The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Steganography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-1998 (19) 1999-2000 (22) 2001 (18) 2002 (30) 2003 (41) 2004 (148) 2005 (152) 2006 (171) 2007 (157) 2008 (187) 2009 (141) 2010 (138) 2011 (122) 2012 (113) 2013 (129) 2014 (126) 2015 (153) 2016 (160) 2017 (166) 2018 (207) 2019 (249) 2020 (271) 2021 (291) 2022 (247) 2023 (275) 2024 (79)
Publication types (Num. hits)
article(1873) book(3) data(2) incollection(17) inproceedings(1872) phdthesis(40) proceedings(5)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 687 occurrences of 262 keywords

Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21David L. Robie, Russell M. Mersereau Video error correction using steganography. Search on Bibsonomy ICIP (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Rajarathnam Chandramouli, Nasir D. Memon Analysis of LSB based image steganography techniques. Search on Bibsonomy ICIP (3) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Toby Sharp An Implementation of Key-Based Digital Signal Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Chin-Chen Chang 0001, Jyh-Chiang Yeh, Ju Yuan Hsiao A Novel Scheme for Securing Image Steganography. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Christian Cachin An Information-Theoretic Model for Steganography. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
21Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu 0008 Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Fangjun Huang, Bin Li 0011, Jiwu Huang Universal JPEG steganalysis based on microscopic and macroscopic calibration. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen The Security Threat Posed by Steganographic Content on the Internet. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Bin Li 0011, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi 0001 Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Mehdi Kharrazi, Husrev Taha Sencar, Nasir D. Memon Cover Selection for Steganographic Embedding. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Mohammad Shirali-Shahreza M-Quiz by SMS. Search on Bibsonomy ICALT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21V. Suresh, S. Maria Sophia, C. E. Veni Madhavan Resampling Operations as Features for Detecting LSB Replacement and LSB Matching in Color Images. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Satoshi Kondo, Qiangfu Zhao A Novel Steganographic Technique Based on Image Morphing. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Paul Andrew Watters, Frances H. Martin, H. Steffen Stripf Visual Steganalysis of LSB-Encoded Natural Images. Search on Bibsonomy ICITA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Kwangsoo Lee, Changho Jung, Sangjin Lee 0002, HyungJun Kim, Jongin Lim 0001 Applying LR Cube Analysis to JSteg Detection. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Steven J. Murdoch, Stephen Lewis Embedding Covert Channels into TCP/IP. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Ashish Gehani, Thomas H. LaBean, John H. Reif DNA-based Cryptography. Search on Bibsonomy Aspects of Molecular Computing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Peizhong Lu, Xiangyang Luo, Qingyang Tang, Shen Li An Improved Sample Pairs Method for Detection of LSB Embedding. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Young-Shil Kim, Young-Mi Kim, Jin-Yong Choi, Doo-Kwon Baik Information Hiding System StegoWaveK for Improving Capacity. Search on Bibsonomy ISPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Xiangwei Kong, Ting Zhang, Xingang You, Deli Yang A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21RenĂ© Rosenbaum, Heidrun Schumann A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Elke Franz 0001, Andreas Pfitzmann EinfĂ¼hrung in die Steganographie und Ableitung eines neuen Stegoparadigmas. Search on Bibsonomy Inform. Spektrum The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Stegosystem, Kryptographie, Konzelation, Einbetten, Stegoparadigma, Angriffstypen, Scannen
14Hong Zhao, Yun Q. Shi 0001, Nirwan Ansari Hiding Data in Multimedia Streaming over Networks. Search on Bibsonomy CNSR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Network Steganography, information hiding, covert channels
14Jonathan M. Blackledge, Eugene Coyle e-Fraud Prevention Based on the Self-Authentication of e-Documents. Search on Bibsonomy ICDS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Covert encryption, e-Fraud, Authentication, Steganography, Information hiding
14Xiao Yi Yu, Aiming Wang Revisit LSB Matching. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Steganography, Steganalysis
14Xiao Yi Yu, Aiming Wang Genetic Algorithm Based Bayesian Network for Customers' Behavior Analysis. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Steganography, Steganalysis
14Pham Hai Dang Le, Matthias O. Franz Single Band Statistics and Steganalysis Performance. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF universal steganalysis, steganography, steganalysis
14Shang-Kuan Chen, Ran-Zan Wang High-Payload Image Hiding Scheme Using k-Way Block Matching. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF steganography, data hiding, block matching, image hiding
