|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 687 occurrences of 262 keywords
|
|
|
Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Xiaoyi Yu, Noboru Babaguchi |
A fast and effective method to detect multiple least significant bits steganography. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
steganography steganalysis |
25 | Zishuai Li, Xingming Sun, Baowei Wang, Xiaoliang Wang 0002 |
A Steganography Scheme in P2P Network. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
BitTorrent Network, Torrent file, Steganography, P2P Network |
25 | Lingjun Li, Liusheng Huang, Xinxin Zhao, Wei Yang 0011, Zhili Chen |
A Statistical Attack on a Kind of Word-Shift Text-Steganography. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
word shift, statical attack, PDF, text-steganography |
25 | Weiming Zhang, Xinpeng Zhang 0001, Shuozhong Wang |
Twice Gric Colorings in Steganography. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
embedding efficiency, change rate, rainbow coloring, steganography, information rate |
25 | Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng |
Secret Sharing Systems with Authentication-Based Steganography. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
pattern LSB, Cyclic Redundancy Code, Authentication, Steganography, Secret image sharing |
25 | Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza |
Steganography in Silence Intervals of Speech. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Steganography, Data Hiding, Speech Processing |
25 | Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang |
Enhance the Image Sharing with Steganography and Authentication. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
(k, n)-Threshold Scheme, Cryptography, Steganography, Secret Sharing, Galois Field, Fragile Watermark |
25 | Mohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza |
A New Synonym Text Steganography. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Synonym Words, Information Hiding, Text Steganography |
25 | Naofumi Aoki |
A Technique of Lossless Steganography for G.711 Telephony Speech. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
steganography, VoIP, G.711 |
25 | Yongping Liu, Xingming Sun, Yuling Liu, Rong Xiao |
File-Update Based Steganography for Microsoft PowerPoint Files. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
File-Update, Microsoft PowerPoint File, Steganography |
25 | Hao-Tian Wu, Jean-Luc Dugelay, Yiu-ming Cheung |
A Data Mapping Method for Steganography and Its Application to Images. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
LSB?+? algorithm, bijective mapping, first-order statistics, sample pair analysis, Steganography |
25 | Yue Li 0013, Chang-Tsun Li, Chia-Hung Wei |
Protection of Mammograms Using Blind Steganography and Watermarking. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
P ACS, Steganography, Digital Watermarking, Mammograms |
25 | Ziwen Sun, Zhicheng Ji |
A Security Steganography Method for Lossy Compression Gray Scale Image. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
robust, steganography, DCT, average |
25 | Christian Krätzer, Jana Dittmann, Andreas Lang 0001, Tobias Kühne |
WLAN steganography: a first practical review. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
WLAN, steganography |
25 | Tri Van Le, Kaoru Kurosawa |
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
adaptive chosen stegotext attack, steganography, bandwidth, information hiding |
25 | Kenny Hunt |
A Java framework for experimentation with steganography. |
SIGCSE |
2005 |
DBLP DOI BibTeX RDF |
image processing, steganography, computer security, information hiding |
24 | Jibang Liu, Karthik Kumar, Yung-Hsiang Lu |
Tradeoff between energy savings and privacy protection in computation offloading. |
ISLPED |
2010 |
DBLP DOI BibTeX RDF |
image retrieval, steganography, energy saving, privacy protection, computation offloading |
24 | Fangjun Huang, Jiwu Huang |
Calibration based universal JPEG steganalysis. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
microscopic calibration, macroscopic calibration, steganography, steganalysis, JPEG |
24 | Chin-Chen Chang 0001, Yi-Hui Chen, Chia-Chen Lin 0001 |
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. |
Soft Comput. |
2009 |
DBLP DOI BibTeX RDF |
Block truncation code, Modification direction, Genetic algorithm, Steganography, Data embedding |
24 | Yedidya Hilewitz, Ruby B. Lee |
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors. |
J. Signal Process. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Bit scatter, Bit gather, Parallel deposit, Unpack, Algorithm acceleration, Bioinformatics, Compression, Pattern matching, Steganography, Microprocessors, Permutations, Pack, Instruction set architecture, Cryptology, ISA, Parallel extract, Bit manipulations |
