The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Steganography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-1998 (19) 1999-2000 (22) 2001 (18) 2002 (30) 2003 (41) 2004 (148) 2005 (152) 2006 (171) 2007 (157) 2008 (187) 2009 (141) 2010 (138) 2011 (122) 2012 (113) 2013 (129) 2014 (126) 2015 (153) 2016 (160) 2017 (166) 2018 (207) 2019 (249) 2020 (271) 2021 (291) 2022 (247) 2023 (275) 2024 (79)
Publication types (Num. hits)
article(1873) book(3) data(2) incollection(17) inproceedings(1872) phdthesis(40) proceedings(5)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 687 occurrences of 262 keywords

Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Xiaoyi Yu, Noboru Babaguchi A fast and effective method to detect multiple least significant bits steganography. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF steganography steganalysis
25Zishuai Li, Xingming Sun, Baowei Wang, Xiaoliang Wang 0002 A Steganography Scheme in P2P Network. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BitTorrent Network, Torrent file, Steganography, P2P Network
25Lingjun Li, Liusheng Huang, Xinxin Zhao, Wei Yang 0011, Zhili Chen A Statistical Attack on a Kind of Word-Shift Text-Steganography. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF word shift, statical attack, PDF, text-steganography
25Weiming Zhang, Xinpeng Zhang 0001, Shuozhong Wang Twice Gric Colorings in Steganography. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF embedding efficiency, change rate, rainbow coloring, steganography, information rate
25Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng Secret Sharing Systems with Authentication-Based Steganography. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF pattern LSB, Cyclic Redundancy Code, Authentication, Steganography, Secret image sharing
25Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza Steganography in Silence Intervals of Speech. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Steganography, Data Hiding, Speech Processing
25Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang Enhance the Image Sharing with Steganography and Authentication. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (k, n)-Threshold Scheme, Cryptography, Steganography, Secret Sharing, Galois Field, Fragile Watermark
25Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza A New Synonym Text Steganography. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Synonym Words, Information Hiding, Text Steganography
25Naofumi Aoki A Technique of Lossless Steganography for G.711 Telephony Speech. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF steganography, VoIP, G.711
25Yongping Liu, Xingming Sun, Yuling Liu, Rong Xiao File-Update Based Steganography for Microsoft PowerPoint Files. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF File-Update, Microsoft PowerPoint File, Steganography
25Hao-Tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung A Data Mapping Method for Steganography and Its Application to Images. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LSB?+? algorithm, bijective mapping, first-order statistics, sample pair analysis, Steganography
25Yue Li 0013, Chang-Tsun Li, Chia-Hung Wei Protection of Mammograms Using Blind Steganography and Watermarking. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF P ACS, Steganography, Digital Watermarking, Mammograms
25Ziwen Sun, Zhicheng Ji A Security Steganography Method for Lossy Compression Gray Scale Image. Search on Bibsonomy ICIC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF robust, steganography, DCT, average
25Christian Krätzer, Jana Dittmann, Andreas Lang 0001, Tobias Kühne WLAN steganography: a first practical review. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF WLAN, steganography
25Tri Van Le, Kaoru Kurosawa Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adaptive chosen stegotext attack, steganography, bandwidth, information hiding
25Kenny Hunt A Java framework for experimentation with steganography. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF image processing, steganography, computer security, information hiding
24Jibang Liu, Karthik Kumar, Yung-Hsiang Lu Tradeoff between energy savings and privacy protection in computation offloading. Search on Bibsonomy ISLPED The full citation details ... 2010 DBLP  DOI  BibTeX  RDF image retrieval, steganography, energy saving, privacy protection, computation offloading
24Fangjun Huang, Jiwu Huang Calibration based universal JPEG steganalysis. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF microscopic calibration, macroscopic calibration, steganography, steganalysis, JPEG
24Chin-Chen Chang 0001, Yi-Hui Chen, Chia-Chen Lin 0001 A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block truncation code, Modification direction, Genetic algorithm, Steganography, Data embedding
24Yedidya Hilewitz, Ruby B. Lee Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bit scatter, Bit gather, Parallel deposit, Unpack, Algorithm acceleration, Bioinformatics, Compression, Pattern matching, Steganography, Microprocessors, Permutations, Pack, Instruction set architecture, Cryptology, ISA, Parallel extract, Bit manipulations
24Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski TrustMAS: Trusted Communication Platform for Multi-Agent Systems. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi agents systems, steganography, information hiding
24Jan Kodovský, Jessica J. Fridrich On completeness of feature spaces in blind steganalysis. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fcm, steganography, completeness, blind steganalysis
24Andrew D. Ker, Tomás Pevný, Jan Kodovský, Jessica J. Fridrich The square root law of steganographic capacity. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF steganographic capacity, benchmarking, steganography, steganalysis
24Genta Suzuki, Nobuyasu Yamaguchi, Shigeyoshi Nakamura, Hirotaka Chiba Mobile interaction using steganographic image on mobile display. Search on Bibsonomy Mobile HCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile display, mobile ticket, user interface, image processing, mobile phones, steganography, mobile gaming
