|
Conferences in DBLP
A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes. [Citation Graph (, )][DBLP]
Hiding a Needle in a Haystack Using Negative Databases. [Citation Graph (, )][DBLP]
Information Leakage in Optimal Anonymized and Diversified Data. [Citation Graph (, )][DBLP]
Perturbation Hiding and the Batch Steganography Problem. [Citation Graph (, )][DBLP]
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. [Citation Graph (, )][DBLP]
Detecting Re-projected Video. [Citation Graph (, )][DBLP]
Residual Information of Redacted Images Hidden in the Compression Artifacts. [Citation Graph (, )][DBLP]
Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. [Citation Graph (, )][DBLP]
Reversible Watermarking with Subliminal Channel. [Citation Graph (, )][DBLP]
Watermarking Security Incorporating Natural Scene Statistics. [Citation Graph (, )][DBLP]
Block-Chain Based Fragile Watermarking Scheme with Superior Localization. [Citation Graph (, )][DBLP]
Generic Adoption of Spatial Steganalysis to Transformed Domain. [Citation Graph (, )][DBLP]
Weighted Stego-Image Steganalysis for JPEG Covers. [Citation Graph (, )][DBLP]
Practical Insecurity for Effective Steganalysis. [Citation Graph (, )][DBLP]
Authorship Proof for Textual Document. [Citation Graph (, )][DBLP]
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. [Citation Graph (, )][DBLP]
A Data Mapping Method for Steganography and Its Application to Images. [Citation Graph (, )][DBLP]
Benchmarking for Steganography. [Citation Graph (, )][DBLP]
Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face. [Citation Graph (, )][DBLP]
A Supraliminal Channel in a Videoconferencing Application. [Citation Graph (, )][DBLP]
C-Mix: A Lightweight Anonymous Routing Approach. [Citation Graph (, )][DBLP]
Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform. [Citation Graph (, )][DBLP]
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. [Citation Graph (, )][DBLP]
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. [Citation Graph (, )][DBLP]
Iterative Detection Method for CDMA-Based Fingerprinting Scheme. [Citation Graph (, )][DBLP]
|