|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 687 occurrences of 262 keywords
|
|
|
Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Xiaoyi Yu, Noboru Babaguchi |
A fast and effective method to detect multiple least significant bits steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1443-1447, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
steganography steganalysis |
25 | Zishuai Li, Xingming Sun, Baowei Wang, Xiaoliang Wang 0002 |
A Steganography Scheme in P2P Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 20-24, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
BitTorrent Network, Torrent file, Steganography, P2P Network |
25 | Lingjun Li, Liusheng Huang, Xinxin Zhao, Wei Yang 0011, Zhili Chen |
A Statistical Attack on a Kind of Word-Shift Text-Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1503-1507, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
word shift, statical attack, PDF, text-steganography |
25 | Weiming Zhang, Xinpeng Zhang 0001, Shuozhong Wang |
Twice Gric Colorings in Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1301-1304, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
embedding efficiency, change rate, rainbow coloring, steganography, information rate |
25 | Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng |
Secret Sharing Systems with Authentication-Based Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1146-1149, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
pattern LSB, Cyclic Redundancy Code, Authentication, Steganography, Secret image sharing |
25 | Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza |
Steganography in Silence Intervals of Speech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 605-607, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Steganography, Data Hiding, Speech Processing |
25 | Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang |
Enhance the Image Sharing with Steganography and Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1177-1181, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
(k, n)-Threshold Scheme, Cryptography, Steganography, Secret Sharing, Galois Field, Fragile Watermark |
25 | Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza |
A New Synonym Text Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 1524-1526, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Synonym Words, Information Hiding, Text Steganography |
25 | Naofumi Aoki |
A Technique of Lossless Steganography for G.711 Telephony Speech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 608-611, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
steganography, VoIP, G.711 |
25 | Yongping Liu, Xingming Sun, Yuling Liu, Rong Xiao |
File-Update Based Steganography for Microsoft PowerPoint Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 11-15, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
File-Update, Microsoft PowerPoint File, Steganography |
25 | Hao-Tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung |
A Data Mapping Method for Steganography and Its Application to Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 236-250, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
LSB?+? algorithm, bijective mapping, first-order statistics, sample pair analysis, Steganography |
25 | Yue Li 0013, Chang-Tsun Li, Chia-Hung Wei |
Protection of Mammograms Using Blind Steganography and Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 496-500, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
P ACS, Steganography, Digital Watermarking, Mammograms |
25 | Ziwen Sun, Zhicheng Ji |
A Security Steganography Method for Lossy Compression Gray Scale Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007, Proceedings, pp. 636-645, 2007, Springer, 978-3-540-74170-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
robust, steganography, DCT, average |
25 | Christian Krätzer, Jana Dittmann, Andreas Lang 0001, Tobias Kühne |
WLAN steganography: a first practical review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006, pp. 17-22, 2006, ACM, 1-59593-493-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
WLAN, steganography |
25 | Tri Van Le, Kaoru Kurosawa |
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 297-313, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
adaptive chosen stegotext attack, steganography, bandwidth, information hiding |
25 | Kenny Hunt |
A Java framework for experimentation with steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005, pp. 282-286, 2005, ACM, 1-58113-997-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
image processing, steganography, computer security, information hiding |
24 | Jibang Liu, Karthik Kumar, Yung-Hsiang Lu |
Tradeoff between energy savings and privacy protection in computation offloading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2010 International Symposium on Low Power Electronics and Design, 2010, Austin, Texas, USA, August 18-20, 2010, pp. 213-218, 2010, ACM, 978-1-4503-0146-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
image retrieval, steganography, energy saving, privacy protection, computation offloading |
24 | Fangjun Huang, Jiwu Huang |
Calibration based universal JPEG steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(2), pp. 260-268, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
microscopic calibration, macroscopic calibration, steganography, steganalysis, JPEG |
