Conferences in DBLP
Thomas Mittelholzer An Information-Theoretic Approach to Steganography and Watermarking. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:1-16 [Conf ] Natori Shin One-Time Hash Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:17-28 [Conf ] Elke Franz , Andreas Pfitzmann Steganography Secure against Cover-Stego-Attacks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:29-46 [Conf ] Jiri Fridrich , Rui Du Secure Steganographic Methods for Palette Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:47-60 [Conf ] Andreas Westfeld , Andreas Pfitzmann Attacks on Steganographic Systems. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:61-76 [Conf ] Joshua R. Smith , Chris Dodge Developments in Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:77-87 [Conf ] Teddy Furon , Pierre Duhamel An Asymmetric Public Detection Watermarking Technique. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:88-100 [Conf ] Scott Craver Zero Knowledge Watermark Detection. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:101-116 [Conf ] André Adelsbach , Birgit Pfitzmann , Ahmad-Reza Sadeghi Proving Ownership of Digital Content. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:117-133 [Conf ] Hans-Jürgen Guth , Birgit Pfitzmann Error- and Collusion-Secure Fingerprinting for Digital Data. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:134-145 [Conf ] Matthew L. Miller , Jeffrey A. Bloom Computing the Probability of False Watermark Detection. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:146-158 [Conf ] Alessia De Rosa , Mauro Barni , Franco Bartolini , Vito Cappellini , Alessandro Piva Optimum Decoding of Non-additive Full Frame DFT Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:159-171 [Conf ] Joachim J. Eggers , Bernd Girod Watermark Detection after Quanization Attacks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:172-186 [Conf ] Pedro Lamy , José Martinho , Tiago Rosa Maria Paula Queluz Content-Based Watermarking for Image Authentication. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:187-198 [Conf ] Shelby Pereira , Thierry Pun Fast Robust Template Matching for Affine Resistant Image Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:199-210 [Conf ] Sviatoslav Voloshynovskiy , Alexander Herrigel , Nazanin Baumgaertner , Thierry Pun A Stochastic Approach to Content Adaptive Digital Image Watermarking. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:211-236 [Conf ] Martin Kutter Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:237-252 [Conf ] Jean-Paul M. G. Linnartz , Geert Depovere , Ton Kalker On the Design of a Watermarking System: Considerations and Rationales. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:253-269 [Conf ] Gabriella Csurka , Frédéric Deguillaume , Joseph Ó Ruanaidh , Thierry Pun A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:270-285 [Conf ] John Lach , William H. Mangione-Smith , Miodrag Potkonjak Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:286-301 [Conf ] Sebastiano Battiato , Dario Catalano , Giovanni Gallo , Rosario Gennaro Robust Watermarking for Images Based on Color Manipulation. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:302-317 [Conf ] Neil F. Johnson , Zoran Duric , Sushil Jajodia Recovery of Watermarks from Distorted Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:318-332 [Conf ] Chun-Shien Lu , Hong-Yuan Mark Liao , Shih-Kun Huang , Chwen-Jye Sze Cocktail Watermarking on Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:333-347 [Conf ] Gang Qu , Miodrag Potkonjak Hiding Signatures in Graph Coloring Solutions. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:348-367 [Conf ] Julien P. Stern , Gaël Hachez , François Koeune , Jean-Jacques Quisquater Robust Object Watermarking: Application to Code. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:368-378 [Conf ] Enriquillo Valdez , Moti Yung Software DisEngineering: Program Hiding Architecture and Experiments. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:379-394 [Conf ] John McHugh Chaffing at the Bit: Thoughts on a Note by Ronald Rivest. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:395-404 [Conf ] Ira S. Moskowitz , LiWu Chang An Entropy-Based Framework for Database Inference. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:405-418 [Conf ] Talat Mert Dogu , Anthony Ephremides Covert Information Transmission through the Use of Standard Collision Resolution Algorithms. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:419-433 [Conf ] Frank Stajano , Ross J. Anderson The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:434-447 [Conf ] William P. R. Mitchell Protecting Secret Keys in a Compromised Computational System. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:448-462 [Conf ] Andrew D. McDonald , Markus G. Kuhn StegFS: A Steganographic File System for Linux. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:462-477 [Conf ] Yvo Desmedt , Tri Van Le , Jean-Jacques Quisquater Nonbinary Audio Cryptography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:478-489 [Conf ]