24 | Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski |
TrustMAS: Trusted Communication Platform for Multi-Agent Systems. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
multi agents systems, steganography, information hiding |
24 | Jan Kodovský, Jessica J. Fridrich |
On completeness of feature spaces in blind steganalysis. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
fcm, steganography, completeness, blind steganalysis |
24 | Andrew D. Ker, Tomás Pevný, Jan Kodovský, Jessica J. Fridrich |
The square root law of steganographic capacity. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
steganographic capacity, benchmarking, steganography, steganalysis |
24 | Genta Suzuki, Nobuyasu Yamaguchi, Shigeyoshi Nakamura, Hirotaka Chiba |
Mobile interaction using steganographic image on mobile display. |
Mobile HCI |
2008 |
DBLP DOI BibTeX RDF |
mobile display, mobile ticket, user interface, image processing, mobile phones, steganography, mobile gaming |
24 | Yu-Ming Cheng, Chung-Ming Wang |
An adaptive steganographic algorithm for 3D polygonal meshes. |
Vis. Comput. |
2007 |
DBLP DOI BibTeX RDF |
3D polygonal meshes, Steganography, Human visual system |
24 | Yun Q. Shi 0001, Chunhua Chen 0001, Guorong Xuan, Wei Su 0001 |
Steganalysis Versus Splicing Detection. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
splicing detection, natural image model, Steganography, steganalysis, digital forensics, tampering detection |
24 | Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli |
Steganalysis of GIM-based data hiding using kernel density estimation. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
gamma density, steganography, steganalysis, kernel density estimation, mode, skewness, quantization index modulation |
24 | Linda Dailey Paulson |
News Briefs. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
DIAL, mobile-content development, mobile power usage, steganography |
24 | Yu-Ming Cheng, Chung-Ming Wang |
A high-capacity steganographic approach for 3D polygonal meshes. |
Vis. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Representation domain, Steganography, Spatial domain |
24 | Daniel E. Stevenson |
PNG palette permuter. |
ITiCSE |
2006 |
DBLP DOI BibTeX RDF |
compression, encryption, steganography, CS2 |
24 | Rongrong Ji, Hongxun Yao, Shaohui Liu, Liang Wang 0004 |
Genetic Algorithm Based Optimal Block Mapping Method for LSB Substitution. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
Block mapping, Genetic Algorithm, Steganography, LSB |
24 | Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou 0001 |
An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. |
PReMI |
2005 |
DBLP DOI BibTeX RDF |
Mobile Devices, Information Security, Steganography, Digital Watermarking, JPEG Compression |
24 | Sorina Dumitrescu, Xiaolin Wu 0001 |
LSB steganalysis based on high-order statistics. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
LSB steganography, steganalysis, digital media |
24 | Chin-Chen Chang 0001, Chih-Yang Lin, Yu-Zheng Wang |
VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
multi-way search, clustering, Steganography, data hiding |
24 | Luis von Ahn, Nicholas J. Hopper, John Langford 0001 |
Covert two-party computation. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
covert computation, fair two-party computation, two-party computation, steganography |
24 | Xiang-Wei Kong, Wen-Feng Liu, Xin-Gang You |
Secret Message Location Steganalysis Based on Local Coherences of Hue. |
PCM (2) |
2005 |
DBLP DOI BibTeX RDF |
locating secret message, the coherences of hue, steganography, steganalysis |
24 | Hala A. Farouk, Magdy Saeb |
Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
FPGA, architecture, Steganography, data hiding, subliminal channel, covert communications |
24 | Wei Ding, Xiang-Wei Kong, Xin-Gang You, Zi-Ren Wang |
A Secure Steganographic Method on Wavelet Domain of Palette-Based Images. |
PCM (3) |
2004 |
DBLP DOI BibTeX RDF |
GIF image, matrix encoding, security, Steganography, integer wavelet |
24 | Yu-Chee Tseng, Hsiang-Kuang Pan |
Data Hiding in 2-Color Images. |
IEEE Trans. Computers |
2002 |
DBLP DOI BibTeX RDF |
Binary image processing, prisoners' problem, security, cryptography, steganography, coding, information hiding |
24 | Franck Leprévost, Raphaël Erard, Touradj Ebrahimi |
How to bypass the Wassenaar arrangement: a new application for watermarking. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
Wassenaar arrangement, cryptography, watermarking, steganography |
24 | Jan Zöllner 0002, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf |
