Andrew D. Ker Resampling and the detection of LSB matching in color bitmaps. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:1-15 [Conf]
Andreas Westfeld Space filling curves in steganalysis. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:28-37 [Conf]
Paul Salama, Brian King Efficient secure image transmission: compression integrated with encryption. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:47-58 [Conf]
Shan He, Min Wu Group-based joint coding and embedding technique for multimedia fingerprinting. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:96-105 [Conf]
Mauro Barni Shedding light on some possible remedies against watermark desynchronization: a case study. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:106-113 [Conf]
Chad Heitzenrater Characterization of steganographic algorithms using software metrics. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:264-274 [Conf]
Pierre Moulin, Ying Wang On achievable error exponents for watermarking. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:308-317 [Conf]
Dahua Xie, C. C. Jay Kuo Secure Lempel-Ziv compression with embedded encryption. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:318-327 [Conf]
Enrico Hauer, Martin Steinebach Robust digital watermark solution for intercoded frames of MPEG video data. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:381-390 [Conf]
Patrice Rondao-Alface, Benoit M. Macq Feature-based watermarking of 3D objects: toward robustness against remeshing and desynchronization. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:400-408 [Conf]
Pablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:465-473 [Conf]
Mark A. Masry A watermarking algorithm for map and chart images. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:495-503 [Conf]
Ivo D. Shterev, Reginald L. Lagendijk Maximum likelihood amplitude scale estimation for quantization-based watermarking in the presence of dither. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:516-527 [Conf]
Chaw-Seng Woo, Jiang Du, Binh Pham Geometrically robust digital image watermarking using scale normalization and flowline curvature. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:528-538 [Conf]
Thomas Vogel, Jana Dittmann Illustration watermarking: an object-based approach for digital images. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:578-589 [Conf]
Rajarathnam Chandramouli On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:590-594 [Conf]
Jessica J. Fridrich, David Soukal, Miroslav Goljan Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:595-606 [Conf]
Jana Dittmann, Danny Hesse, Reyk Hillert Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:607-618 [Conf]
Ping Wah Wong, Hong Chen, Zhongjue Tang On steganalysis of plus-minus one embedding of continuous-tone images. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:643-652 [Conf]
Sos S. Agaian, Hong Cai New multilevel DCT, feature vectors, and universal blind steganalysis. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:653-663 [Conf]
Chuhong Fei, Deepa Kundur, Raymond H. Kwong Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:697-708 [Conf]
Brett A. Bradley, Adnan M. Alattar High-capacity invertible data-hiding algorithm for digital audio. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:789-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP