The SCEAS System
Navigation Menu

Conferences in DBLP

Information Hiding Workshop (ih)
2006 (conf/ih/2006)

  1. Patrick Bas, François Cayre
    Natural Watermarking: A Secure Spread Spectrum Technique for WOA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:1-14 [Conf]
  2. Scott Craver
    An Improved Asymmetric Watermarking System Using Matrix Embedding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:15-25 [Conf]
  3. Michael Malkin, Ton Kalker
    A Cryptographic Method for Secure Watermark Detection. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:26-41 [Conf]
  4. R. C. Chakinala, A. Kumarasubramanian, R. Manokaran, G. Noubir, C. Pandu Rangan, Ravi Sundaram
    Steganographic Communication in Ordered Channels. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:42-57 [Conf]
  5. Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin
    Analyzing Network-Aware Active Wardens in IPv6. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:58-77 [Conf]
  6. Dima Pröfrock, Mathias Schlauweg, Erika Müller
    Video Watermarking by Using Geometric Warping Without Visible Artifacts. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:78-92 [Conf]
  7. Shijun Xiang, Jiwu Huang, Rui Yang
    Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:93-108 [Conf]
  8. Richard Bergmair, Stefan Katzenbeisser
    Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:109-123 [Conf]
  9. Keye Martin, Ira S. Moskowitz
    Noisy Timing Channels with Binary Inputs and Outputs. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:124-144 [Conf]
  10. André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
    A Computational Model for Watermark Robustness. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:145-160 [Conf]
  11. Adam Young, Moti Yung
    Hiding Information Hiding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:161-171 [Conf]
  12. Wolfgang Funk
    Reversible Watermarking of NURBS-Based CAD Models. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:172-187 [Conf]
  13. Hao-Tian Wu, Yiu-ming Cheung
    A High-Capacity Data Hiding Method for Polygonal Meshes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:188-200 [Conf]
  14. Andreas Westfeld
    Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:201-215 [Conf]
  15. Gang Tan, Yuqun Chen, Mariusz H. Jakubowski
    Delayed and Controlled Failures in Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:216-231 [Conf]
  16. Bertrand Anckaert, Matias Madou, Koen De Bosschere
    A Model for Self-Modifying Code. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:232-248 [Conf]
  17. Yun Q. Shi, Chunhua Chen, Wen Chen
    A Markov Process Based Approach to Effective Attacking JPEG Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:249-264 [Conf]
  18. Andrew D. Ker
    Batch Steganography and Pooled Steganalysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:265-281 [Conf]
  19. Jessica J. Fridrich, Petr Lisonek, David Soukal
    On Steganographic Embedding Efficiency. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:282-296 [Conf]
  20. Tri Van Le, Kaoru Kurosawa
    Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:297-313 [Conf]
  21. Younhee Kim, Zoran Duric, Dana Richards
    Modified Matrix Encoding Technique for Minimal Distortion Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:314-327 [Conf]
  22. Jae-Min Seol, Seong-Whan Kim
    Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:328-342 [Conf]
  23. Amir Houman Sadr, Shahrokh Ghaemmaghami
    A Collusion-Resistant Video Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:343-354 [Conf]
  24. Adam Young, Moti Yung
    An Elliptic Curve Backdoor Algorithm for RSASSA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:355-374 [Conf]
  25. Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    A Subliminal-Free Variant of ECDSA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:375-387 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002