The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hiding with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1986 (16) 1987-1988 (19) 1989-1990 (26) 1991-1992 (33) 1993-1994 (34) 1995 (16) 1996 (60) 1997 (33) 1998 (57) 1999 (81) 2000 (82) 2001 (133) 2002 (150) 2003 (138) 2004 (237) 2005 (260) 2006 (445) 2007 (676) 2008 (672) 2009 (634) 2010 (469) 2011 (330) 2012 (357) 2013 (424) 2014 (559) 2015 (479) 2016 (418) 2017 (559) 2018 (611) 2019 (470) 2020 (406) 2021 (393) 2022 (406) 2023 (434) 2024 (116)
Publication types (Num. hits)
article(3917) book(6) incollection(43) inproceedings(6167) phdthesis(50) proceedings(50)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3873 occurrences of 1970 keywords

Results
Found 10233 publication records. Showing 10233 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Ling Du, Xiaochun Cao, Muhua Zhang, Huazhu Fu Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Pascal Schöttle, Rainer Böhme A Game-Theoretic Approach to Content-Adaptive Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Shijun Xiang Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Minoru Kuribayashi Bias Equalizer for Binary Probabilistic Fingerprinting Codes. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Jessica J. Fridrich, Jan Kodovský Steganalysis of LSB Replacement Using Parity-Aware Features. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. Sicker Secret Agent Radio: Covert Communication through Dirty Constellations. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Aggelos Kiayias, Alexander Russell, Narasimha K. Shashidhar Key-Efficient Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Yun Q. Shi 0001, Patchara Sutthiwan, Licong Chen Textural Features for Steganalysis. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Peijia Zheng, Jiwu Huang Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Wei-Hong Chuang, Min Wu 0001 Robustness of Color Interpolation Identification against Anti-forensic Operations. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Chenglong Chen, Jiangqun Ni, Rongbin Huang, Jiwu Huang Blind Median Filtering Detection Using Statistics in Difference Domain. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Teddy Furon, Patrick Bas A New Measure of Watermarking Security Applied on QIM. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Jan Kodovský, Jessica J. Fridrich JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Dion Boesten, Boris Skoric Asymptotic Fingerprinting Capacity in the Combined Digit Model. Search on Bibsonomy Information Hiding The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu Reversible Data Hiding By Adaptive IWT-coefficient Adjustment. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2011 DBLP  BibTeX  RDF
23Yun Q. Shi 0001, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.) Transactions on Data Hiding and Multimedia Security VI Search on Bibsonomy Trans. Data Hiding and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Tomás Filler, Tomás Pevný, Scott Craver, Andrew D. Ker (eds.) Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Patchara Sutthiwan, Yun Q. Shi 0001, Hong Zhao, Tian-Tsong Ng, Wei Su 0001 Markovian Rake Transform for Digital Image Tampering Detection. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23A. Venkata Subramanyam, Sabu Emmanuel Robust Watermarking of Compressed JPEG Images in Encrypted Domain. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Huijuan Yang, Xudong Jiang 0001, Alex C. Kot Embedding Binary Watermarks in Dual-Tree Complex Wavelets Domain for Access Control of Digital Images. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Shijun Xiang, Hyoung-Joong Kim Histogram-Based Image Hashing for Searching Content-Preserving Copies. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Sami Zhioua Anonymity Attacks on Mix Systems: A Formal Analysis. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Sebastian Schrittwieser, Stefan Katzenbeisser 0001 Code Obfuscation against Static and Dynamic Reverse Engineering. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Gokhan Gul, Fatih Kurugollu A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO). Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov Stegobot: A Covert Social Network Botnet. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Jutta Hämmerle-Uhl, Karl Raab, Andreas Uhl Watermarking as a Means to Enhance Biometric Systems: A Critical Survey. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Peter Meerwald, Teddy Furon Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox An Asymmetric Fingerprinting Scheme Based on Tardos Codes. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Gergely Ács, Claude Castelluccia I Have a DREAM! (DiffeRentially privatE smArt Metering). Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Dion Boesten, Boris Skoric Asymptotic Fingerprinting Capacity for Non-binary Alphabets. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Rémi Cogranne, Cathel Zitzmann, Lionel Fillatre, Florent Retraint, Igor V. Nikiforov, Philippe Cornu A Cover Image Model For Reliable Steganalysis. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Cathel Zitzmann, Rémi Cogranne, Florent Retraint, Igor V. Nikiforov, Lionel Fillatre, Philippe Cornu Statistical Decision Methods in Hidden Information Detection. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Amir Houmansadr, Nikita Borisov CoCo: Coding-Based Covert Timing Channels for Network Flows. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Antonino Simone, Boris Skoric Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Yun Cao, Xianfeng Zhao, Dengguo Feng, Rennong Sheng Video Steganography with Perturbed Motion Estimation. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Peng Meng, Yun-Qing Shi 0001, Liusheng Huang, Zhili Chen, Wei Yang 0011, Abdelrahman Desoky LinL: Lost in n-best List. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Patrick Bas Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23George Danezis, Markulf Kohlweiss, Alfredo Rial Differentially Private Billing with Rebates. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Shiyue Lai, Rainer Böhme Countering Counter-Forensics: The Case of JPEG Compression. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Gwenaël J. Doërr Improving Tonality Measures for Audio Watermarking. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Patrick Bas, Tomás Filler, Tomás Pevný "Break Our Steganographic System": The Ins and Outs of Organizing BOSS. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Jessica J. Fridrich, Jan Kodovský, Vojtech Holub, Miroslav Goljan Breaking HUGO - The Process Discovery. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Jessica J. Fridrich, Jan Kodovský, Vojtech Holub, Miroslav Goljan Steganalysis of Content-Adaptive Steganography in Spatial Domain. Search on Bibsonomy Information Hiding The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Chia-Chen Lin 0001, Pei-Feng Shiu HighCapacity Data Hiding Scheme for DCT-based Images. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2010 DBLP  BibTeX  RDF
23Ching-Yu Yang, Wu-Chih Hu, Chih-Hung Lin Reversible Data Hiding by Coefficient-bias Algorithm. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2010 DBLP  BibTeX  RDF
23Yun Q. Shi 0001 (eds.) Transactions on Data Hiding and Multimedia Security V Search on Bibsonomy Trans. Data Hiding and Multimedia Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Rainer Böhme, Philip W. L. Fong, Reihaneh Safavi-Naini (eds.) Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Byung-Ho Cha, C.-C. Jay Kuo Collusion-Resistant Fingerprinting Systems: Review and Recent Results. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Moussadek Laadjel, Ahmed Bouridane, Fatih Kurugollu, Omar Nibouche, WeiQi Yan 0001 Partial Palmprint Matching Using Invariant Local Minutiae Descriptors. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Michael J. Metternich, Marcel Worring, Arnold W. M. Smeulders Color Based Tracing in Real-Life Surveillance Data. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Jonathan Weir, WeiQi Yan 0001 A Comprehensive Study of Visual Cryptography. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Jonathan Weir, WeiQi Yan 0001 Secure Masks for Visual Cryptography. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Izumi Ito, Hitoshi Kiya Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Koji Nuida Short Collusion-Secure Fingerprint Codes against Three Pirates. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Boris Skoric Security with Noisy Data - (Extended Abstract of Invited Talk). Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Dong Zhang 0002, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, Jiwu Huang Security Analysis of ISS Watermarking Using Natural Scene Statistics. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Andrew D. Ker The Square Root Law in Stegosystems with Imperfect Information. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Anindya Sarkar, Kaushal Solanki, B. S. Manjunath Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Minoru Kuribayashi Tardos's Fingerprinting Code over AWGN Channel. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Peng Meng, Liusheng Huang, Zhili Chen, Yuchong Hu, Wei Yang 0011 STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Nayantara Mallesh, Matthew K. Wright The Reverse Statistical Disclosure Attack. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Sudeep Ghosh, Jason Hiser, Jack W. Davidson A Secure and Robust Approach to Software Tamper Resistance. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Jennifer L. Davidson, Jaikishan Jalan Steganalysis Using Partially Ordered Markov Models. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Valentin Schwamberger, Pham Hai Dang Le, Bernhard Schölkopf, Matthias O. Franz The Influence of the Image Basis on Modeling and Steganalysis Performance. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz 0001, Stefan Katzenbeisser 0001 Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Jian Cao, Jiwu Huang Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Tomás Pevný, Tomás Filler, Patrick Bas Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Farinaz Koushanfar, Azalia Mirhoseini, Yousra Alkabani A Unified Submodular Framework for Multimodal IC Trojan Detection. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Jian Cao, Jiwu Huang, Jiangqun Ni A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Mehrdad Majzoobi, Ahmed Elnably, Farinaz Koushanfar FPGA Time-Bounded Unclonable Authentication. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Christian Riess, Elli Angelopoulou Scene Illumination as an Indicator of Image Manipulation. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Seung-Jin Ryu, Min-Jeong Lee, Heung-Kyu Lee Detection of Copy-Rotate-Move Forgery Using Zernike Moments. Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Gábor Tardos Capacity of Collusion Secure Fingerprinting - A Tradeoff between Rate and Efficiency - (Extended Abstract of Invited Talk). Search on Bibsonomy Information Hiding The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Yun Q. Shi 0001 (eds.) Transactions on Data Hiding and Multimedia Security IV Search on Bibsonomy Trans. Data Hiding and Multimedia Security The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Stefan Katzenbeisser 0001, Ahmad-Reza Sadeghi (eds.) Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Xiaojun Qi, Ji Qi A Desynchronization Resilient Watermarking Scheme. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Desynchronization resilient digital watermarking, important feature points, spread-spectrum-based blind watermarking, Delaunay triangle matching
23Angela Piper, Reihaneh Safavi-Naini How to Compare Image Watermarking Algorithms. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Robert Buchholz, Christian Krätzer, Jana Dittmann Microphone Classification Using Fourier Coefficients. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF media forensics, FFT based microphone classification
23Kwangtaek Kim, Mauro Barni, Hong Z. Tan Roughness-Adaptive 3D Watermarking of Polygonal Meshes. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Michael Nelson 0002, Ani Nahapetian, Farinaz Koushanfar, Miodrag Potkonjak SVD-Based Ghost Circuitry Detection. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hardware Trojan horses, gate characterization, singular value decomposition, manufacturing variability
23Nathan Beckmann, Miodrag Potkonjak Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PPUF, security, cryptography, public key cryptography
23Min-Jeong Lee, Kyung-Su Kim 0001, Heung-Kyu Lee Forensic Tracking Watermarking against In-theater Piracy. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF forensic tracking watermarking, in-theater piracy, local auto-correlation function (LACF)
23Chunfang Yang, Xiangyang Luo, Fenlin Liu Embedding Ratio Estimating for Each Bit Plane of Image. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Andreas Westfeld Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Koji Nuida An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Teddy Furon, Luis Pérez-Freire, Arnaud Guyader, Frédéric Cérou Estimating the Minimal Length of Tardos Code. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tardos code, Fingerprinting, Traitor tracing, Rare event
23Hongjie He, Jiashu Zhang, Heng-Ming Tai Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block-neighborhood characterization, constant-average attack, fragile watermarking, self-recovery
23Thomas Gloe, Karsten Borowka, Antje Winkler Feature-Based Camera Model Identification Works in Practice. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Michael Arnold, Peter G. Baum, Walter Voeßing A Phase Modulation Audio Watermarking Technique. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Andrew D. Ker Estimating Steganographic Fisher Information in Real Images. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Sascha Zmudzinski, Martin Steinebach Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Zhenhua Qu, Guoping Qiu, Jiwu Huang Detect Digital Image Splicing with Visual Cues. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Heather Crawford, John Aycock Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Tomás Filler, Jessica J. Fridrich Fisher Information Determines Capacity of ε-Secure Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Rainer Böhme An Epistemological Approach to Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Yun Q. Shi 0001 (eds.) Transactions on Data Hiding and Multimedia Security III Search on Bibsonomy Trans. Data Hiding and Multimedia Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas (eds.) Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow (eds.) Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jürgen Bierbrauer, Jessica J. Fridrich Constructing Good Covering Codes for Applications in Steganography. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF spread spectrum signal, detectability of stegosystems, Steganography, Bhattacharyya distance
Displaying result #401 - #500 of 10233 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license