|
Conferences in DBLP
MPSteg-color: A New Steganographic Technique for Color Images. [Citation Graph (, )][DBLP]
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. [Citation Graph (, )][DBLP]
Steganographic Communication with Quantum Information. [Citation Graph (, )][DBLP]
Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. [Citation Graph (, )][DBLP]
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. [Citation Graph (, )][DBLP]
A Graph Game Model for Software Tamper Protection. [Citation Graph (, )][DBLP]
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. [Citation Graph (, )][DBLP]
Space-Efficient Kleptography Without Random Oracles. [Citation Graph (, )][DBLP]
How Can Reed-Solomon Codes Improve Steganographic Schemes? [Citation Graph (, )][DBLP]
Reducing the Complexity of Syndrome Coding for Embedding. [Citation Graph (, )][DBLP]
Exploiting Security Holes in Lattice Data Hiding. [Citation Graph (, )][DBLP]
Practical Security Analysis of Dirty Paper Trellis Watermarking. [Citation Graph (, )][DBLP]
Security of Invertible Media Authentication Schemes Revisited. [Citation Graph (, )][DBLP]
A Fusion of Maximum Likelihood and Structural Steganalysis. [Citation Graph (, )][DBLP]
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. [Citation Graph (, )][DBLP]
Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction. [Citation Graph (, )][DBLP]
Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio. [Citation Graph (, )][DBLP]
A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. [Citation Graph (, )][DBLP]
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. [Citation Graph (, )][DBLP]
Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP]
Exposing Digital Forgeries Through Specular Highlights on the Eye. [Citation Graph (, )][DBLP]
Tamper Hiding: Defeating Image Forensics. [Citation Graph (, )][DBLP]
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. [Citation Graph (, )][DBLP]
Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. [Citation Graph (, )][DBLP]
Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. [Citation Graph (, )][DBLP]
|