24 | Chin-Chen Chang 0001, Yi-Hui Chen, Chia-Chen Lin 0001 |
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 13(4), pp. 321-331, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Block truncation code, Modification direction, Genetic algorithm, Steganography, Data embedding |
24 | Yedidya Hilewitz, Ruby B. Lee |
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Signal Process. Syst. ![In: J. Signal Process. Syst. 53(1-2), pp. 145-169, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Bit scatter, Bit gather, Parallel deposit, Unpack, Algorithm acceleration, Bioinformatics, Compression, Pattern matching, Steganography, Microprocessors, Permutations, Pack, Instruction set architecture, Cryptology, ISA, Parallel extract, Bit manipulations |
24 | Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski |
TrustMAS: Trusted Communication Platform for Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II, pp. 1019-1035, 2008, Springer, 978-3-540-88872-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multi agents systems, steganography, information hiding |
24 | Jan Kodovský, Jessica J. Fridrich |
On completeness of feature spaces in blind steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 123-132, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fcm, steganography, completeness, blind steganalysis |
24 | Andrew D. Ker, Tomás Pevný, Jan Kodovský, Jessica J. Fridrich |
The square root law of steganographic capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008, pp. 107-116, 2008, ACM, 978-1-60558-058-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
steganographic capacity, benchmarking, steganography, steganalysis |
24 | Genta Suzuki, Nobuyasu Yamaguchi, Shigeyoshi Nakamura, Hirotaka Chiba |
Mobile interaction using steganographic image on mobile display. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 10th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2008, Amsterdam, the Netherlands, September 2-5, 2008, pp. 507-510, 2008, ACM, 978-1-59593-952-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile display, mobile ticket, user interface, image processing, mobile phones, steganography, mobile gaming |
24 | Yu-Ming Cheng, Chung-Ming Wang |
An adaptive steganographic algorithm for 3D polygonal meshes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 23(9-11), pp. 721-732, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
3D polygonal meshes, Steganography, Human visual system |
24 | Yun Q. Shi 0001, Chunhua Chen 0001, Guorong Xuan, Wei Su 0001 |
Steganalysis Versus Splicing Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 158-172, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
splicing detection, natural image model, Steganography, steganalysis, digital forensics, tampering detection |
24 | Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli |
Steganalysis of GIM-based data hiding using kernel density estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 149-160, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
gamma density, steganography, steganalysis, kernel density estimation, mode, skewness, quantization index modulation |
24 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 39(8), pp. 25-27, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DIAL, mobile-content development, mobile power usage, steganography |
24 | Yu-Ming Cheng, Chung-Ming Wang |
A high-capacity steganographic approach for 3D polygonal meshes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vis. Comput. ![In: Vis. Comput. 22(9-11), pp. 845-855, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Representation domain, Steganography, Spatial domain |
24 | Daniel E. Stevenson |
PNG palette permuter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2006, Bologna, Italy, June 26-28, 2006, pp. 143-147, 2006, ACM, 1-59593-055-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
compression, encryption, steganography, CS2 |
24 | Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang 0004 |
Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 215-218, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Block mapping, Genetic Algorithm, Steganography, LSB |
24 | Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou 0001 |
An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PReMI ![In: Pattern Recognition and Machine Intelligence, First International Conference, PReMI 2005, Kolkata, India, December 20-22, 2005, Proceedings, pp. 491-496, 2005, Springer, 3-540-30506-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mobile Devices, Information Security, Steganography, Digital Watermarking, JPEG Compression |
24 | Sorina Dumitrescu, Xiaolin Wu 0001 |
LSB steganalysis based on high-order statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 25-32, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
LSB steganography, steganalysis, digital media |
24 | Chin-Chen Chang 0001, Chih-Yang Lin, Yu-Zheng Wang |
VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 1058-1064, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multi-way search, clustering, Steganography, data hiding |
24 | Luis von Ahn, Nicholas J. Hopper, John Langford 0001 |
Covert two-party computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 513-522, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
