-24207-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Young-Shil Kim, Young-Mi Kim, Jin-Yong Choi, Doo-Kwon Baik |
Information Hiding System StegoWaveK for Improving Capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, International Symposium, ISPA 2003, Aizu, Japan, July 2-4, 2003, Proceedings, pp. 423-426, 2003, Springer, 3-540-40523-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Xiangwei Kong, Ting Zhang, Xingang You, Deli Yang |
A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pacific Rim Conference on Multimedia ![In: Advances in Multimedia Information Processing - PCM 2002, Third IEEE Pacific Rim Conference on Multimedia, Hsinchu, Taiwan, December 16-18, 2002, Proceedings, pp. 434-441, 2002, Springer, 3-540-00262-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | René Rosenbaum, Heidrun Schumann |
A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 30-43, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Elke Franz 0001, Andreas Pfitzmann |
EinfĂ¼hrung in die Steganographie und Ableitung eines neuen Stegoparadigmas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 21(4), pp. 183-193, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Stegosystem, Kryptographie, Konzelation, Einbetten, Stegoparadigma, Angriffstypen, Scannen |
14 | Hong Zhao, Yun Q. Shi 0001, Nirwan Ansari |
Hiding Data in Multimedia Streaming over Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 8th Annual Conference on Communication Networks and Services Research, CNSR 2010, 11-14 May 2010, Montreal, Canada, pp. 50-55, 2010, IEEE Computer Society, 978-0-7695-4041-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Network Steganography, information hiding, covert channels |
14 | Jonathan M. Blackledge, Eugene Coyle |
e-Fraud Prevention Based on the Self-Authentication of e-Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 329-338, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Covert encryption, e-Fraud, Authentication, Steganography, Information hiding |
14 | Xiao Yi Yu, Aiming Wang |
Revisit LSB Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 410-413, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Steganography, Steganalysis |
14 | Xiao Yi Yu, Aiming Wang |
Genetic Algorithm Based Bayesian Network for Customers' Behavior Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 406-409, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Steganography, Steganalysis |
14 | Pham Hai Dang Le, Matthias O. Franz |
Single Band Statistics and Steganalysis Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 188-191, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
universal steganalysis, steganography, steganalysis |
14 | Shang-Kuan Chen, Ran-Zan Wang |
High-Payload Image Hiding Scheme Using k-Way Block Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 70-73, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
steganography, data hiding, block matching, image hiding |
14 | Jeong-Chun Joo, Tae-Woo Oh, Jung-Ho Choi, Heung-Kyu Lee |
Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 51-54, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Sub-sampling, Difference histogram, Steganography, Calibration, Steganalysis |
14 | Chin-Fang Lee, Huei-Ju Tsai |
A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 34-38, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
side-match prediction, steganography, reversible data hiding |
14 | Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li |
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 43-46, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
steganography, secret sharing, Data hiding, Sudoku |
14 | Hosei Matsuoka, Yusuke Nakashima, Takeshi Yoshimura |
Acoustic OFDM system and its extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 25(1), pp. 3-12, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Steganography, OFDM, Data hiding |
14 | Qingzhong Liu, Andrew H. Sung, Mengyu Qiao |
Spectrum Steganalysis of WAV Audio Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLDM ![In: Machine Learning and Data Mining in Pattern Recognition, 6th International Conference, MLDM 2009, Leipzig, Germany, July 23-25, 2009. Proceedings, pp. 582-593, 2009, Springer, 978-3-642-03069-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SVM, steganography, audio, steganalysis, derivative, spectrum |
14 | Qingzhong Liu, Andrew H. Sung, Mengyu Qiao |
Novel stream mining for audio steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 17th International Conference on Multimedia 2009, Vancouver, British Columbia, Canada, October 19-24, 2009, pp. 95-104, 2009, ACM, 978-1-60558-608-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mel-cepstrum, second order derivative, signal complexity, SVM, steganography, audio, steganalysis, spectrum, markov |
14 | Zohaib Khan, Atif Bin Mansoor |
A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCIA ![In: Image Analysis, 16th Scandinavian Conference, SCIA 2009, Oslo, Norway, June 15-18, 2009. Proceedings, pp. 321-330, 2009, Springer, 978-3-642-02229-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Classification, Feature Extraction, Steganography, Information Hiding, Steganalysis |
14 | Semin Kim, Wesley De Neve, Yong Man Ro |
A Statistical and Iterative Method for Data Hiding in Palette-Based Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings, pp. 170-183, 2009, Springer, 978-3-642-03687-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
palette-based images, steganography, information hiding, data hiding |
14 | Wen-Chung Kuo, Lih-Chyau Wuu, Chia-Nian Shyi, Shao-Hung Kuo |
A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS (3) ![In: 9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China, pp. 69-72, 2009, IEEE Computer Society, 978-0-7695-3745-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cover Image, Security, Steganography, Data Hiding, Stego-Image |
14 | Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang 0001, Yu-Lin Huang |
A reversible data hiding scheme based on dual steganographic images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 228-237, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
irreversible data hiding, steganographic image, steganography, reversible data hiding |