24Yu-Ming Cheng, Chung-Ming Wang An adaptive steganographic algorithm for 3D polygonal meshes. Search on Bibsonomy Vis. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 3D polygonal meshes, Steganography, Human visual system
24Yun Q. Shi 0001, Chunhua Chen 0001, Guorong Xuan, Wei Su 0001 Steganalysis Versus Splicing Detection. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF splicing detection, natural image model, Steganography, steganalysis, digital forensics, tampering detection
24Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli Steganalysis of GIM-based data hiding using kernel density estimation. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF gamma density, steganography, steganalysis, kernel density estimation, mode, skewness, quantization index modulation
24Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DIAL, mobile-content development, mobile power usage, steganography
24Yu-Ming Cheng, Chung-Ming Wang A high-capacity steganographic approach for 3D polygonal meshes. Search on Bibsonomy Vis. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Representation domain, Steganography, Spatial domain
24Daniel E. Stevenson PNG palette permuter. Search on Bibsonomy ITiCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF compression, encryption, steganography, CS2
24Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang 0004 Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Block mapping, Genetic Algorithm, Steganography, LSB
24Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou 0001 An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. Search on Bibsonomy PReMI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mobile Devices, Information Security, Steganography, Digital Watermarking, JPEG Compression
24Sorina Dumitrescu, Xiaolin Wu 0001 LSB steganalysis based on high-order statistics. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF LSB steganography, steganalysis, digital media
24Chin-Chen Chang 0001, Chih-Yang Lin, Yu-Zheng Wang VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-way search, clustering, Steganography, data hiding
24Luis von Ahn, Nicholas J. Hopper, John Langford 0001 Covert two-party computation. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF covert computation, fair two-party computation, two-party computation, steganography
24Xiang-Wei Kong, Wen-Feng Liu, Xin-Gang You Secret Message Location Steganalysis Based on Local Coherences of Hue. Search on Bibsonomy PCM (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF locating secret message, the coherences of hue, steganography, steganalysis
24Hala A. Farouk, Magdy Saeb Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FPGA, architecture, Steganography, data hiding, subliminal channel, covert communications
24Wei Ding, Xiang-Wei Kong, Xin-Gang You, Zi-Ren Wang A Secure Steganographic Method on Wavelet Domain of Palette-Based Images. Search on Bibsonomy PCM (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GIF image, matrix encoding, security, Steganography, integer wavelet
24Yu-Chee Tseng, Hsiang-Kuang Pan Data Hiding in 2-Color Images. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Binary image processing, prisoners' problem, security, cryptography, steganography, coding, information hiding
24Franck Leprévost, Raphaël Erard, Touradj Ebrahimi How to bypass the Wassenaar arrangement: a new application for watermarking. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Wassenaar arrangement, cryptography, watermarking, steganography
24Jan Zöllner 0002, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf Modeling the Security of Steganographic Systems. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Security and modeling of steganography, indeterminism, secret communication, hidden communication, entropy
22Shahnawaz Ahmad, Justin Onyarin Ogala, Festus Ikpotokin, Mohd Arif, Javed Ahmad, Shabana Mehfuz Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Nibraas Khan, Ruj Haan, George Boktor, Michael McComas, Ramin Daneshi Steganography GAN: Cracking Steganography with Cycle Generative Adversarial Networks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
22Mehdi Sharifzadeh, Mohammed Aloraini, Dan Schonfeld Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Ahmad Zakaria Batch steganography and pooled steganalysis in JPEG images. (Batch steganography et pooled steganalysis dans les images JPEG). Search on Bibsonomy 2020   RDF
22Nuzhat Naqvi, Aliya Tabassum Abbasi, Rasheed Hussain, M. Aihab Khan, Basheer Ahmad Correction to: Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Sahar A. El-Rahman A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Nuzhat Naqvi, Aliya Tabassum Abbasi, Rasheed Hussain, M. Aihab Khan, Basheer Ahmad Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Han-Zhou Wu, Hong-Xia Wang 0001, Yun-Qing Shi 0001 Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
22Patrick Bas Natural Steganography: cover-source switching for better steganography. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
22Sebastian Berndt 0001, Maciej Liskiewicz Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions. Search on Bibsonomy IH&MMSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22G. Savithri, Vinupriya, Sayali Mane, J. Saira Banu Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography. Search on Bibsonomy CVIP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Dipti Kapoor Sarmah, Neha Bajpai Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
22Malte Diehl Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. Search on Bibsonomy SECRYPT The full citation details ... 2008 DBLP  BibTeX  RDF
