The SCEAS System
Navigation Menu

Conferences in DBLP

International Workshop on Digital Watermarking (iwdw)
2009 (conf/iwdw/2009)


  1. Data Hiding and the Statistics of Images. [Citation Graph (, )][DBLP]


  2. The Changing Face of Cryptography. [Citation Graph (, )][DBLP]


  3. Forensic Techniques for Image Source Classification: A Comparative Study. [Citation Graph (, )][DBLP]


  4. Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model. [Citation Graph (, )][DBLP]


  5. Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques. [Citation Graph (, )][DBLP]


  6. Robust AVS Audio Watermarking. [Citation Graph (, )][DBLP]


  7. Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks. [Citation Graph (, )][DBLP]


  8. Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks. [Citation Graph (, )][DBLP]


  9. A Robust Watermarking for MPEG-2. [Citation Graph (, )][DBLP]


  10. Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. [Citation Graph (, )][DBLP]


  11. Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video. [Citation Graph (, )][DBLP]


  12. Fast Embedding Technique for Dirty Paper Trellis Watermarking. [Citation Graph (, )][DBLP]


  13. A Homomorphic Method for Sharing Secret Images. [Citation Graph (, )][DBLP]


  14. Dot-Size Variant Visual Cryptography. [Citation Graph (, )][DBLP]


  15. High Capacity Data Hiding in Binary Document Images. [Citation Graph (, )][DBLP]


  16. Hiding Information by Context-Based Synonym Substitution. [Citation Graph (, )][DBLP]


  17. A Statistical and Iterative Method for Data Hiding in Palette-Based Images. [Citation Graph (, )][DBLP]


  18. Estimating the Information Theoretic Optimal Stego Noise. [Citation Graph (, )][DBLP]


  19. Multi-class Blind Steganalysis Based on Image Run-Length Analysis. [Citation Graph (, )][DBLP]


  20. Local Patch Blind Spectral Watermarking Method for 3D Graphics. [Citation Graph (, )][DBLP]


  21. Reading Watermarks from Printed Binary Images with a Camera Phone. [Citation Graph (, )][DBLP]


  22. A New Approach in Reversible Watermarking. [Citation Graph (, )][DBLP]


  23. Classification Framework for Fair Content Tracing Protocols. [Citation Graph (, )][DBLP]


  24. Fragile Watermarking Scheme with Extensive Content Restoration Capability. [Citation Graph (, )][DBLP]


  25. Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. [Citation Graph (, )][DBLP]


  26. Camera-Model Identification Using Markovian Transition Probability Matrix. [Citation Graph (, )][DBLP]


  27. A Survey of Passive Image Tampering Detection. [Citation Graph (, )][DBLP]


  28. An Enhanced Statistical Approach to Identifying Photorealistic Images. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002