|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 687 occurrences of 262 keywords
|
|
|
Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | David L. Robie, Russell M. Mersereau |
Video error correction using steganography. |
ICIP (1) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Rajarathnam Chandramouli, Nasir D. Memon |
Analysis of LSB based image steganography techniques. |
ICIP (3) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Toby Sharp |
An Implementation of Key-Based Digital Signal Steganography. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Chin-Chen Chang 0001, Jyh-Chiang Yeh, Ju Yuan Hsiao |
A Novel Scheme for Securing Image Steganography. |
IEEE Pacific Rim Conference on Multimedia |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Christian Cachin |
An Information-Theoretic Model for Steganography. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu 0008 |
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Fangjun Huang, Bin Li 0011, Jiwu Huang |
Universal JPEG steganalysis based on microscopic and macroscopic calibration. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Rajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen |
The Security Threat Posed by Steganographic Content on the Internet. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Bin Li 0011, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi 0001 |
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mehdi Kharrazi, Husrev Taha Sencar, Nasir D. Memon |
Cover Selection for Steganographic Embedding. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Shirali-Shahreza |
M-Quiz by SMS. |
ICALT |
2006 |
DBLP DOI BibTeX RDF |
|
21 | V. Suresh, S. Maria Sophia, C. E. Veni Madhavan |
Resampling Operations as Features for Detecting LSB Replacement and LSB Matching in Color Images. |
MRCS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Satoshi Kondo, Qiangfu Zhao |
A Novel Steganographic Technique Based on Image Morphing. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Paul Andrew Watters, Frances H. Martin, H. Steffen Stripf |
Visual Steganalysis of LSB-Encoded Natural Images. |
ICITA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Kwangsoo Lee, Changho Jung, Sangjin Lee 0002, HyungJun Kim, Jongin Lim 0001 |
Applying LR Cube Analysis to JSteg Detection. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Steven J. Murdoch, Stephen Lewis |
Embedding Covert Channels into TCP/IP. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ashish Gehani, Thomas H. LaBean, John H. Reif |
DNA-based Cryptography. |
Aspects of Molecular Computing |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Peizhong Lu, Xiangyang Luo, Qingyang Tang, Shen Li |
An Improved Sample Pairs Method for Detection of LSB Embedding. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Young-Shil Kim, Young-Mi Kim, Jin-Yong Choi, Doo-Kwon Baik |
Information Hiding System StegoWaveK for Improving Capacity. |
ISPA |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Xiangwei Kong, Ting Zhang, Xingang You, Deli Yang |
A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter. |
IEEE Pacific Rim Conference on Multimedia |
2002 |
DBLP DOI BibTeX RDF |
|
21 | René Rosenbaum, Heidrun Schumann |
A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Elke Franz 0001, Andreas Pfitzmann |
EinfĂ¼hrung in die Steganographie und Ableitung eines neuen Stegoparadigmas. |
Inform. Spektrum |
1998 |
DBLP DOI BibTeX RDF |
Stegosystem, Kryptographie, Konzelation, Einbetten, Stegoparadigma, Angriffstypen, Scannen |
14 | Hong Zhao, Yun Q. Shi 0001, Nirwan Ansari |
Hiding Data in Multimedia Streaming over Networks. |
CNSR |
2010 |
DBLP DOI BibTeX RDF |
Network Steganography, information hiding, covert channels |
14 | Jonathan M. Blackledge, Eugene Coyle |
e-Fraud Prevention Based on the Self-Authentication of e-Documents. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
Covert encryption, e-Fraud, Authentication, Steganography, Information hiding |
14 | Xiao Yi Yu, Aiming Wang |
Revisit LSB Matching. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Steganography, Steganalysis |
14 | Xiao Yi Yu, Aiming Wang |
Genetic Algorithm Based Bayesian Network for Customers' Behavior Analysis. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Steganography, Steganalysis |