14 | Chin-Ho Chung, Wen-Yuan Chen, Ching-Ming Tu |
Image Hidden Technique Using QR-Barcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 522-525, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Image processing, Steganography, Error correction, JPEG, QR code |
14 | Hirohisa Hioki |
Web behind Web - A Steganographic Web Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 60-63, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
web, steganography, proxy |
14 | Chin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang |
An Embedding Technique Based upon Block Prediction and Code Cascading Shift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 361-364, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
side match vector quantization, steganography, histogram, vector quantization, reversible data hiding |
14 | Marina Ponomar |
On Acceptable Modification Limits of Electroacoustic Speech Signals for Data Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 551-554, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
steganography, Data hiding, quantization index modulation |
14 | Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang |
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 365-368, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pixel modification, Steganography, Imperceptible, High capacity |
14 | Chi-Nan Lin, Chin-Chen Chang 0001, Wei-Bin Lee, Jason Lin |
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 369-373, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hiding capacity, secret reference matrix, embedding, steganography, distortion |
14 | Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang |
Reversible Secret Image Sharing Based on Shamir's Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 1014-1017, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cryptography, Steganography, Secret Sharing, Reversible, Fragile Watermark, Threshold Scheme |
14 | Yunkai Gao, Xiaolong Li 0001, Bin Yang 0001 |
Employing Optimal Matrix for Efficient Matrix Embedding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 161-165, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
matrix embedding, embedding efficiency, steganography, information hiding |
14 | Yeuan-Kuen Lee, Graeme Bell, Shih-Yu Huang, Ran-Zan Wang, Shyong Jian Shyu |
An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, Third Pacific Rim Symposium, PSIVT 2009, Tokyo, Japan, January 13-16, 2009. Proceedings, pp. 349-360, 2009, Springer, 978-3-540-92956-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
LSB embedding, Steganography, steganalysis |
14 | Zohaib Khan, Atif Bin Mansoor |
Steganalysis of JPEG Images with Joint Transform Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, Third Pacific Rim Symposium, PSIVT 2009, Tokyo, Japan, January 13-16, 2009. Proceedings, pp. 965-975, 2009, Springer, 978-3-540-92956-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Classification, Feature Extraction, Steganography, Information Hiding, Steganalysis |
14 | Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling |
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security III, pp. 23-32, 2008, Springer, 978-3-540-69016-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
spread spectrum signal, detectability of stegosystems, Steganography, Bhattacharyya distance |
14 | Huajun Huang, Shaohong Zhong, Xingming Sun |
Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 957-960, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
offse, steganography, steganalysis, higher-order statistics, webpage |
14 | Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea |
High Capacity Steganographic Method Based Upon JPEG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 544-549, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Steganography, Image compression, Capacity, Data hiding, quantization, JPEG |
14 | Se-Min Kim, Gil-Je Lee, Kee-Young Yoo |
Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 569-574, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
indexcolor, graycolor, image, steganography, PSNR |
14 | Bin Li 0011, Yun Q. Shi 0001, Jiwu Huang |
Steganalysis of YASS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 139-148, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
yass, steganography, steganalysis, jpeg |
14 | Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Sergio SĂ¡nchez GarcĂa |
Detection of distributed steganographic information in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2008 Euro American conference on Telematics and Information Systems, EATIS 2008, Aracaju, Brazil, September 10-12, 2008, 2008, 978-1-59593-988-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stegsecret, social networks, steganography, steganalysis, captcha |
14 | Hedieh Sajedi, Mansour Jamzad |
A Steganalysis Method Based on Contourlet Transform Coefficients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 245-248, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Steganography, Steganalysis, Contourlet |
14 | Huajun Huang, Shaohong Zhong, Xingming Sun |
An Algorithm of Webpage Information Hiding Based on Attributes Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 257-260, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attributes permutation, steganography, information hiding, webpage |
14 | Nima Asadi 0002, Mansour Jamzad, Hedieh Sajedi |
Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1508-1511, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Boosting algorithms, Guassian filtering, Fusion techniques, Steganography, Steganalysis |
14 | Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez, Mohammad Ali Mehrabi |
Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1527-1530, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
LSB Matching, Steganography, Steganalysis, Co-Occurrence Matrix |
14 | Kensuke Naoe, Yoshiyasu Takefuji |
Damageless Information Hiding Technique Using Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 253-256, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Neural Network, Steganography, Digital Watermark, Information Hiding |
14 | Daniela Stanescu, Victor Groza, Mircea Stratulat, Daniel Borca, Ioana Ghergulescu |
