Jessica J. Fridrich, Miroslav Goljan On estimation of secret message length in LSB steganography in spatial domain. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:23-34 [Conf]
Siwei Lyu, Hany Farid Steganalysis using color wavelet statistics and one-class support vector machines. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:35-45 [Conf]
Andrew D. Ker Quantitative evaluation of pairs and RS steganalysis. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:83-97 [Conf]
Michael Arnold, Zongwei Huang Fast audio watermarking: concepts and realizations. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:105-115 [Conf]
Toshiyuki Sakai, Naohisa Komatsu Digital watermarking based on process of speech production. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:127-138 [Conf]
Ryuki Tachibana Two-dimensional audio watermark for MPEG AAC audio. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:139-150 [Conf]
Kaliappan Gopalan Cepstral domain modification of audio signals for data embedding: preliminary results. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:151-161 [Conf]
John Stach Machine vision applications of digital watermarking. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:184-191 [Conf]
Andrea Abrardo, Mauro Barni Orthogonal dirty paper coding for informed data hiding. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:274-285 [Conf]
Enrico Hauer, Stefan Thiemert Synchronization technique to detect MPEG video frames for watermark retrieval. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:315-324 [Conf]
Wolfgang Funk Impact of MPEG-4 3D mesh coding on watermarking algorithms for polygonal 3D meshes. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:336-344 [Conf]
Bijan G. Mobasseri, Robert J. Berger II Reversible compressed domain watermarking by exploiting code space inefficiency. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:366-373 [Conf]
John Stach, Adnan M. Alattar A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:386-396 [Conf]
Eugene T. Lin, Edward J. Delp Spatial synchronization using watermark key structure. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:536-547 [Conf]
Jin S. Seo, Chang D. Yoo Image watermarking based on scale-space representation. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:560-570 [Conf]
Damien Delannay, Benoit M. Macq Classification of watermarking schemes robust against loss of synchronization. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:581-591 [Conf]
Pedro Comesaña, Fernando Pérez-González Quantifying security leaks in spread spectrum data hiding: a game-theoretic approach. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:592-601 [Conf]
Min Wu Distortion compensated lookup-table embedding: joint security and robustness enhancement for quantization-based data hiding. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:610-621 [Conf]
Umut Uludag, Anil K. Jain Attacks on biometric systems: a case study in fingerprints. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:622-633 [Conf]
Anoop M. Namboodiri, Anil K. Jain Multimedia document authentication using on-line signatures as watermarks. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:653-662 [Conf]
Gordon W. Braudaway, Fred Mintzer Application of invisible image watermarks to previously half-toned images. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:663-669 [Conf]
Gaurav Sharma, Shen-ge Wang Show-through watermarking of duplex printed documents. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:670-684 [Conf]
Adnan M. Alattar, Osama M. Alattar Watermarking electronic text documents containing justified paragraphs and irregular line spacing. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:685-695 [Conf]
Dahua Xie, C. C. Jay Kuo Efficient multimedia data encryption based on flexible QM coder. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:696-704 [Conf]
Albert Meixner, Andreas Uhl Analysis of a wavelet-based robust hash algorithm. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:772-783 [Conf]
Ng Tek Ming, Hari Krishna Garg Wavelet domain watermarking using maximum-likelihood detection. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:816-826 [Conf]
Stefan Katzenbeisser, Jana Dittmann Malicious attacks on media authentication schemes based on invertible watermarks. [Citation Graph (0, 0)][DBLP] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:838-847 [Conf]