Modeling the Security of Steganographic Systems. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
Security and modeling of steganography, indeterminism, secret communication, hidden communication, entropy |
22 | Shahnawaz Ahmad, Justin Onyarin Ogala, Festus Ikpotokin, Mohd Arif, Javed Ahmad, Shabana Mehfuz |
Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Nibraas Khan, Ruj Haan, George Boktor, Michael McComas, Ramin Daneshi |
Steganography GAN: Cracking Steganography with Cycle Generative Adversarial Networks. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
22 | Mehdi Sharifzadeh, Mohammed Aloraini, Dan Schonfeld |
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography. |
IEEE Trans. Inf. Forensics Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Ahmad Zakaria |
Batch steganography and pooled steganalysis in JPEG images. (Batch steganography et pooled steganalysis dans les images JPEG). |
|
2020 |
RDF |
|
22 | Nuzhat Naqvi, Aliya Tabassum Abbasi, Rasheed Hussain, M. Aihab Khan, Basheer Ahmad |
Correction to: Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach. |
Wirel. Pers. Commun. |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sahar A. El-Rahman |
A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. |
Comput. Electr. Eng. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Nuzhat Naqvi, Aliya Tabassum Abbasi, Rasheed Hussain, M. Aihab Khan, Basheer Ahmad |
Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach. |
Wirel. Pers. Commun. |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Han-Zhou Wu, Hong-Xia Wang 0001, Yun-Qing Shi 0001 |
Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
22 | Patrick Bas |
Natural Steganography: cover-source switching for better steganography. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
22 | Sebastian Berndt 0001, Maciej Liskiewicz |
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions. |
IH&MMSec |
2016 |
DBLP DOI BibTeX RDF |
|
22 | G. Savithri, Vinupriya, Sayali Mane, J. Saira Banu |
Parallel Implementation of RSA 2D-DCT Steganography and Chaotic 2D-DCT Steganography. |
CVIP (1) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Dipti Kapoor Sarmah, Neha Bajpai |
Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography |
CoRR |
2010 |
DBLP BibTeX RDF |
|
22 | Malte Diehl |
Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
21 | Alberto Guillén, Antti Sorjamaa, Yoan Miche, Amaury Lendasse, Ignacio Rojas |
Efficient Parallel Feature Selection for Steganography Problems. |
IWANN (1) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Giacomo Cancelli, Gwenaël J. Doërr, Ingemar J. Cox, Mauro Barni |
Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
21 | K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal 0001, Lalit M. Patnaik |
Robust image adaptive steganography using integer wavelets. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Rita Ferreira, Bernardete Ribeiro, Catarina Silva 0001, Qingzhong Liu, Andrew H. Sung |
Building resilient classifiers for LSB matching steganography. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt |
Securing information content using new encryption method and Steganography. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht |
New approaches to encryption and steganography for digital videos. |
Multim. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jessica J. Fridrich, Petr Lisonek |
Grid Colorings in Steganography. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoyi Yu, Xinshan Zhu, Noboru Babaguchi |
Steganography using Sensor Noise and Linear Prediction Synthesis Filter. |
ICIP (2) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan |
Research on Steganalysis for Text Steganography Based on Font Format. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Font format, Hidden information length, Support vector machine, Steganalysis, Text |
21 | Bo Xu, Jiazhen Wang, Deyun Peng |
Practical Protocol Steganography: Hiding Data in IP Header. |
Asia International Conference on Modelling and Simulation |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Shirali-Shahreza |
Improving Mobile Banking Security Using Steganography. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Shunquan Tan, Jiwu Huang, Yun Q. Shi 0001 |
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Paul Andrew Watters, Frances H. Martin, H. Steffen Stripf |
Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective? |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Yuan-Yu Tsai, Chung-Ming Wang, Yu-Ming Cheng, Chung-Hsien Chang, Peng-Cheng Wang |
Steganography on 3D Models Using a Spatial Subdivision Technique. |
Computer Graphics International |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Qingzhong Liu, Andrew H. Sung, Jianyun Xu, Bernardete Ribeiro |
Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography. |
ICPR (2) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Nan Jiang, Jian Wang, Xinxin Niu, Yixian Yang |
Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ping Wang 0010, Xiangyang Luo, Fenlin Liu |
An Improved Secret Key Estimation Method for Sequential Steganography. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Niansheng Liu, Donghui Guo, Gerard Parr |
A New Image Steganography for Internet Communications Based on Chaotic Sequences. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Shirali-Shahreza |
Java Applets Copy Protection by Steganography. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Younhee Kim, Zoran Duric, Dana Richards |
Modified Matrix Encoding Technique for Minimal Distortion Steganography. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Andreas Westfeld |
Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell |
Upper and Lower Bounds on Black-Box Steganography. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Stefan Hetzl, Petra Mutzel |
A Graph-Theoretic Approach to Steganography. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ingemar J. Cox, Ton Kalker, Georg Pakura, Mathias Scheel |
Information Transmission and Steganography. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Xiangyang Luo, Bin Liu 0008, Fenlin Liu |
Detecting LSB Steganography Based on Dynamic Masks. |
ISDA |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Xinpeng Zhang 0001, Shuozhong Wang |
Analysis of Parity Assignment Steganography in Palette Images. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Chin-Shiuh Shieh, Chao-Chin Chang, Shu-Chuan Chu, Jui-Fang Chang |
A New Steganography Scheme in the Domain of Side-Match Vector Quantization. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Yusuke Seki, Hiroyuki Kobayashi, Masaaki Fujiyoshi, Hitoshi Kiya |
Quantization-based image steganography without data hiding position memorization. |
ISCAS (5) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Xiangyang Luo, Bin Liu 0008, Fenlin Liu |
Improved RS Method for Detection of LSB Steganography. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Kwangsoo Lee, Changho Jung, Sangjin Lee 0002, Jongin Lim 0001 |
New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Elke Franz 0001, Antje Schneidewind |
Pre-processing for Adding Noise Steganography. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, Mikhail J. Atallah |
Translation-Based Steganography. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Stark C. Draper, Prakash Ishwar, David Molnar, Vinod M. Prabhakaran, Kannan Ramchandran, Daniel Schonberg, David A. Wagner 0001 |
An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Zoran Duric, Dana Richards, Younhee Kim |
Minimizing the Statistical Impact of LSB Steganography. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoyi Yu, Yunhong Wang, Tieniu Tan |
On Estimation of Secret Message Length in JSteg-like Steganography. |
ICPR (4) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | V. Kavitha, K. S. Easwarakumar |
Neural Based Steganography. |
PRICAI |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Mohamed Fahmy Tolba, M. Al-Said Ghonemy, Ismail Abdoul-Hameed Taha, Amal Said Khalifa |
High capacity image steganography using wavelet-based fusion. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala |
Defeating the Current Steganalysis Techniques (Robust Steganography). |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Chin-Chen Chang 0001, Piyu Tsai, Min-Hui Lin 0001 |
An Adaptive Steganography for Index-Based Images Using Codeword Grouping. |
PCM (3) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Niels Provos, Peter Honeyman |
Hide and Seek: An Introduction to Steganography. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Mei-Yi Wu, Yu-Kun Ho, Jia-Hong Lee |
A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Ramamurti Chandramouli, Koduvayur P. Subbalakshmi |
Active steganalysis of spread spectrum image steganography. |
ISCAS (3) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Michiharu Niimi, Hideki Noda, Eiji Kawaguchi, Richard O. Eason |
Luminance Quasi-Preserving Color Quantization for Digital Steganography to Palette-Based Images. |
ICPR (1) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil |
Eliminating Steganography in Internet Traffic with Active Wardens. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Sorina Dumitrescu, Xiaolin Wu 0001, Zhe Wang 0022 |
Detection of LSB Steganography via Sample Pair Analysis. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 3812 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|