Conferences in DBLP
Kymie M. C. Tan , John McHugh , Kevin S. Killourhy Hiding Intrusions: From the Abnormal to the Normal and Beyond. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:1-17 [Conf ] Gina Fisk , Mike Fisk , Christos Papadopoulos , Joshua Neil Eliminating Steganography in Internet Traffic with Active Wardens. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:18-35 [Conf ] Andrei Serjantov , Roger Dingledine , Paul F. Syverson From a Trickle to a Flood: Active Attacks on Several Mix Types. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:36-52 [Conf ] Dogan Kesdogan , Dakshi Agrawal , Stefan Penz Limits of Anonymity in Open Environments. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:53-69 [Conf ] Richard Clayton , George Danezis Chaffinch: Confidentiality in the Face of Legal Threats. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:70-86 [Conf ] Fernando Pérez-González , Félix Balado Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:87-105 [Conf ] Guenole C. M. Silvestre , Neil J. Hurley , Teddy Furon Robustness and Efficiency of Non-linear Side-Informed Watermarking. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:106-118 [Conf ] Qiming Li , Ee-Chien Chang Security of Public Watermarking Schemes for Binary Sequences. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:119-128 [Conf ] Peter A. Fletcher , Kieran G. Larkin Direct Embedding and Detection of RST Invariant Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:129-144 [Conf ] Hyung Shin Kim , Yunju Baek , Heung-Kyu Lee , Young-Ho Suh Robust Image Watermark Using Radon Transform and Bispectrum Invariants. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:145-159 [Conf ] Darko Kirovski , Hagai Attias Audio Watermark Robustness to Desynchronization via Beat Detection. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:160-176 [Conf ] Oliver Benedens Robust Watermarking and Affine Registration of 3D Meshes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:177-195 [Conf ] Mikhail J. Atallah , Victor Raskin , Christian Hempelmann , Mercan Karahan , Radu Sion , Umut Topkara , Katrina E. Triezenberg Natural Language Watermarking and Tamperproofing. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:196-212 [Conf ] Tri Van Le , Yvo Desmedt Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:213-225 [Conf ] Mehmet Kivanç Mihçak , Ramarathnam Venkatesan , Mustafa Kesal Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:226-246 [Conf ] Scott Craver , Bede Liu , Wayne Wolf Detectors for Echo Hiding Systems. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:247-257 [Conf ] Richard E. Newman , Ira S. Moskowitz , LiWu Chang , Murali M. Brahmadesam A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:258-277 [Conf ] Elke Franz Steganography Preserving Statistical Properties. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:278-294 [Conf ] Hideki Noda , Jeremiah Spaulding , Mahdad Nouri Shirazi , Michiharu Niimi , Eiji Kawaguchi Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:295-309 [Conf ] Jessica J. Fridrich , Miroslav Goljan , Dorin Hogea Steganalysis of JPEG Images: Breaking the F5 Algorithm. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:310-323 [Conf ] Andreas Westfeld Detecting Low Embedding Rates. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:324-339 [Conf ] Siwei Lyu , Hany Farid Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:340-354 [Conf ] Sorina Dumitrescu , Xiaolin Wu , Zhe Wang Detection of LSB Steganography via Sample Pair Analysis. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:355-372 [Conf ] Boris Shimanovsky , Jessica Feng , Miodrag Potkonjak Hiding Data in DNA. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:373-386 [Conf ] Jack Brassil Tracing the Source of a Shredded Document. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:387-399 [Conf ] Yuqun Chen , Ramarathnam Venkatesan , Matthew Cary , Ruoming Pang , Saurabh Sinha , Mariusz H. Jakubowski Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:400-414 [Conf ] Christian Tobias Practical Oblivious Transfer Protocols. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:415-426 [Conf ]