Robust Watermarking with High Bit Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece, pp. 257-260, 2008, IEEE Computer Society, 978-0-7695-3163-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
watermarking, steganography, discrete cosine transform, karhunen-loeve transform |
14 | Ziad Sakr, Nicolas D. Georganas |
Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 3(3), pp. 18, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
XML, Multimedia, VRML, watermarking, steganography, polynomial, MPEG-4, XMT, pseudorandom sequences |
14 | Hioki Hirohisa |
Crocus: a steganographic filesystem manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 344-346, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
filesystem manager, steganography |
14 | Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo |
Detection of Hidden Information in Webpages Based on Randomness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 447-452, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
steganography, randomness, statistic, steganalysis, webpage |
14 | Lan Ma, Zhijun Wu 0001, Yun Hu, Wei Yang |
An Information-Hiding Model for Secure Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 1305-1314, 2007, Springer, 978-3-540-74170-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Information hiding model, Security, Steganography, Speech, Secure communication |
14 | Chin-Chen Chang 0001, Chih-Yang Lin, Yu-Zheng Wang |
A High Payload VQ Steganographic Method for Binary Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 467-481, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
genetic algorithm, clustering, Steganography, data hiding |
14 | Arati Baliga, Joe Kilian |
On covert collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 25-34, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
steganography, collaborative systems |
14 | Ki-Hyun Jung, Jae-Gil Yu, Se-Min Kim, Ki-Jong Kim, Jin-Yong Byun, Kee-Young Yoo |
The Hiding of Secret Data Using the Run Length Matching Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 1027-1034, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
embedded data, steganography, data hiding, run length encoding |
14 | Chin-Chen Chang 0001, Yi-Hui Chen, Yung-Chen Chou |
Reversible Data Embedding Technique for Palette Images Using De-clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCAM ![In: Multimedia Content Analysis and Mining, International Workshop, MCAM 2007, Weihai, China, June 30 - July 1, 2007, Proceedings, pp. 130-139, 2007, Springer. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Color palette image, declustering reversible, steganography, data hiding |
14 | Zongyuan Deng, Zhen Yang 0001, Xi Shao, Ning Xu 0002, Chao Wu, Haiyan Guo |
Design and Implementation of Steganographic Speech Telephone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 429-432, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
steganography, information hiding, Least Significant Bit (LSB) |
14 | Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu |
Digital invisible ink: revealing true secrets via attacking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 355, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DII watermarking, digital invisible ink, hiding watermark in watermark, steganography |
14 | Thomas S. Heydt-Benjamin, Andrei Serjantov, Benessa Defend |
Nonesuch: a mix network with sender unobservability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 1-8, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
minx packet format, oblivious channels, sender unobservability, steganography, public key, mix networks |
14 | Yue Li 0013, Chang-Tsun Li |
Steganographic Scheme for VQ Compressed Images Using Progressive Exponential Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Advanced Video and Signal Based Surveillance, 2006 IEEE International Conference on Video and Signal Based Surveillance (AVSS'06), 22-24 November 2006, Sydney, Australia., pp. 85, 2006, IEEE Computer Society, 0-7695-2688-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Steganography, data hiding, steganalysis, covert communication |
14 | Zongyuan Deng, Zhen Yang, Lixin Deng |
A Real-time Secure Voice Communication System Based on Speech Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 22, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multi-nary modulation system, speech recognition, steganography, information hiding, real-time communication |
14 | Rainer Böhme, Andreas Westfeld |
Feature-based encoder classification of compressed audio streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 11(2), pp. 108-120, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
MP3 Encoder classification, NaĂ¯ve bayes classifier, Steganography, Attacks, Steganalysis, Digital forensics |
14 | Jeremiah J. Harmsen, William A. Pearlman |
Capacity of steganographic channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 11-24, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
information spectrum, steganographic capacity, stego-channel, information theory, steganography, steganalysis |
14 | Matt Lepinski, Silvio Micali, Abhi Shelat |
Collusion-free protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 543-552, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
steganography, secure function evaluation |
14 | HweeHwa Pang, Kian-Lee Tan, Xuan Zhou 0001 |
Steganographic Schemes for File System and B-Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 16(6), pp. 701-713, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
plausible deniability, StegFD, StegBtree, security, access control, Steganography |
14 | Patrick Cousot, Radhia Cousot |
An abstract interpretation-based framework for software watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2004, Venice, Italy, January 14-16, 2004, pp. 173-185, 2004, ACM, 1-58113-729-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing |
14 | Mercan Topkara, Umut Topkara, Mikhail J. Atallah, CĂ¼neyt M. Taskiran, Eugene T. Lin, Edward J. Delp |
A hierarchical protocol for increasing the stealthiness of steganographic methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 16-24, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
quad-tree structure, statistical attacks, upper bound on detectability, steganography, digital watermarking, steganalysis |