14Jeong-Chun Joo, Tae-Woo Oh, Jung-Ho Choi, Heung-Kyu Lee Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Sub-sampling, Difference histogram, Steganography, Calibration, Steganalysis
14Chin-Fang Lee, Huei-Ju Tsai A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF side-match prediction, steganography, reversible data hiding
14Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li A (2, 3) Threshold Secret Sharing Scheme Using Sudoku. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF steganography, secret sharing, Data hiding, Sudoku
14Hosei Matsuoka, Yusuke Nakashima, Takeshi Yoshimura Acoustic OFDM system and its extension. Search on Bibsonomy Vis. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Steganography, OFDM, Data hiding
14Qingzhong Liu, Andrew H. Sung, Mengyu Qiao Spectrum Steganalysis of WAV Audio Streams. Search on Bibsonomy MLDM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SVM, steganography, audio, steganalysis, derivative, spectrum
14Qingzhong Liu, Andrew H. Sung, Mengyu Qiao Novel stream mining for audio steganalysis. Search on Bibsonomy ACM Multimedia The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mel-cepstrum, second order derivative, signal complexity, SVM, steganography, audio, steganalysis, spectrum, markov
14Zohaib Khan, Atif Bin Mansoor A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique. Search on Bibsonomy SCIA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Classification, Feature Extraction, Steganography, Information Hiding, Steganalysis
14Semin Kim, Wesley De Neve, Yong Man Ro A Statistical and Iterative Method for Data Hiding in Palette-Based Images. Search on Bibsonomy IWDW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF palette-based images, steganography, information hiding, data hiding
14Wen-Chung Kuo, Lih-Chyau Wuu, Chia-Nian Shyi, Shao-Hung Kuo A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method. Search on Bibsonomy HIS (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cover Image, Security, Steganography, Data Hiding, Stego-Image
14Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang 0001, Yu-Lin Huang A reversible data hiding scheme based on dual steganographic images. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF irreversible data hiding, steganographic image, steganography, reversible data hiding
14Chin-Ho Chung, Wen-Yuan Chen, Ching-Ming Tu Image Hidden Technique Using QR-Barcode. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Image processing, Steganography, Error correction, JPEG, QR code
14Hirohisa Hioki Web behind Web - A Steganographic Web Framework. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF web, steganography, proxy
14Chin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang An Embedding Technique Based upon Block Prediction and Code Cascading Shift. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF side match vector quantization, steganography, histogram, vector quantization, reversible data hiding
14Marina Ponomar On Acceptable Modification Limits of Electroacoustic Speech Signals for Data Hiding. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF steganography, Data hiding, quantization index modulation
14Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pixel modification, Steganography, Imperceptible, High capacity
14Chi-Nan Lin, Chin-Chen Chang 0001, Wei-Bin Lee, Jason Lin A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hiding capacity, secret reference matrix, embedding, steganography, distortion
14Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang Reversible Secret Image Sharing Based on Shamir's Scheme. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptography, Steganography, Secret Sharing, Reversible, Fragile Watermark, Threshold Scheme
14Yunkai Gao, Xiaolong Li 0001, Bin Yang 0001 Employing Optimal Matrix for Efficient Matrix Embedding. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF matrix embedding, embedding efficiency, steganography, information hiding
14Yeuan-Kuen Lee, Graeme Bell, Shih-Yu Huang, Ran-Zan Wang, Shyong Jian Shyu An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding. Search on Bibsonomy PSIVT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LSB embedding, Steganography, steganalysis
14Zohaib Khan, Atif Bin Mansoor Steganalysis of JPEG Images with Joint Transform Features. Search on Bibsonomy PSIVT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Classification, Feature Extraction, Steganography, Information Hiding, Steganalysis
14Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF spread spectrum signal, detectability of stegosystems, Steganography, Bhattacharyya distance
14Huajun Huang, Shaohong Zhong, Xingming Sun Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF offse, steganography, steganalysis, higher-order statistics, webpage
14Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea High Capacity Steganographic Method Based Upon JPEG. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Steganography, Image compression, Capacity, Data hiding, quantization, JPEG
14Se-Min Kim, Gil-Je Lee, Kee-Young Yoo Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF indexcolor, graycolor, image, steganography, PSNR
14Bin Li 0011, Yun Q. Shi 0001, Jiwu Huang Steganalysis of YASS. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF yass, steganography, steganalysis, jpeg
14Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Sergio SĂ¡nchez GarcĂ­a Detection of distributed steganographic information in social networks. Search on Bibsonomy EATIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stegsecret, social networks, steganography, steganalysis, captcha
14Hedieh Sajedi, Mansour Jamzad A Steganalysis Method Based on Contourlet Transform Coefficients. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Steganography, Steganalysis, Contourlet
14Huajun Huang, Shaohong Zhong, Xingming Sun An Algorithm of Webpage Information Hiding Based on Attributes Permutation. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attributes permutation, steganography, information hiding, webpage
14Nima Asadi 0002, Mansour Jamzad, Hedieh Sajedi Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Boosting algorithms, Guassian filtering, Fusion techniques, Steganography, Steganalysis
14Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez, Mohammad Ali Mehrabi Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LSB Matching, Steganography, Steganalysis, Co-Occurrence Matrix
14Kensuke Naoe, Yoshiyasu Takefuji Damageless Information Hiding Technique Using Neural Network. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Neural Network, Steganography, Digital Watermark, Information Hiding
14Daniela Stanescu, Victor Groza, Mircea Stratulat, Daniel Borca, Ioana Ghergulescu Robust Watermarking with High Bit Rate. Search on Bibsonomy ICIW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking, steganography, discrete cosine transform, karhunen-loeve transform
14Ziad Sakr, Nicolas D. Georganas Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XML, Multimedia, VRML, watermarking, steganography, polynomial, MPEG-4, XMT, pseudorandom sequences
14Hioki Hirohisa Crocus: a steganographic filesystem manager. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filesystem manager, steganography
14Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo Detection of Hidden Information in Webpages Based on Randomness. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF steganography, randomness, statistic, steganalysis, webpage
14Lan Ma, Zhijun Wu 0001, Yun Hu, Wei Yang An Information-Hiding Model for Secure Communication. Search on Bibsonomy ICIC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Information hiding model, Security, Steganography, Speech, Secure communication
14Chin-Chen Chang 0001, Chih-Yang Lin, Yu-Zheng Wang A High Payload VQ Steganographic Method for Binary Images. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF genetic algorithm, clustering, Steganography, data hiding
14Arati Baliga, Joe Kilian On covert collaboration. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF steganography, collaborative systems
14Ki-Hyun Jung, Jae-Gil Yu, Se-Min Kim, Ki-Jong Kim, Jin-Yong Byun, Kee-Young Yoo The Hiding of Secret Data Using the Run Length Matching Method. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF embedded data, steganography, data hiding, run length encoding
14Chin-Chen Chang 0001, Yi-Hui Chen, Yung-Chen Chou Reversible Data Embedding Technique for Palette Images Using De-clustering. Search on Bibsonomy MCAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Color palette image, declustering reversible, steganography, data hiding
14Zongyuan Deng, Zhen Yang 0001, Xi Shao, Ning Xu 0002, Chao Wu, Haiyan Guo Design and Implementation of Steganographic Speech Telephone. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF steganography, information hiding, Least Significant Bit (LSB)
14Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu Digital invisible ink: revealing true secrets via attacking. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DII watermarking, digital invisible ink, hiding watermark in watermark, steganography
14Thomas S. Heydt-Benjamin, Andrei Serjantov, Benessa Defend Nonesuch: a mix network with sender unobservability. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF minx packet format, oblivious channels, sender unobservability, steganography, public key, mix networks
14Yue Li 0013, Chang-Tsun Li Steganographic Scheme for VQ Compressed Images Using Progressive Exponential Clustering. Search on Bibsonomy AVSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Steganography, data hiding, steganalysis, covert communication
14Zongyuan Deng, Zhen Yang, Lixin Deng A Real-time Secure Voice Communication System Based on Speech Recognition. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-nary modulation system, speech recognition, steganography, information hiding, real-time communication
14Rainer Böhme, Andreas Westfeld Feature-based encoder classification of compressed audio streams. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MP3 Encoder classification, NaĂ¯ve bayes classifier, Steganography, Attacks, Steganalysis, Digital forensics
14Jeremiah J. Harmsen, William A. Pearlman Capacity of steganographic channels. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information spectrum, steganographic capacity, stego-channel, information theory, steganography, steganalysis
14Matt Lepinski, Silvio Micali, Abhi Shelat Collusion-free protocols. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF steganography, secure function evaluation
