The SCEAS System
Navigation Menu

Conferences in DBLP

Information Hiding Workshop (ih)
2001 (conf/ih/2001)

  1. Marshall W. Bern, Jeff Breidenbach, David Goldberg
    Trustworthy Paper Documents. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:1-12 [Conf]
  2. Toby Sharp
    An Implementation of Key-Based Digital Signal Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:13-26 [Conf]
  3. Miroslav Goljan, Jessica J. Fridrich, Rui Du
    Distortion-Free Data Embedding for Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:27-41 [Conf]
  4. Valeri Korjik, Guillermo Morales-Luna
    Information Hiding through Noisy Channels. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:42-50 [Conf]
  5. Mehmet Kivanç Mihçak, Ramarathnam Venkatesan
    A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:51-65 [Conf]
  6. Jennifer L. Wong, Darko Kirovski, Miodrag Potkonjak
    Computational Forensic Techniques for Intellectual Property Protection. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:66-80 [Conf]
  7. Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
    Intellectual Property Metering. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:81-95 [Conf]
  8. Gang Qu
    Keyless Public Watermarking for Intellectual Property Authentication. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:96-111 [Conf]
  9. Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann
    Efficiency Improvements of the Private Message Service. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:112-125 [Conf]
  10. Roger Dingledine, Michael J. Freedman, David Hopwood, David Molnar
    A Reputation System to Increase MIX-Net Reliability. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:126-141 [Conf]
  11. Justin Picard, Arnaud Robert
    Neural Networks Functions for Public Key Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:142-156 [Conf]
  12. Ramarathnam Venkatesan, Vijay V. Vazirani, Saurabh Sinha
    A Graph Theoretic Approach to Software Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:157-168 [Conf]
  13. Dimitris Thanos
    COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:169-184 [Conf]
  14. Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, Sanket Naik
    Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:185-199 [Conf]
  15. Joachim J. Eggers, Wolf-Dietrich Ihlenfeldt, Bernd Girod
    Digital Watermarking of Chemical Structure Sets. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:200-214 [Conf]
  16. Tonda Benes
    The Strong Eternity Service. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:215-229 [Conf]
  17. Richard Clayton, George Danezis, Markus G. Kuhn
    Real World Patterns of Failure in Anonymity Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:230-244 [Conf]
  18. Adam Back, Ulf Möller, Anton Stiglic
    Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:245-257 [Conf]
  19. Julien P. Stern, Jean-Pierre Tillich
    Automatic Detection of a Watermarked Document Using a Private Key. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:258-272 [Conf]
  20. André Adelsbach, Ahmad-Reza Sadeghi
    Zero-Knowledge Watermark Detection and Proof of Ownership. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:273-288 [Conf]
  21. Andreas Westfeld
    F5-A Steganographic Algorithm. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:289-302 [Conf]
  22. Hirofumi Muratani
    A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:303-315 [Conf]
  23. Ryo Sugihara
    Practical Capacity of Digital Watermarks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:316-329 [Conf]
  24. Sviatoslav Voloshynovskiy, Alexander Herrigel, Thierry Pun
    Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:330-339 [Conf]
  25. Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel Madueno, Stéphane Marchand-Maillet, Thierry Pun
    Second Generation Benchmarking and Application Oriented Evaluation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:340-353 [Conf]
  26. Darko Kirovski, Henrique S. Malvar
    Robust Covert Communication over a Public Audio Channel Using Spread Spectrum. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:354-368 [Conf]
  27. Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino
    Hiding Association Rules by Using Confidence and Support. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:369-383 [Conf]
  28. Ahmad-Reza Sadeghi
    How to Break a Semi-anonymous Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:384-394 [Conf]
  29. Julien Boeuf, Julien P. Stern
    An Analysis of One of the SDMI Candidates. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:395-410 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002