covert computation, fair two-party computation, two-party computation, steganography |
24 | Xiang-Wei Kong, Wen-Feng Liu, Xin-Gang You |
Secret Message Location Steganalysis Based on Local Coherences of Hue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (2) ![In: Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part II, pp. 301-311, 2005, Springer, 3-540-30040-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
locating secret message, the coherences of hue, steganography, steganalysis |
24 | Hala A. Farouk, Magdy Saeb |
Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), 16-20 February 2004, Paris, France, pp. 212-217, 2004, IEEE Computer Society, 0-7695-2085-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
FPGA, architecture, Steganography, data hiding, subliminal channel, covert communications |
24 | Wei Ding, Xiang-Wei Kong, Xin-Gang You, Zi-Ren Wang |
A Secure Steganographic Method on Wavelet Domain of Palette-Based Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (3) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part III, pp. 426-432, 2004, Springer, 3-540-23985-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
GIF image, matrix encoding, security, Steganography, integer wavelet |
24 | Yu-Chee Tseng, Hsiang-Kuang Pan |
Data Hiding in 2-Color Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 51(7), pp. 873-880, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Binary image processing, prisoners' problem, security, cryptography, steganography, coding, information hiding |
24 | Franck Leprévost, Raphaël Erard, Touradj Ebrahimi |
How to bypass the Wassenaar arrangement: a new application for watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 161-164, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Wassenaar arrangement, cryptography, watermarking, steganography |
24 | Jan Zöllner 0002, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf |
Modeling the Security of Steganographic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings, pp. 344-354, 1998, Springer, 3-540-65386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Security and modeling of steganography, indeterminism, secret communication, hidden communication, entropy |
22 | Shahnawaz Ahmad, Justin Onyarin Ogala, Festus Ikpotokin, Mohd Arif, Javed Ahmad, Shabana Mehfuz |
Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(4), pp. 408, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Nibraas Khan, Ruj Haan, George Boktor, Michael McComas, Ramin Daneshi |
Steganography GAN: Cracking Steganography with Cycle Generative Adversarial Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.04008, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Mehdi Sharifzadeh, Mohammed Aloraini, Dan Schonfeld |
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 15, pp. 867-879, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Ahmad Zakaria |
Batch steganography and pooled steganalysis in JPEG images. (Batch steganography et pooled steganalysis dans les images JPEG). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
22 | Nuzhat Naqvi, Aliya Tabassum Abbasi, Rasheed Hussain, M. Aihab Khan, Basheer Ahmad |
Correction to: Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 105(3), pp. 1169, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sahar A. El-Rahman |
A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 70, pp. 380-399, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Nuzhat Naqvi, Aliya Tabassum Abbasi, Rasheed Hussain, M. Aihab Khan, Basheer Ahmad |
Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 103(2), pp. 1563-1585, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Han-Zhou Wu, Hong-Xia Wang 0001, Yun-Qing Shi 0001 |
Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1606.05294, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Patrick Bas |
Natural Steganography: cover-source switching for better steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1607.07824, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Sebastian Berndt 0001, Maciej Liskiewicz |
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IH&MMSec ![In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016, pp. 81-92, 2016, ACM, 978-1-4503-4290-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | G. Savithri, Vinupriya, Sayali Mane, J. Saira Banu |
Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVIP (1) ![In: Proceedings of International Conference on Computer Vision and Image Processing - CVIP 2016, Indian Institute of Technology Roorkee, February 26-28, 2016, Volume 1, pp. 593-605, 2016, Springer, 978-981-10-2103-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Dipti Kapoor Sarmah, Neha Bajpai |
Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1009.2826, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
22 | Malte Diehl |
Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 381-387, 2008, INSTICC Press, 978-989-8111-59-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
21 | Alberto Guillén, Antti Sorjamaa, Yoan Miche, Amaury Lendasse, Ignacio Rojas |
Efficient Parallel Feature Selection for Steganography Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (1) ![In: Bio-Inspired Systems: Computational and Ambient Intelligence, 10th International Work-Conference on Artificial Neural Networks, IWANN 2009, Salamanca, Spain, June 10-12, 2009. Proceedings, Part I, pp. 1224-1231, 2009, Springer, 978-3-642-02477-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Giacomo Cancelli, Gwenaël J. Doërr, Ingemar J. Cox, Mauro Barni |
Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 1288-1291, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal 0001, Lalit M. Patnaik |
Robust image adaptive steganography using integer wavelets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 614-621, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Rita Ferreira, Bernardete Ribeiro, Catarina Silva 0001, Qingzhong Liu, Andrew H. Sung |
Building resilient classifiers for LSB matching steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 1562-1567, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt |
Securing information content using new encryption method and Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 563-568, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht |
New approaches to encryption and steganography for digital videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 13(3), pp. 191-204, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jessica J. Fridrich, Petr Lisonek |
Grid Colorings in Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 53(4), pp. 1547-1549, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoyi Yu, Xinshan Zhu, Noboru Babaguchi |
Steganography using Sensor Noise and Linear Prediction Synthesis Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (2) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 157-160, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan |
Research on Steganalysis for Text Steganography Based on Font Format. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 490-495, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Font format, Hidden information length, Support vector machine, Steganalysis, Text |
21 | Bo Xu, Jiazhen Wang, Deyun Peng |
Practical Protocol Steganography: Hiding Data in IP Header. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: First Asia International Conference on Modelling and Simulation, AMS 2007, Phuket, Thailand, March 27-30, 2007, pp. 584-588, 2007, IEEE Computer Society, 978-0-7695-2845-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Shirali-Shahreza |
Improving Mobile Banking Security Using Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 885-887, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Shunquan Tan, Jiwu Huang, Yun Q. Shi 0001 |
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings, pp. 112-126, 2007, Springer, 978-3-540-92237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Paul Andrew Watters, Frances H. Martin, H. Steffen Stripf |
Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2007, London, UK, 15-17 April 2007, pp. 380-385, 2007, IEEE, 1-4244-1076-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Yuan-Yu Tsai, Chung-Ming Wang, Yu-Ming Cheng, Chung-Hsien Chang, Peng-Cheng Wang |
Steganography on 3D Models Using a Spatial Subdivision Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer Graphics International ![In: Advances in Computer Graphics, 24th Computer Graphics International Conference, CGI 2006, Hangzhou, China, June 26-28, 2006, Proceedings, pp. 469-476, 2006, Springer, 3-540-35638-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete Ribeiro |
Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (2) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 267-270, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Nan Jiang, Jian Wang, Xinxin Niu, Yixian Yang |
Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (3) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 661-664, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ping Wang 0010, Xiangyang Luo, Fenlin Liu |
An Improved Secret Key Estimation Method for Sequential Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 396-402, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Niansheng Liu, Donghui Guo, Gerard Parr |
A New Image Steganography for Internet Communications Based on Chaotic Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 121-124, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Shirali-Shahreza |
Java Applets Copy Protection by Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 388-391, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Younhee Kim, Zoran Duric, Dana Richards |
Modified Matrix Encoding Technique for Minimal Distortion Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 314-327, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Andreas Westfeld |
Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 201-215, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell |
Upper and Lower Bounds on Black-Box Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 227-244, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 210-226, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Stefan Hetzl, Petra Mutzel |
A Graph-Theoretic Approach to Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 119-128, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ingemar J. Cox, Ton Kalker, Georg Pakura, Mathias Scheel |
Information Transmission and Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings, pp. 15-29, 2005, Springer, 3-540-28768-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Xiangyang Luo, Bin Liu 0008, Fenlin Liu |