14HweeHwa Pang, Kian-Lee Tan, Xuan Zhou 0001 Steganographic Schemes for File System and B-Tree. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF plausible deniability, StegFD, StegBtree, security, access control, Steganography
14Patrick Cousot, Radhia Cousot An abstract interpretation-based framework for software watermarking. Search on Bibsonomy POPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing
14Mercan Topkara, Umut Topkara, Mikhail J. Atallah, CĂ¼neyt M. Taskiran, Eugene T. Lin, Edward J. Delp A hierarchical protocol for increasing the stealthiness of steganographic methods. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF quad-tree structure, statistical attacks, upper bound on detectability, steganography, digital watermarking, steganalysis
14Maxim Sidorov Hidden Markov models and steganalysis. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF hidden markov models, steganography, steganalysis
14Benoit Roue, Patrick Bas, Jean-Marc Chassery Improving LSB steganalysis using marginal and joint probabilistic distributions. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF steganography, texture analysis, steganalysis, LSB
14Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea, David Soukal Quantitative steganalysis of digital images: estimating the secret message length. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Covert, Steganography, Attacks, Capacity, Steganalysis
14Alan A. Jorgensen Testing with hostile data streams. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Adobe Acrobat Reader, software testing, steganography, random testing, buffer overflow, internet security, buffer overrun
14Anil K. Jain 0001, Umut Uludag Hiding Biometric Data. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Biometrics, watermarking, steganography, fingerprint, data hiding, face, minutiae
14Rakesh Agrawal 0001, Peter J. Haas, Jerry Kiernan Watermarking relational data: framework, algorithms and analysis. Search on Bibsonomy VLDB J. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Database, Watermarking, Steganography, Information hiding
14Akiyoshi Wakatani Digital Watermaking for ROI Medical Images by Using Compresses Signature Image. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF embedded zero-tree wavelet, steganography, digital watermarking, ROI
14Yvo Desmedt, Tri Van Le MoirĂ© cryptography. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF privacy and anonymity, steganography, information hiding
14Faisal Alturki, Russell M. Mersereau Secure high data embedding rate for steganographic application. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF watermarking, steganography, data security, data embedding
14Rajarathnam Chandramouli, Nasir D. Memon A distributed detection framework for Steganalysis. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF watermarking, Steganography, information hiding, fusion, Steganalysis, covert channels, distributed detection
14Jiri Fridrich Robust Bit Extraction from Images. Search on Bibsonomy ICMCS, Vol. 2 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF robust bit extraction, data embedding in video, watermarking for tamper detection, oblivious watermarking, steganography, Digital watermarking
14Emil Praun, Hugues Hoppe, Adam Finkelstein Robust Mesh Watermarking. Search on Bibsonomy SIGGRAPH The full citation details ... 1999 DBLP  DOI  BibTeX  RDF steganography, copyright protection
14Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono Watermaking Three-Dimensional Polygonal Models. Search on Bibsonomy ACM Multimedia The full citation details ... 1997 DBLP  DOI  BibTeX  RDF digital watermaking, three-dimensional geometrical modeling, steganography, copyright protection, data hiding, digital fingerprinting, three-dimensional graphics
11Qi Wen Gan, Wei-Chuen Yau, Yee Siang Gan, Iftekhar Salam, Shihui Guo, Chinchen Chang 0001, Yubing Wu, Luchen Zhou DSteganoM: Deep steganography for motion capture data. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11G. P. C. Venkata Krishna, D. Vivekananda Reddy Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Dewang Wang, Gaobo Yang, Zhiqing Guo, Jiyou Chen Enhancing Adversarial Embedding based Image Steganography via Clustering Modification Directions. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Kaito Onuma, Sumiko Miyata An Improved Intensity Factor of Correlation-Based Steganography Using M-Sequence and DCT. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11R. B. Sushma, G. R. Manjula StegVRN: Enhancing Quality of Video Steganography Using CNN-Based Object Selection. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11M. Vivek, K. V. Anusuya Robustness realisation in image steganography using frequency domain-based transforms for e-voting. Search on Bibsonomy Electron. Gov. an Int. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shi Dong, Stelvio Cimato, Joarder Kamruzzaman, Yongsheng Hao Special Section Guest Editorial: Real-Time Image Steganography and Steganalysis. Search on Bibsonomy J. Electronic Imaging The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Peiwen Zhuo, Diqun Yan, Kaiyu Ying, Rangding Wang, Li Dong 0006 Audio steganography cover enhancement via reinforcement learning. Search on Bibsonomy Signal Image Video Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 3812 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license