14 | Pham Hai Dang Le, Matthias O. Franz |
Single Band Statistics and Steganalysis Performance. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
universal steganalysis, steganography, steganalysis |
14 | Shang-Kuan Chen, Ran-Zan Wang |
High-Payload Image Hiding Scheme Using k-Way Block Matching. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
steganography, data hiding, block matching, image hiding |
14 | Jeong-Chun Joo, Tae-Woo Oh, Jung-Ho Choi, Heung-Kyu Lee |
Steganalysis Scheme Using the Difference Image of Calibrated Sub-sampling. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Sub-sampling, Difference histogram, Steganography, Calibration, Steganalysis |
14 | Chin-Fang Lee, Huei-Ju Tsai |
A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
side-match prediction, steganography, reversible data hiding |
14 | Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li |
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
steganography, secret sharing, Data hiding, Sudoku |
14 | Hosei Matsuoka, Yusuke Nakashima, Takeshi Yoshimura |
Acoustic OFDM system and its extension. |
Vis. Comput. |
2009 |
DBLP DOI BibTeX RDF |
Steganography, OFDM, Data hiding |
14 | Qingzhong Liu, Andrew H. Sung, Mengyu Qiao |
Spectrum Steganalysis of WAV Audio Streams. |
MLDM |
2009 |
DBLP DOI BibTeX RDF |
SVM, steganography, audio, steganalysis, derivative, spectrum |
14 | Qingzhong Liu, Andrew H. Sung, Mengyu Qiao |
Novel stream mining for audio steganalysis. |
ACM Multimedia |
2009 |
DBLP DOI BibTeX RDF |
mel-cepstrum, second order derivative, signal complexity, SVM, steganography, audio, steganalysis, spectrum, markov |
14 | Zohaib Khan, Atif Bin Mansoor |
A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique. |
SCIA |
2009 |
DBLP DOI BibTeX RDF |
Classification, Feature Extraction, Steganography, Information Hiding, Steganalysis |
14 | Semin Kim, Wesley De Neve, Yong Man Ro |
A Statistical and Iterative Method for Data Hiding in Palette-Based Images. |
IWDW |
2009 |
DBLP DOI BibTeX RDF |
palette-based images, steganography, information hiding, data hiding |
14 | Wen-Chung Kuo, Lih-Chyau Wuu, Chia-Nian Shyi, Shao-Hung Kuo |
A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method. |
HIS (3) |
2009 |
DBLP DOI BibTeX RDF |
Cover Image, Security, Steganography, Data Hiding, Stego-Image |
14 | Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang 0001, Yu-Lin Huang |
A reversible data hiding scheme based on dual steganographic images. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
irreversible data hiding, steganographic image, steganography, reversible data hiding |
14 | Chin-Ho Chung, Wen-Yuan Chen, Ching-Ming Tu |
Image Hidden Technique Using QR-Barcode. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
Image processing, Steganography, Error correction, JPEG, QR code |
14 | Hirohisa Hioki |
Web behind Web - A Steganographic Web Framework. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
web, steganography, proxy |
14 | Chin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang |
An Embedding Technique Based upon Block Prediction and Code Cascading Shift. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
side match vector quantization, steganography, histogram, vector quantization, reversible data hiding |
14 | Marina Ponomar |
On Acceptable Modification Limits of Electroacoustic Speech Signals for Data Hiding. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
steganography, Data hiding, quantization index modulation |
14 | Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang |
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
Pixel modification, Steganography, Imperceptible, High capacity |
14 | Chi-Nan Lin, Chin-Chen Chang 0001, Wei-Bin Lee, Jason Lin |
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
hiding capacity, secret reference matrix, embedding, steganography, distortion |
14 | Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang |
Reversible Secret Image Sharing Based on Shamir's Scheme. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
Cryptography, Steganography, Secret Sharing, Reversible, Fragile Watermark, Threshold Scheme |
14 | Yunkai Gao, Xiaolong Li 0001, Bin Yang 0001 |