Detecting LSB Steganography Based on Dynamic Masks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA ![In: Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 8-10 September 2005, Wroclaw, Poland, pp. 251-255, 2005, IEEE Computer Society, 0-7695-2286-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Xinpeng Zhang 0001, Shuozhong Wang |
Analysis of Parity Assignment Steganography in Palette Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 1025-1031, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Chin-Shiuh Shieh, Chao-Chin Chang, Shu-Chuan Chu, Jui-Fang Chang |
A New Steganography Scheme in the Domain of Side-Match Vector Quantization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 1032-1038, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Yusuke Seki, Hiroyuki Kobayashi, Masaaki Fujiyoshi, Hitoshi Kiya |
Quantization-based image steganography without data hiding position memorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 4987-4990, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Xiangyang Luo, Bin Liu 0008, Fenlin Liu |
Improved RS Method for Detection of LSB Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 508-516, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Kwangsoo Lee, Changho Jung, Sangjin Lee 0002, Jongin Lim 0001 |
New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 312-326, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Elke Franz 0001, Antje Schneidewind |
Pre-processing for Adding Noise Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 189-203, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah |
Translation-Based Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 219-233, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Stark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David A. Wagner 0001 |
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers, pp. 327-341, 2005, Springer, 3-540-29039-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Zoran Duric, Dana Richards, Younhee Kim |
Minimizing the Statistical Impact of LSB Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR ![In: Image Analysis and Recognition, Second International Conference, ICIAR 2005, Toronto, Canada, September 28-30, 2005, Proceedings, pp. 1175-1183, 2005, Springer, 3-540-29069-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoyi Yu, Yunhong Wang, Tieniu Tan |
On Estimation of Secret Message Length in JSteg-like Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (4) ![In: 17th International Conference on Pattern Recognition, ICPR 2004, Cambridge, UK, August 23-26, 2004., pp. 673-676, 2004, IEEE Computer Society, 0-7695-2128-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | V. Kavitha, K. S. Easwarakumar |
Neural Based Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2004: Trends in Artificial Intelligence, 8th Pacific Rim International Conference on Artificial Intelligence, Auckland, New Zealand, August 9-13, 2004, Proceedings, pp. 429-435, 2004, Springer, 3-540-22817-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Mohamed Fahmy Tolba, M. Al-Said Ghonemy, Ismail Abdoul-Hameed Taha, Amal Said Khalifa |
High capacity image steganography using wavelet-based fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 430-435, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala |
Defeating the Current Steganalysis Techniques (Robust Steganography). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 440-444, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Chin-Chen Chang 0001, Piyu Tsai, Min-Hui Lin 0001 |
An Adaptive Steganography for Index-Based Images Using Codeword Grouping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (3) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part III, pp. 731-738, 2004, Springer, 3-540-23985-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Niels Provos, Peter Honeyman |
Hide and Seek: An Introduction to Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(3), pp. 32-44, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Mei-Yi Wu, Yu-Kun Ho, Jia-Hong Lee |
A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers, pp. 483-496, 2003, Springer, 3-540-21061-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Ramamurti Chandramouli, Koduvayur P. Subbalakshmi |
Active steganalysis of spread spectrum image steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (3) ![In: Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS 2003, Bangkok, Thailand, May 25-28, 2003, pp. 830-833, 2003, IEEE, 0-7803-7761-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Michiharu Niimi, Hideki Noda, Eiji Kawaguchi, Richard O. Eason |
Luminance Quasi-Preserving Color Quantization for Digital Steganography to Palette-Based Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (1) ![In: 16th International Conference on Pattern Recognition, ICPR 2002, Quebec, Canada, August 11-15, 2002., pp. 252-254, 2002, IEEE Computer Society, 0-7695-1695-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil |
Eliminating Steganography in Internet Traffic with Active Wardens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 18-35, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Sorina Dumitrescu, Xiaolin Wu 0001, Zhe Wang 0022 |
Detection of LSB Steganography via Sample Pair Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 355-372, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 3812 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|