The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andrew D. Ker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew D. Ker, Hanno Nickau, C.-H. Luke Ong
    A Universal Innocent Game Model for the Böhm Tree Lambda Theory. [Citation Graph (0, 0)][DBLP]
    CSL, 1999, pp:405-419 [Conf]
  2. Andrew D. Ker
    Improved Detection of LSB Steganography in Grayscale Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:97-115 [Conf]
  3. Andrew D. Ker
    A General Framework for Structural Steganalysis of LSB Replacement. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:296-311 [Conf]
  4. Andrew D. Ker
    Quantitative evaluation of pairs and RS steganalysis. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:83-97 [Conf]
  5. Andrew D. Ker
    Resampling and the detection of LSB matching in color bitmaps. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:1-15 [Conf]
  6. Andrew D. Ker, Hanno Nickau, C.-H. Luke Ong
    Innocent game models of untyped lambda-calculus. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:272, n:1-2, pp:247-292 [Journal]
  7. Andrew D. Ker, Hanno Nickau, C.-H. Luke Ong
    Adapting innocent game models for the Böhm treelambda -theory. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:308, n:1-3, pp:333-366 [Journal]
  8. Andrew D. Ker
    Batch Steganography and Pooled Steganalysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:265-281 [Conf]
  9. Andrew D. Ker
    The ultimate steganalysis benchmark? [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:141-148 [Conf]

  10. A Fusion of Maximum Likelihood and Structural Steganalysis. [Citation Graph (, )][DBLP]


  11. Perturbation Hiding and the Batch Steganography Problem. [Citation Graph (, )][DBLP]


  12. Estimating Steganographic Fisher Information in Real Images. [Citation Graph (, )][DBLP]


  13. Estimating the Information Theoretic Optimal Stego Noise. [Citation Graph (, )][DBLP]


  14. The square root law of steganographic capacity. [Citation Graph (, )][DBLP]


  15. Locating steganographic payload via ws residuals. [Citation Graph (, )][DBLP]


  16. A Weighted Stego Image Detector for Sequential LSB Replacement. [Citation Graph (, )][DBLP]


  17. From blind to quantitative steganalysis. [Citation Graph (, )][DBLP]


  18. Feature reduction and payload location with WAM steganalysis. [Citation Graph (, )][DBLP]


  19. The square root law of steganographic capacity for Markov covers. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002