Employing Optimal Matrix for Efficient Matrix Embedding. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
matrix embedding, embedding efficiency, steganography, information hiding |
14 | Yeuan-Kuen Lee, Graeme Bell, Shih-Yu Huang, Ran-Zan Wang, Shyong Jian Shyu |
An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding. |
PSIVT |
2009 |
DBLP DOI BibTeX RDF |
LSB embedding, Steganography, steganalysis |
14 | Zohaib Khan, Atif Bin Mansoor |
Steganalysis of JPEG Images with Joint Transform Features. |
PSIVT |
2009 |
DBLP DOI BibTeX RDF |
Classification, Feature Extraction, Steganography, Information Hiding, Steganalysis |
14 | Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling |
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. |
Trans. Data Hiding Multim. Secur. |
2008 |
DBLP DOI BibTeX RDF |
spread spectrum signal, detectability of stegosystems, Steganography, Bhattacharyya distance |
14 | Huajun Huang, Shaohong Zhong, Xingming Sun |
Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
offse, steganography, steganalysis, higher-order statistics, webpage |
14 | Adel Almohammad, Robert M. Hierons, Gheorghita Ghinea |
High Capacity Steganographic Method Based Upon JPEG. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Steganography, Image compression, Capacity, Data hiding, quantization, JPEG |
14 | Se-Min Kim, Gil-Je Lee, Kee-Young Yoo |
Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
indexcolor, graycolor, image, steganography, PSNR |
14 | Bin Li 0011, Yun Q. Shi 0001, Jiwu Huang |
Steganalysis of YASS. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
yass, steganography, steganalysis, jpeg |
14 | Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Sergio SĂ¡nchez GarcĂa |
Detection of distributed steganographic information in social networks. |
EATIS |
2008 |
DBLP DOI BibTeX RDF |
stegsecret, social networks, steganography, steganalysis, captcha |
14 | Hedieh Sajedi, Mansour Jamzad |
A Steganalysis Method Based on Contourlet Transform Coefficients. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Steganography, Steganalysis, Contourlet |
14 | Huajun Huang, Shaohong Zhong, Xingming Sun |
An Algorithm of Webpage Information Hiding Based on Attributes Permutation. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
attributes permutation, steganography, information hiding, webpage |
14 | Nima Asadi 0002, Mansour Jamzad, Hedieh Sajedi |
Improvements of Image-Steganalysis Using Boosted Combinatorial Classifiers and Gaussian High Pass Filtering. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Boosting algorithms, Guassian filtering, Fusion techniques, Steganography, Steganalysis |
14 | Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez, Mohammad Ali Mehrabi |
Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
LSB Matching, Steganography, Steganalysis, Co-Occurrence Matrix |
14 | Kensuke Naoe, Yoshiyasu Takefuji |
Damageless Information Hiding Technique Using Neural Network. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Neural Network, Steganography, Digital Watermark, Information Hiding |
14 | Daniela Stanescu, Victor Groza, Mircea Stratulat, Daniel Borca, Ioana Ghergulescu |
Robust Watermarking with High Bit Rate. |
ICIW |
2008 |
DBLP DOI BibTeX RDF |
watermarking, steganography, discrete cosine transform, karhunen-loeve transform |
14 | Ziad Sakr, Nicolas D. Georganas |
Robust content-based MPEG-4 XMT scene structure authentication and multimedia content location. |
ACM Trans. Multim. Comput. Commun. Appl. |
2007 |
DBLP DOI BibTeX RDF |
XML, Multimedia, VRML, watermarking, steganography, polynomial, MPEG-4, XMT, pseudorandom sequences |
14 | Hioki Hirohisa |
Crocus: a steganographic filesystem manager. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
filesystem manager, steganography |
14 | Junwei Huang, Xingming Sun, Huajun Huang, Gang Luo |
Detection of Hidden Information in Webpages Based on Randomness. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
steganography, randomness, statistic, steganalysis, webpage |
14 | Lan Ma, Zhijun Wu 0001, Yun Hu, Wei Yang |
An Information-Hiding Model for Secure Communication. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
Information hiding model, Security, Steganography, Speech, Secure communication |
14 | Chin-Chen Chang 0001, Chih-Yang Lin, Yu-Zheng Wang |