14 | Maxim Sidorov |
Hidden Markov models and steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 63-67, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
hidden markov models, steganography, steganalysis |
14 | Benoit Roue, Patrick Bas, Jean-Marc Chassery |
Improving LSB steganalysis using marginal and joint probabilistic distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004, pp. 75-80, 2004, ACM, 1-58113-854-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
steganography, texture analysis, steganalysis, LSB |
14 | Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea, David Soukal |
Quantitative steganalysis of digital images: estimating the secret message length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(3), pp. 288-302, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Covert, Steganography, Attacks, Capacity, Steganalysis |
14 | Alan A. Jorgensen |
Testing with hostile data streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 28(2), pp. 9, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Adobe Acrobat Reader, software testing, steganography, random testing, buffer overflow, internet security, buffer overrun |
14 | Anil K. Jain 0001, Umut Uludag |
Hiding Biometric Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 25(11), pp. 1494-1498, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Biometrics, watermarking, steganography, fingerprint, data hiding, face, minutiae |
14 | Rakesh Agrawal 0001, Peter J. Haas, Jerry Kiernan |
Watermarking relational data: framework, algorithms and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 12(2), pp. 157-169, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Database, Watermarking, Steganography, Information hiding |
14 | Akiyoshi Wakatani |
Digital Watermaking for ROI Medical Images by Using Compresses Signature Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 157, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
embedded zero-tree wavelet, steganography, digital watermarking, ROI |
14 | Yvo Desmedt, Tri Van Le |
Moiré cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 116-124, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
privacy and anonymity, steganography, information hiding |
14 | Faisal Alturki, Russell M. Mersereau |
Secure high data embedding rate for steganographic application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 131-134, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
watermarking, steganography, data security, data embedding |
14 | Rajarathnam Chandramouli, Nasir D. Memon |
A distributed detection framework for Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 123-126, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
watermarking, Steganography, information hiding, fusion, Steganalysis, covert channels, distributed detection |
14 | Jiri Fridrich |
Robust Bit Extraction from Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 2 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume II, pp. 536-540, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
robust bit extraction, data embedding in video, watermarking for tamper detection, oblivious watermarking, steganography, Digital watermarking |
14 | Emil Praun, Hugues Hoppe, Adam Finkelstein |
Robust Mesh Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH ![In: Proceedings of the 26th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1999, Los Angeles, CA, USA, August 8-13, 1999, pp. 49-56, 1999, ACM, 0-201-48560-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
steganography, copyright protection |
14 | Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono |
Watermaking Three-Dimensional Polygonal Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the Fifth ACM International Conference on Multimedia '97, Seattle, WA, USA, November 9-13, 1997., pp. 261-272, 1997, ACM Press, 0-89791-991-2. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
digital watermaking, three-dimensional geometrical modeling, steganography, copyright protection, data hiding, digital fingerprinting, three-dimensional graphics |
11 | Qi Wen Gan, Wei-Chuen Yau, Yee Siang Gan, Iftekhar Salam, Shihui Guo, Chinchen Chang 0001, Yubing Wu, Luchen Zhou |
DSteganoM: Deep steganography for motion capture data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 238(Part C), pp. 121955, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | G. P. C. Venkata Krishna, D. Vivekananda Reddy |
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 46(2), pp. 4657-4667, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Dewang Wang, Gaobo Yang, Zhiqing Guo, Jiyou Chen |
Enhancing Adversarial Embedding based Image Steganography via Clustering Modification Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 20(1), pp. 20:1-20:20, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Kaito Onuma, Sumiko Miyata |
An Improved Intensity Factor of Correlation-Based Steganography Using M-Sequence and DCT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(1), pp. 12, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | R. B. Sushma, G. R. Manjula |
StegVRN: Enhancing Quality of Video Steganography Using CNN-Based Object Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(2), pp. 227, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | M. Vivek, K. V. Anusuya |
Robustness realisation in image steganography using frequency domain-based transforms for e-voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Gov. an Int. J. ![In: Electron. Gov. an Int. J. 20(2), pp. 223-239, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Shi Dong, Stelvio Cimato, Joarder Kamruzzaman, Yongsheng Hao |
Special Section Guest Editorial: Real-Time Image Steganography and Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electronic Imaging ![In: J. Electronic Imaging 33(1), 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Peiwen Zhuo, Diqun Yan, Kaiyu Ying, Rangding Wang, Li Dong 0006 |
Audio steganography cover enhancement via reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Image Video Process. ![In: Signal Image Video Process. 18(2), pp. 1007-1013, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 3812 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|