The SCEAS System
Navigation Menu

Conferences in DBLP

Information Hiding Workshop (ih)
2007 (conf/ih/2007)


  1. MPSteg-color: A New Steganographic Technique for Color Images. [Citation Graph (, )][DBLP]


  2. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. [Citation Graph (, )][DBLP]


  3. Steganographic Communication with Quantum Information. [Citation Graph (, )][DBLP]


  4. Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. [Citation Graph (, )][DBLP]


  5. Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. [Citation Graph (, )][DBLP]


  6. A Graph Game Model for Software Tamper Protection. [Citation Graph (, )][DBLP]


  7. Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. [Citation Graph (, )][DBLP]


  8. Space-Efficient Kleptography Without Random Oracles. [Citation Graph (, )][DBLP]


  9. How Can Reed-Solomon Codes Improve Steganographic Schemes? [Citation Graph (, )][DBLP]


  10. Reducing the Complexity of Syndrome Coding for Embedding. [Citation Graph (, )][DBLP]


  11. Exploiting Security Holes in Lattice Data Hiding. [Citation Graph (, )][DBLP]


  12. Practical Security Analysis of Dirty Paper Trellis Watermarking. [Citation Graph (, )][DBLP]


  13. Security of Invertible Media Authentication Schemes Revisited. [Citation Graph (, )][DBLP]


  14. A Fusion of Maximum Likelihood and Structural Steganalysis. [Citation Graph (, )][DBLP]


  15. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. [Citation Graph (, )][DBLP]


  16. Soft Feature-Based Watermark Decoding with Insertion/Deletion Correction. [Citation Graph (, )][DBLP]


  17. Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio. [Citation Graph (, )][DBLP]


  18. A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. [Citation Graph (, )][DBLP]


  19. Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. [Citation Graph (, )][DBLP]


  20. Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP]


  21. Exposing Digital Forgeries Through Specular Highlights on the Eye. [Citation Graph (, )][DBLP]


  22. Tamper Hiding: Defeating Image Forensics. [Citation Graph (, )][DBLP]


  23. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. [Citation Graph (, )][DBLP]


  24. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. [Citation Graph (, )][DBLP]


  25. Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002