A High Payload VQ Steganographic Method for Binary Images. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
genetic algorithm, clustering, Steganography, data hiding |
14 | Arati Baliga, Joe Kilian |
On covert collaboration. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
steganography, collaborative systems |
14 | Ki-Hyun Jung, Jae-Gil Yu, Se-Min Kim, Ki-Jong Kim, Jin-Yong Byun, Kee-Young Yoo |
The Hiding of Secret Data Using the Run Length Matching Method. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
embedded data, steganography, data hiding, run length encoding |
14 | Chin-Chen Chang 0001, Yi-Hui Chen, Yung-Chen Chou |
Reversible Data Embedding Technique for Palette Images Using De-clustering. |
MCAM |
2007 |
DBLP DOI BibTeX RDF |
Color palette image, declustering reversible, steganography, data hiding |
14 | Zongyuan Deng, Zhen Yang 0001, Xi Shao, Ning Xu 0002, Chao Wu, Haiyan Guo |
Design and Implementation of Steganographic Speech Telephone. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
steganography, information hiding, Least Significant Bit (LSB) |
14 | Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu |
Digital invisible ink: revealing true secrets via attacking. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
DII watermarking, digital invisible ink, hiding watermark in watermark, steganography |
14 | Thomas S. Heydt-Benjamin, Andrei Serjantov, Benessa Defend |
Nonesuch: a mix network with sender unobservability. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
minx packet format, oblivious channels, sender unobservability, steganography, public key, mix networks |
14 | Yue Li 0013, Chang-Tsun Li |
Steganographic Scheme for VQ Compressed Images Using Progressive Exponential Clustering. |
AVSS |
2006 |
DBLP DOI BibTeX RDF |
Steganography, data hiding, steganalysis, covert communication |
14 | Zongyuan Deng, Zhen Yang, Lixin Deng |
A Real-time Secure Voice Communication System Based on Speech Recognition. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
multi-nary modulation system, speech recognition, steganography, information hiding, real-time communication |
14 | Rainer Böhme, Andreas Westfeld |
Feature-based encoder classification of compressed audio streams. |
Multim. Syst. |
2005 |
DBLP DOI BibTeX RDF |
MP3 Encoder classification, NaĂ¯ve bayes classifier, Steganography, Attacks, Steganalysis, Digital forensics |
14 | Jeremiah J. Harmsen, William A. Pearlman |
Capacity of steganographic channels. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
information spectrum, steganographic capacity, stego-channel, information theory, steganography, steganalysis |
14 | Matt Lepinski, Silvio Micali, Abhi Shelat |
Collusion-free protocols. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
steganography, secure function evaluation |
14 | HweeHwa Pang, Kian-Lee Tan, Xuan Zhou 0001 |
Steganographic Schemes for File System and B-Tree. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
plausible deniability, StegFD, StegBtree, security, access control, Steganography |
14 | Patrick Cousot, Radhia Cousot |
An abstract interpretation-based framework for software watermarking. |
POPL |
2004 |
DBLP DOI BibTeX RDF |
software authorship, stegoanalyst, stegoattacks, stegokey, stegomark, stegosignature, validation watermarking, authentication, static analysis, abstract interpretation, steganography, fingerprinting, identification, copyrights protection, trustworthiness, obfuscation, intellectual property protection, software watermarking, tamper-proofing |
14 | Mercan Topkara, Umut Topkara, Mikhail J. Atallah, CĂ¼neyt M. Taskiran, Eugene T. Lin, Edward J. Delp |
A hierarchical protocol for increasing the stealthiness of steganographic methods. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
quad-tree structure, statistical attacks, upper bound on detectability, steganography, digital watermarking, steganalysis |
14 | Maxim Sidorov |
Hidden Markov models and steganalysis. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
hidden markov models, steganography, steganalysis |
14 | Benoit Roue, Patrick Bas, Jean-Marc Chassery |
Improving LSB steganalysis using marginal and joint probabilistic distributions. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
