Conferences in DBLP
Patrick Bas , François Cayre Natural Watermarking: A Secure Spread Spectrum Technique for WOA. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:1-14 [Conf ] Scott Craver An Improved Asymmetric Watermarking System Using Matrix Embedding. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:15-25 [Conf ] Michael Malkin , Ton Kalker A Cryptographic Method for Secure Watermark Detection. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:26-41 [Conf ] R. C. Chakinala , A. Kumarasubramanian , R. Manokaran , G. Noubir , C. Pandu Rangan , Ravi Sundaram Steganographic Communication in Ordered Channels. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:42-57 [Conf ] Grzegorz Lewandowski , Norka B. Lucena , Steve J. Chapin Analyzing Network-Aware Active Wardens in IPv6. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:58-77 [Conf ] Dima Pröfrock , Mathias Schlauweg , Erika Müller Video Watermarking by Using Geometric Warping Without Visible Artifacts. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:78-92 [Conf ] Shijun Xiang , Jiwu Huang , Rui Yang Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:93-108 [Conf ] Richard Bergmair , Stefan Katzenbeisser Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:109-123 [Conf ] Keye Martin , Ira S. Moskowitz Noisy Timing Channels with Binary Inputs and Outputs. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:124-144 [Conf ] André Adelsbach , Stefan Katzenbeisser , Ahmad-Reza Sadeghi A Computational Model for Watermark Robustness. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:145-160 [Conf ] Adam Young , Moti Yung Hiding Information Hiding. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:161-171 [Conf ] Wolfgang Funk Reversible Watermarking of NURBS-Based CAD Models. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:172-187 [Conf ] Hao-Tian Wu , Yiu-ming Cheung A High-Capacity Data Hiding Method for Polygonal Meshes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:188-200 [Conf ] Andreas Westfeld Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:201-215 [Conf ] Gang Tan , Yuqun Chen , Mariusz H. Jakubowski Delayed and Controlled Failures in Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:216-231 [Conf ] Bertrand Anckaert , Matias Madou , Koen De Bosschere A Model for Self-Modifying Code. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:232-248 [Conf ] Yun Q. Shi , Chunhua Chen , Wen Chen A Markov Process Based Approach to Effective Attacking JPEG Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:249-264 [Conf ] Andrew D. Ker Batch Steganography and Pooled Steganalysis. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:265-281 [Conf ] Jessica J. Fridrich , Petr Lisonek , David Soukal On Steganographic Embedding Efficiency. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:282-296 [Conf ] Tri Van Le , Kaoru Kurosawa Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:297-313 [Conf ] Younhee Kim , Zoran Duric , Dana Richards Modified Matrix Encoding Technique for Minimal Distortion Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:314-327 [Conf ] Jae-Min Seol , Seong-Whan Kim Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:328-342 [Conf ] Amir Houman Sadr , Shahrokh Ghaemmaghami A Collusion-Resistant Video Watermarking Scheme. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:343-354 [Conf ] Adam Young , Moti Yung An Elliptic Curve Backdoor Algorithm for RSASSA. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:355-374 [Conf ] Jens-Matthias Bohli , Maria Isabel Gonzalez Vasco , Rainer Steinwandt A Subliminal-Free Variant of ECDSA. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:375-387 [Conf ]