Conferences in DBLP
Daniel Gruhl , Walter Bender Information Hiding to Foil the Casual Counterfeiter. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:1-15 [Conf ] John Lach , William H. Mangione-Smith , Miodrag Potkonjak Fingerprinting Digital Circuits on Programmable Hardware. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:16-31 [Conf ] Andreas Westfeld , Gritta Wolf Steganography in a Video Conferencing System. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:32-47 [Conf ] Lisa M. Marvel , Charles G. Boncelet Jr. , Charles T. Retter Reliable Blind Information Hiding for Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:48-61 [Conf ] Yvo Desmedt , Shuang Hou , Jean-Jacques Quisquater Cerebral Cryptography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:62-72 [Conf ] Ross J. Anderson , Roger M. Needham , Adi Shamir The Steganographic File System. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:73-82 [Conf ] Dogan Kesdogan , Jan Egner , Roland Büschkes Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:83-98 [Conf ] Gerrit Bleumer Biometric yet Privacy Protecting Person Authentication. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:99-110 [Conf ] Tomas Sander , Christian F. Tschudin On Software Protection via Function Hiding. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:111-123 [Conf ] Markus G. Kuhn , Ross J. Anderson Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:124-142 [Conf ] Jiri Fridrich , Arnold C. Baldoza , Richard J. Simard Robust Digital Watermarking Based on Key-Dependent Basis Functions. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:143-157 [Conf ] Jack Lacy , Schuyler R. Quackenbush , Amy R. Reibman , James H. Snyder Intellectual Property Protection Systems and Digital Watermarking. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:158-168 [Conf ] Alexander Herrigel , Joseph Ó Ruanaidh , Holger Petersen , Shelby Pereira , Thierry Pun Secure Copyright Protection Techniques for Digital Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:169-190 [Conf ] Juan Ramón Hernández , Fernando Pérez-González Shedding More Light on Image Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:191-207 [Conf ] Chr. Neubauer , J. Herre , K. Brandenburg Continuous Steganographic Data Transmission Using Uncompressed Audio. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:208-217 [Conf ] Fabien A. P. Petitcolas , Ross J. Anderson , Markus G. Kuhn Attacks on Copyright Marking Systems. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:218-238 [Conf ] Sabrina Sowers , Abdou Youssef Testing Digital Watermark Resistance to Destruction. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:239-257 [Conf ] Jean-Paul M. G. Linnartz , Marten van Dijk Analysis of the Sensitivity Attack against Electronic Watermarks in Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:258-272 [Conf ] Neil F. Johnson , Sushil Jajodia Steganalysis of Images Created Using Current Steganography Software. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:273-289 [Conf ] Maurice Maes Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:290-305 [Conf ] Christian Cachin An Information-Theoretic Model for Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:306-318 [Conf ] Mark Ettinger Steganalysis and Game Equilibria. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:319-328 [Conf ] Jean-Paul M. G. Linnartz , Ton Kalker , Geert Depovere Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:329-343 [Conf ] Jan Zöllner , Hannes Federrath , Herbert Klimant , Andreas Pfitzmann , Rudi Piotraschke , Andreas Westfeld , Guntram Wicke , Gritta Wolf Modeling the Security of Steganographic Systems. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:344-354 [Conf ] Scott Craver On Public-Key Steganography in the Presence of an Active Warden. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:355-368 [Conf ]