steganography, texture analysis, steganalysis, LSB |
14 | Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea, David Soukal |
Quantitative steganalysis of digital images: estimating the secret message length. |
Multim. Syst. |
2003 |
DBLP DOI BibTeX RDF |
Covert, Steganography, Attacks, Capacity, Steganalysis |
14 | Alan A. Jorgensen |
Testing with hostile data streams. |
ACM SIGSOFT Softw. Eng. Notes |
2003 |
DBLP DOI BibTeX RDF |
Adobe Acrobat Reader, software testing, steganography, random testing, buffer overflow, internet security, buffer overrun |
14 | Anil K. Jain 0001, Umut Uludag |
Hiding Biometric Data. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2003 |
DBLP DOI BibTeX RDF |
Biometrics, watermarking, steganography, fingerprint, data hiding, face, minutiae |
14 | Rakesh Agrawal 0001, Peter J. Haas, Jerry Kiernan |
Watermarking relational data: framework, algorithms and analysis. |
VLDB J. |
2003 |
DBLP DOI BibTeX RDF |
Database, Watermarking, Steganography, Information hiding |
14 | Akiyoshi Wakatani |
Digital Watermaking for ROI Medical Images by Using Compresses Signature Image. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
embedded zero-tree wavelet, steganography, digital watermarking, ROI |
14 | Yvo Desmedt, Tri Van Le |
Moiré cryptography. |
CCS |
2000 |
DBLP DOI BibTeX RDF |
privacy and anonymity, steganography, information hiding |
14 | Faisal Alturki, Russell M. Mersereau |
Secure high data embedding rate for steganographic application. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
watermarking, steganography, data security, data embedding |
14 | Rajarathnam Chandramouli, Nasir D. Memon |
A distributed detection framework for Steganalysis. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
watermarking, Steganography, information hiding, fusion, Steganalysis, covert channels, distributed detection |
14 | Jiri Fridrich |
Robust Bit Extraction from Images. |
ICMCS, Vol. 2 |
1999 |
DBLP DOI BibTeX RDF |
robust bit extraction, data embedding in video, watermarking for tamper detection, oblivious watermarking, steganography, Digital watermarking |
14 | Emil Praun, Hugues Hoppe, Adam Finkelstein |
Robust Mesh Watermarking. |
SIGGRAPH |
1999 |
DBLP DOI BibTeX RDF |
steganography, copyright protection |
14 | Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono |
Watermaking Three-Dimensional Polygonal Models. |
ACM Multimedia |
1997 |
DBLP DOI BibTeX RDF |
digital watermaking, three-dimensional geometrical modeling, steganography, copyright protection, data hiding, digital fingerprinting, three-dimensional graphics |
11 | Qi Wen Gan, Wei-Chuen Yau, Yee Siang Gan, Iftekhar Salam, Shihui Guo, Chinchen Chang 0001, Yubing Wu, Luchen Zhou |
DSteganoM: Deep steganography for motion capture data. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | G. P. C. Venkata Krishna, D. Vivekananda Reddy |
Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data. |
J. Intell. Fuzzy Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Dewang Wang, Gaobo Yang, Zhiqing Guo, Jiyou Chen |
Enhancing Adversarial Embedding based Image Steganography via Clustering Modification Directions. |
ACM Trans. Multim. Comput. Commun. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Kaito Onuma, Sumiko Miyata |
An Improved Intensity Factor of Correlation-Based Steganography Using M-Sequence and DCT. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | R. B. Sushma, G. R. Manjula |
StegVRN: Enhancing Quality of Video Steganography Using CNN-Based Object Selection. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | M. Vivek, K. V. Anusuya |
Robustness realisation in image steganography using frequency domain-based transforms for e-voting. |
Electron. Gov. an Int. J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Shi Dong, Stelvio Cimato, Joarder Kamruzzaman, Yongsheng Hao |
Special Section Guest Editorial: Real-Time Image Steganography and Steganalysis. |
J. Electronic Imaging |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Peiwen Zhuo, Diqun Yan, Kaiyu Ying, Rangding Wang, Li Dong 0006 |
Audio steganography cover enhancement via reinforcement learning. |
Signal Image Video Process. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 3812 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|