21Alberto Guillén, Antti Sorjamaa, Yoan Miche, Amaury Lendasse, Ignacio Rojas Efficient Parallel Feature Selection for Steganography Problems. Search on Bibsonomy IWANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Giacomo Cancelli, Gwenaël J. Doërr, Ingemar J. Cox, Mauro Barni Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal 0001, Lalit M. Patnaik Robust image adaptive steganography using integer wavelets. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Rita Ferreira, Bernardete Ribeiro, Catarina Silva 0001, Qingzhong Liu, Andrew H. Sung Building resilient classifiers for LSB matching steganography. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt Securing information content using new encryption method and Steganography. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht New approaches to encryption and steganography for digital videos. Search on Bibsonomy Multim. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Jessica J. Fridrich, Petr Lisonek Grid Colorings in Steganography. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Xiaoyi Yu, Xinshan Zhu, Noboru Babaguchi Steganography using Sensor Noise and Linear Prediction Synthesis Filter. Search on Bibsonomy ICIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan Research on Steganalysis for Text Steganography Based on Font Format. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Font format, Hidden information length, Support vector machine, Steganalysis, Text
21Bo Xu, Jiazhen Wang, Deyun Peng Practical Protocol Steganography: Hiding Data in IP Header. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Mohammad Shirali-Shahreza Improving Mobile Banking Security Using Steganography. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Shunquan Tan, Jiwu Huang, Yun Q. Shi 0001 Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Paul Andrew Watters, Frances H. Martin, H. Steffen Stripf Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective? Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Yuan-Yu Tsai, Chung-Ming Wang, Yu-Ming Cheng, Chung-Hsien Chang, Peng-Cheng Wang Steganography on 3D Models Using a Spatial Subdivision Technique. Search on Bibsonomy Computer Graphics International The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete Ribeiro Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. Search on Bibsonomy ICPR (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Nan Jiang, Jian Wang, Xinxin Niu, Yixian Yang Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Ping Wang 0010, Xiangyang Luo, Fenlin Liu An Improved Secret Key Estimation Method for Sequential Steganography. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Niansheng Liu, Donghui Guo, Gerard Parr A New Image Steganography for Internet Communications Based on Chaotic Sequences. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Mohammad Shirali-Shahreza Java Applets Copy Protection by Steganography. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Younhee Kim, Zoran Duric, Dana Richards Modified Matrix Encoding Technique for Minimal Distortion Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Andreas Westfeld Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell Upper and Lower Bounds on Black-Box Steganography. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Michael Backes 0001, Christian Cachin Public-Key Steganography with Active Attacks. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Stefan Hetzl, Petra Mutzel A Graph-Theoretic Approach to Steganography. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Ingemar J. Cox, Ton Kalker, Georg Pakura, Mathias Scheel Information Transmission and Steganography. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Xiangyang Luo, Bin Liu 0008, Fenlin Liu Detecting LSB Steganography Based on Dynamic Masks. Search on Bibsonomy ISDA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Xinpeng Zhang 0001, Shuozhong Wang Analysis of Parity Assignment Steganography in Palette Images. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Chin-Shiuh Shieh, Chao-Chin Chang, Shu-Chuan Chu, Jui-Fang Chang A New Steganography Scheme in the Domain of Side-Match Vector Quantization. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Yusuke Seki, Hiroyuki Kobayashi, Masaaki Fujiyoshi, Hitoshi Kiya Quantization-based image steganography without data hiding position memorization. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Xiangyang Luo, Bin Liu 0008, Fenlin Liu Improved RS Method for Detection of LSB Steganography. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Kwangsoo Lee, Changho Jung, Sangjin Lee 0002, Jongin Lim 0001 New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Elke Franz 0001, Antje Schneidewind Pre-processing for Adding Noise Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah Translation-Based Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Stark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David A. Wagner 0001 An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Zoran Duric, Dana Richards, Younhee Kim Minimizing the Statistical Impact of LSB Steganography. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Xiaoyi Yu, Yunhong Wang, Tieniu Tan On Estimation of Secret Message Length in JSteg-like Steganography. Search on Bibsonomy ICPR (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21V. Kavitha, K. S. Easwarakumar Neural Based Steganography. Search on Bibsonomy PRICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Mohamed Fahmy Tolba, M. Al-Said Ghonemy, Ismail Abdoul-Hameed Taha, Amal Said Khalifa High capacity image steganography using wavelet-based fusion. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala Defeating the Current Steganalysis Techniques (Robust Steganography). Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Chin-Chen Chang 0001, Piyu Tsai, Min-Hui Lin 0001 An Adaptive Steganography for Index-Based Images Using Codeword Grouping. Search on Bibsonomy PCM (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Niels Provos, Peter Honeyman Hide and Seek: An Introduction to Steganography. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Mei-Yi Wu, Yu-Kun Ho, Jia-Hong Lee A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Ramamurti Chandramouli, Koduvayur P. Subbalakshmi Active steganalysis of spread spectrum image steganography. Search on Bibsonomy ISCAS (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Michiharu Niimi, Hideki Noda, Eiji Kawaguchi, Richard O. Eason Luminance Quasi-Preserving Color Quantization for Digital Steganography to Palette-Based Images. Search on Bibsonomy ICPR (1) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil Eliminating Steganography in Internet Traffic with Active Wardens. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Sorina Dumitrescu, Xiaolin Wu 0001, Zhe Wang 0022 Detection of LSB Steganography via Sample Pair Analysis. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 3812 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license