The SCEAS System
Navigation Menu

Conferences in DBLP

Information Hiding Workshop (ih)
2008 (conf/ih/2008)

  1. A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes. [Citation Graph (, )][DBLP]

  2. Hiding a Needle in a Haystack Using Negative Databases. [Citation Graph (, )][DBLP]

  3. Information Leakage in Optimal Anonymized and Diversified Data. [Citation Graph (, )][DBLP]

  4. Perturbation Hiding and the Batch Steganography Problem. [Citation Graph (, )][DBLP]

  5. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. [Citation Graph (, )][DBLP]

  6. Detecting Re-projected Video. [Citation Graph (, )][DBLP]

  7. Residual Information of Redacted Images Hidden in the Compression Artifacts. [Citation Graph (, )][DBLP]

  8. Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. [Citation Graph (, )][DBLP]

  9. Reversible Watermarking with Subliminal Channel. [Citation Graph (, )][DBLP]

  10. Watermarking Security Incorporating Natural Scene Statistics. [Citation Graph (, )][DBLP]

  11. Block-Chain Based Fragile Watermarking Scheme with Superior Localization. [Citation Graph (, )][DBLP]

  12. Generic Adoption of Spatial Steganalysis to Transformed Domain. [Citation Graph (, )][DBLP]

  13. Weighted Stego-Image Steganalysis for JPEG Covers. [Citation Graph (, )][DBLP]

  14. Practical Insecurity for Effective Steganalysis. [Citation Graph (, )][DBLP]

  15. Authorship Proof for Textual Document. [Citation Graph (, )][DBLP]

  16. Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. [Citation Graph (, )][DBLP]

  17. A Data Mapping Method for Steganography and Its Application to Images. [Citation Graph (, )][DBLP]

  18. Benchmarking for Steganography. [Citation Graph (, )][DBLP]

  19. Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face. [Citation Graph (, )][DBLP]

  20. A Supraliminal Channel in a Videoconferencing Application. [Citation Graph (, )][DBLP]

  21. C-Mix: A Lightweight Anonymous Routing Approach. [Citation Graph (, )][DBLP]

  22. Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform. [Citation Graph (, )][DBLP]

  23. Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. [Citation Graph (, )][DBLP]

  24. On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. [Citation Graph (, )][DBLP]

  25. Iterative Detection Method for CDMA-Based Fingerprinting Scheme. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002