The SCEAS System
Navigation Menu

Conferences in DBLP

Information Hiding Workshop (ih)
2002 (conf/ih/2002)

  1. Kymie M. C. Tan, John McHugh, Kevin S. Killourhy
    Hiding Intrusions: From the Abnormal to the Normal and Beyond. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:1-17 [Conf]
  2. Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil
    Eliminating Steganography in Internet Traffic with Active Wardens. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:18-35 [Conf]
  3. Andrei Serjantov, Roger Dingledine, Paul F. Syverson
    From a Trickle to a Flood: Active Attacks on Several Mix Types. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:36-52 [Conf]
  4. Dogan Kesdogan, Dakshi Agrawal, Stefan Penz
    Limits of Anonymity in Open Environments. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:53-69 [Conf]
  5. Richard Clayton, George Danezis
    Chaffinch: Confidentiality in the Face of Legal Threats. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:70-86 [Conf]
  6. Fernando Pérez-González, Félix Balado
    Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:87-105 [Conf]
  7. Guenole C. M. Silvestre, Neil J. Hurley, Teddy Furon
    Robustness and Efficiency of Non-linear Side-Informed Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:106-118 [Conf]
  8. Qiming Li, Ee-Chien Chang
    Security of Public Watermarking Schemes for Binary Sequences. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:119-128 [Conf]
  9. Peter A. Fletcher, Kieran G. Larkin
    Direct Embedding and Detection of RST Invariant Watermarks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:129-144 [Conf]
  10. Hyung Shin Kim, Yunju Baek, Heung-Kyu Lee, Young-Ho Suh
    Robust Image Watermark Using Radon Transform and Bispectrum Invariants. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:145-159 [Conf]
  11. Darko Kirovski, Hagai Attias
    Audio Watermark Robustness to Desynchronization via Beat Detection. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:160-176 [Conf]
  12. Oliver Benedens
    Robust Watermarking and Affine Registration of 3D Meshes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:177-195 [Conf]
  13. Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg
    Natural Language Watermarking and Tamperproofing. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:196-212 [Conf]
  14. Tri Van Le, Yvo Desmedt
    Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:213-225 [Conf]
  15. Mehmet Kivanç Mihçak, Ramarathnam Venkatesan, Mustafa Kesal
    Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:226-246 [Conf]
  16. Scott Craver, Bede Liu, Wayne Wolf
    Detectors for Echo Hiding Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:247-257 [Conf]
  17. Richard E. Newman, Ira S. Moskowitz, LiWu Chang, Murali M. Brahmadesam
    A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:258-277 [Conf]
  18. Elke Franz
    Steganography Preserving Statistical Properties. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:278-294 [Conf]
  19. Hideki Noda, Jeremiah Spaulding, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi
    Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:295-309 [Conf]
  20. Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea
    Steganalysis of JPEG Images: Breaking the F5 Algorithm. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:310-323 [Conf]
  21. Andreas Westfeld
    Detecting Low Embedding Rates. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:324-339 [Conf]
  22. Siwei Lyu, Hany Farid
    Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:340-354 [Conf]
  23. Sorina Dumitrescu, Xiaolin Wu, Zhe Wang
    Detection of LSB Steganography via Sample Pair Analysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:355-372 [Conf]
  24. Boris Shimanovsky, Jessica Feng, Miodrag Potkonjak
    Hiding Data in DNA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:373-386 [Conf]
  25. Jack Brassil
    Tracing the Source of a Shredded Document. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:387-399 [Conf]
  26. Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski
    Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:400-414 [Conf]
  27. Christian Tobias
    Practical Oblivious Transfer Protocols. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:415-426 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002