The SCEAS System
Navigation Menu

Conferences in DBLP

Information Hiding Workshop (ih)
1999 (conf/ih/1999)

  1. Thomas Mittelholzer
    An Information-Theoretic Approach to Steganography and Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:1-16 [Conf]
  2. Natori Shin
    One-Time Hash Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:17-28 [Conf]
  3. Elke Franz, Andreas Pfitzmann
    Steganography Secure against Cover-Stego-Attacks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:29-46 [Conf]
  4. Jiri Fridrich, Rui Du
    Secure Steganographic Methods for Palette Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:47-60 [Conf]
  5. Andreas Westfeld, Andreas Pfitzmann
    Attacks on Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:61-76 [Conf]
  6. Joshua R. Smith, Chris Dodge
    Developments in Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:77-87 [Conf]
  7. Teddy Furon, Pierre Duhamel
    An Asymmetric Public Detection Watermarking Technique. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:88-100 [Conf]
  8. Scott Craver
    Zero Knowledge Watermark Detection. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:101-116 [Conf]
  9. André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Proving Ownership of Digital Content. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:117-133 [Conf]
  10. Hans-Jürgen Guth, Birgit Pfitzmann
    Error- and Collusion-Secure Fingerprinting for Digital Data. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:134-145 [Conf]
  11. Matthew L. Miller, Jeffrey A. Bloom
    Computing the Probability of False Watermark Detection. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:146-158 [Conf]
  12. Alessia De Rosa, Mauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Piva
    Optimum Decoding of Non-additive Full Frame DFT Watermarks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:159-171 [Conf]
  13. Joachim J. Eggers, Bernd Girod
    Watermark Detection after Quanization Attacks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:172-186 [Conf]
  14. Pedro Lamy, José Martinho, Tiago Rosa Maria Paula Queluz
    Content-Based Watermarking for Image Authentication. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:187-198 [Conf]
  15. Shelby Pereira, Thierry Pun
    Fast Robust Template Matching for Affine Resistant Image Watermarks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:199-210 [Conf]
  16. Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun
    A Stochastic Approach to Content Adaptive Digital Image Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:211-236 [Conf]
  17. Martin Kutter
    Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:237-252 [Conf]
  18. Jean-Paul M. G. Linnartz, Geert Depovere, Ton Kalker
    On the Design of a Watermarking System: Considerations and Rationales. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:253-269 [Conf]
  19. Gabriella Csurka, Frédéric Deguillaume, Joseph Ó Ruanaidh, Thierry Pun
    A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:270-285 [Conf]
  20. John Lach, William H. Mangione-Smith, Miodrag Potkonjak
    Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:286-301 [Conf]
  21. Sebastiano Battiato, Dario Catalano, Giovanni Gallo, Rosario Gennaro
    Robust Watermarking for Images Based on Color Manipulation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:302-317 [Conf]
  22. Neil F. Johnson, Zoran Duric, Sushil Jajodia
    Recovery of Watermarks from Distorted Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:318-332 [Conf]
  23. Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze
    Cocktail Watermarking on Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:333-347 [Conf]
  24. Gang Qu, Miodrag Potkonjak
    Hiding Signatures in Graph Coloring Solutions. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:348-367 [Conf]
  25. Julien P. Stern, Gaël Hachez, François Koeune, Jean-Jacques Quisquater
    Robust Object Watermarking: Application to Code. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:368-378 [Conf]
  26. Enriquillo Valdez, Moti Yung
    Software DisEngineering: Program Hiding Architecture and Experiments. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:379-394 [Conf]
  27. John McHugh
    Chaffing at the Bit: Thoughts on a Note by Ronald Rivest. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:395-404 [Conf]
  28. Ira S. Moskowitz, LiWu Chang
    An Entropy-Based Framework for Database Inference. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:405-418 [Conf]
  29. Talat Mert Dogu, Anthony Ephremides
    Covert Information Transmission through the Use of Standard Collision Resolution Algorithms. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:419-433 [Conf]
  30. Frank Stajano, Ross J. Anderson
    The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:434-447 [Conf]
  31. William P. R. Mitchell
    Protecting Secret Keys in a Compromised Computational System. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:448-462 [Conf]
  32. Andrew D. McDonald, Markus G. Kuhn
    StegFS: A Steganographic File System for Linux. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:462-477 [Conf]
  33. Yvo Desmedt, Tri Van Le, Jean-Jacques Quisquater
    Nonbinary Audio Cryptography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:478-489 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002