The SCEAS System
Navigation Menu

Conferences in DBLP

International Workshop on Digital Watermarking (iwdw)
2007 (conf/iwdw/2007)


  1. Watermarking, a Mature Technology - Retrospect and Prospect. [Citation Graph (, )][DBLP]


  2. The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection. [Citation Graph (, )][DBLP]


  3. Detecting Photographic Composites of People. [Citation Graph (, )][DBLP]


  4. (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005. [Citation Graph (, )][DBLP]


  5. Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme. [Citation Graph (, )][DBLP]


  6. Multiple Watermarking in Visual Cryptography. [Citation Graph (, )][DBLP]


  7. Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding. [Citation Graph (, )][DBLP]


  8. Fusion Based Blind Image Steganalysis by Boosting Feature Selection. [Citation Graph (, )][DBLP]


  9. Steganalysis of Multi Bit Plane Image Steganography. [Citation Graph (, )][DBLP]


  10. Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. [Citation Graph (, )][DBLP]


  11. Weaknesses of MB2. [Citation Graph (, )][DBLP]


  12. Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. [Citation Graph (, )][DBLP]


  13. Steganalysis Versus Splicing Detection. [Citation Graph (, )][DBLP]


  14. Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. [Citation Graph (, )][DBLP]


  15. A General Data Hiding Framework and Multi-level Signature for Binary Images. [Citation Graph (, )][DBLP]


  16. High-Capacity Invisible Background Encoding for Digital Authentication of Hardcopy Documents. [Citation Graph (, )][DBLP]


  17. Reversible Quantization-Index Modulation Using Neighboring Correlation. [Citation Graph (, )][DBLP]


  18. High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain. [Citation Graph (, )][DBLP]


  19. Reversible Data Hiding Using Prediction Error Values Embedding. [Citation Graph (, )][DBLP]


  20. An Improved Reversible Difference Expansion Watermarking Algorithm. [Citation Graph (, )][DBLP]


  21. Optimum Histogram Pair Based Image Lossless Data Embedding. [Citation Graph (, )][DBLP]


  22. Multiple Domain Watermarking for Print-Scan and JPEG Resilient Data Hiding. [Citation Graph (, )][DBLP]


  23. GA-Based Robustness Evaluation Method for Digital Image Watermarking. [Citation Graph (, )][DBLP]


  24. Dither Modulation in the Logarithmic Domain. [Citation Graph (, )][DBLP]


  25. A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack. [Citation Graph (, )][DBLP]


  26. Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption. [Citation Graph (, )][DBLP]


  27. Design an Aperiodic Stochastic Resonance Signal Processor for Digital Watermarking. [Citation Graph (, )][DBLP]


  28. Watermarking for Authentication of LZ-77 Compressed Documents. [Citation Graph (, )][DBLP]


  29. Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation. [Citation Graph (, )][DBLP]


  30. A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images. [Citation Graph (, )][DBLP]


  31. On the Complexity of Obtaining Optimal Watermarking Schemes. [Citation Graph (, )][DBLP]


  32. A Theoretical Framework for Watermarking of Compressed Signals. [Citation Graph (, )][DBLP]


  33. Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model. [Citation Graph (, )][DBLP]


  34. Multiple Scrambling and Adaptive Synchronization for Audio Watermarking. [Citation Graph (, )][DBLP]


  35. A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality. [Citation Graph (, )][DBLP]


  36. A High Payload VQ Steganographic Method for Binary Images. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002