The SCEAS System
Navigation Menu

Conferences in DBLP

International Workshop on Digital Watermarking (iwdw)
2008 (conf/iwdw/2008)


  1. A Robust Watermarking Scheme for H.264. [Citation Graph (, )][DBLP]


  2. Detection of Double MPEG Compression Based on First Digit Statistics. [Citation Graph (, )][DBLP]


  3. A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking. [Citation Graph (, )][DBLP]


  4. A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection. [Citation Graph (, )][DBLP]


  5. Reversible Data Hiding Based On H.264/AVC Intra Prediction. [Citation Graph (, )][DBLP]


  6. Scalability Evaluation of Blind Spread-Spectrum Image Watermarking. [Citation Graph (, )][DBLP]


  7. Run-Length and Edge Statistics Based Approach for Image Splicing Detection. [Citation Graph (, )][DBLP]


  8. Scale-Space Feature Based Image Watermarking in Contourlet Domain. [Citation Graph (, )][DBLP]


  9. A Practical Print-and-Scan Resilient Watermarking for High Resolution Images. [Citation Graph (, )][DBLP]


  10. Adaptive SVD-Based Digital Image Watermarking. [Citation Graph (, )][DBLP]


  11. Robust Audio Watermarking Based on Log-Polar Frequency Index. [Citation Graph (, )][DBLP]


  12. Adaptive Threshold Based Robust Watermark Detection Method. [Citation Graph (, )][DBLP]


  13. A Digital Forgery Image Detection Algorithm Based on Wavelet Homomorphic Filtering. [Citation Graph (, )][DBLP]


  14. Blind Detection of Digital Forgery Image Based on the Local Entropy of the Gradient. [Citation Graph (, )][DBLP]


  15. Exposure Time Change Attack on Image Watermarking Systems. [Citation Graph (, )][DBLP]


  16. Steganalysis Based on Difference Image. [Citation Graph (, )][DBLP]


  17. A Novel Steganographic Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching. [Citation Graph (, )][DBLP]


  18. A Novel Approach for JPEG Steganography. [Citation Graph (, )][DBLP]


  19. A High Capacity Steganographic Algorithm in Color Images. [Citation Graph (, )][DBLP]


  20. A Novel Method for Block Size Forensics Based on Morphological Operations. [Citation Graph (, )][DBLP]


  21. Non-malleable Schemes Resisting Adaptive Adversaries. [Citation Graph (, )][DBLP]


  22. An Algorithm for Modeling Print and Scan Operations Used for Watermarking. [Citation Graph (, )][DBLP]


  23. Space Time Block Coding for Spread Spectrum Watermarking Systems. [Citation Graph (, )][DBLP]


  24. Formal Analysis of Two Buyer-Seller Watermarking Protocols. [Citation Graph (, )][DBLP]


  25. Detection of Hidden Information in Webpage Based on Higher-Order Statistics. [Citation Graph (, )][DBLP]


  26. Secret Sharing Based Video Watermark Algorithm for Multiuser. [Citation Graph (, )][DBLP]


  27. GSM Based Security Analysis for Add-SS Watermarking. [Citation Graph (, )][DBLP]


  28. Video Watermarking Based on Spatio-temporal JND Profile. [Citation Graph (, )][DBLP]


  29. On the Performance of Wavelet Decomposition Steganalysis with JSteg Steganography. [Citation Graph (, )][DBLP]


  30. Balanced Multiwavelets Based Digital Image Watermarking. [Citation Graph (, )][DBLP]


  31. A Generalised Model for Distortion Performance Analysis of Wavelet Based Watermarking. [Citation Graph (, )][DBLP]


  32. Multiple Watermarking with Side Information. [Citation Graph (, )][DBLP]


  33. Content Sharing Based on Personal Information in Virtually Secured Space. [Citation Graph (, )][DBLP]


  34. Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models. [Citation Graph (, )][DBLP]


  35. A Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework. [Citation Graph (, )][DBLP]


  36. An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption. [Citation Graph (, )][DBLP]


  37. First Digit Law and Its Application to Digital Forensics. [Citation Graph (, )][DBLP]


  38. Digital Camera Identification from Images - Estimating False Acceptance Probability. [Citation Graph (, )][DBLP]


  39. Design of Collusion-Resistant Fingerprinting Systems: Review and New Results. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002