A secure subliminal channel (?)
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Sphere-packings, lattices, and groups
Sphere-packings, lattices, and groups
Subliminal-free authentication and signature
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Recognition by Linear Combinations of Models
IEEE Transactions on Pattern Analysis and Machine Intelligence - Special issue on interpretation of 3-D scenes—part I
Elements of information theory
Elements of information theory
A survey of image registration techniques
ACM Computing Surveys (CSUR)
Numerical recipes in C (2nd ed.): the art of scientific computing
Numerical recipes in C (2nd ed.): the art of scientific computing
Towards absolute invariants of images under translation, rotation, and dilation
Pattern Recognition Letters
Cryptologia
Data communications principles
Data communications principles
Digital images and human vision
Digital images and human vision
The use of psychophysical data and models in the analysis of display system performance
Digital images and human vision
The visible differences predictor: an algorithm for the assessment of image fidelity
Digital images and human vision
What's wrong with mean-squared error?
Digital images and human vision
Visual learning and recognition of 3-D objects from appearance
International Journal of Computer Vision
CDMA: principles of spread spectrum communication
CDMA: principles of spread spectrum communication
The nature of statistical learning theory
The nature of statistical learning theory
Error coding cookbook: practical C/C++ routines and recipes for error detection and correction
Error coding cookbook: practical C/C++ routines and recipes for error detection and correction
IBM Systems Journal
Alignment by Maximization of Mutual Information
International Journal of Computer Vision
Robust IP watermarking methodologies for physical design
DAC '98 Proceedings of the 35th annual Design Automation Conference
Watermarking of uncompressed and compressed video
Signal Processing
Watermarking algorithm based on a human visual model
Signal Processing
A DCT-domain system for robust image watermarking
Signal Processing
Image and watermark registration
Signal Processing
Robust audio watermarking using perceptual masking
Signal Processing
A lower bound on the complexity of approximate nearest-neighbor searching on the Hamming cube
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Lower bounds for high dimensional nearest neighbor search and related problems
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Introduction to data compression (2nd ed.)
Introduction to data compression (2nd ed.)
IEEE Spectrum
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Quantization effects on digital watermarks
Signal Processing
Digital Color Halftoning
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Image and Video Databases: Restoration, Watermarking and Retrieval
Image and Video Databases: Restoration, Watermarking and Retrieval
JPEG Still Image Data Compression Standard
JPEG Still Image Data Compression Standard
Digital Image Processing
Security and Watermaking of Multimedia Contents II
Security and Watermaking of Multimedia Contents II
Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
Watermarking 3D Objects for Verification
IEEE Computer Graphics and Applications
Geometry-Based Watermarking of 3D Models
IEEE Computer Graphics and Applications
Radiometric CCD camera calibration and noise estimation
IEEE Transactions on Pattern Analysis and Machine Intelligence
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Feature Extraction and a Database Strategy for Video Fingerprinting
VISUAL '02 Proceedings of the 5th International Conference on Recent Advances in Visual Information Systems
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
The History of Subliminal Channels
Proceedings of the First International Workshop on Information Hiding
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Watermark Detection after Quanization Attacks
IH '99 Proceedings of the Third International Workshop on Information Hiding
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Robust Object Watermarking: Application to Code
IH '99 Proceedings of the Third International Workshop on Information Hiding
Cocktail Watermarking on Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
Computing the Probability of False Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Entropy-Based Framework for Database Inference
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Asymmetric Public Detection Watermarking Technique
IH '99 Proceedings of the Third International Workshop on Information Hiding
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
An Analysis of One of the SDMI Candidates
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Distortion-Free Data Embedding for Images
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detection of LSB Steganography via Sample Pair Analysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Steganography Preserving Statistical Properties
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Optimal probabilistic fingerprint codes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Time-Scale Modification of Audio Signals with Combined Harmonic and Wavelet Representations
ICASSP '97 Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97) -Volume 1 - Volume 1
Content-Based Identification of Audio Titles on the Internet
WEDELMUSIC '01 Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC'01)
Grouping for Recognition
Studies in computational geometry motivated by mesh generation
Studies in computational geometry motivated by mesh generation
A new approach to reliable detection of LSB steganography in natural images
Signal Processing - Special section: Security of data hiding technologies
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
On Estimation of Secret Message Length in JSteg-like Steganography
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
Hidden Markov models and steganalysis
Proceedings of the 2004 workshop on Multimedia and security
Capacity of steganographic channels
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
LSB steganalysis based on high-order statistics
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Tracking anonymous peer-to-peer VoIP calls on the internet
Proceedings of the 12th ACM conference on Computer and communications security
Audio Fingerprinting: Nearest Neighbor Search in High Dimensional Binary Spaces
Journal of VLSI Signal Processing Systems
Data Masking: A New Approach for Steganography?
Journal of VLSI Signal Processing Systems
DVD Demystified
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
An information-theoretic approach to the design of robust digital watermarking systems
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 04
Watermarking polygonal lines using Fourier descriptors
ICASSP '00 Proceedings of the Acoustics, Speech, and Signal Processing, 2000. on IEEE International Conference - Volume 04
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
Digital Watermarks for Audio Signals
ICMCS '96 Proceedings of the 1996 International Conference on Multimedia Computing and Systems
Template Based Recovery of Fourier-Based Watermarks Using Log-polar and Log-log Maps
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Key Independent Watermark Detection
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
On the Robustness and Imperceptibility of Digital Fingerprints
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
An iterative image registration technique with an application to stereo vision
IJCAI'81 Proceedings of the 7th international joint conference on Artificial intelligence - Volume 2
Channels with side information at the transmitter
IBM Journal of Research and Development
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Information transmission and steganography
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Trellis-coded rational dither modulation for digital watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
An improved sample pairs method for detection of LSB embedding
IH'04 Proceedings of the 6th international conference on Information Hiding
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
A novel image watermarking scheme against desynchronization attacks by SVR revision
Journal of Visual Communication and Image Representation
A key-recovery attack on authentication watermarking by li and yuan
Proceedings of the 10th ACM workshop on Multimedia and security
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
Reversible information hiding for VQ indices based on locally adaptive coding
Journal of Visual Communication and Image Representation
Audio Watermarking Based on Quantization in Wavelet Domain
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Watermark Image Restoration Method Based on Block Hopfield Network
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part III
Reversible data hiding exploiting spatial correlation between sub-sampled images
Pattern Recognition
Additive spread-spectrum watermark detection in demosaicked images
Proceedings of the 11th ACM workshop on Multimedia and security
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Detection of distributed steganographic information in social networks
Proceedings of the 2008 Euro American Conference on Telematics and Information Systems
IEEE Transactions on Information Forensics and Security
Optimal spread spectrum watermark embedding via a multistep feasibility formulation
IEEE Transactions on Image Processing
Invariant image watermarking using multi-scale Harris detector and wavelet moments
Computers and Electrical Engineering
A Novel Application for Text Watermarking in Digital Reading
AICI '09 Proceedings of the International Conference on Artificial Intelligence and Computational Intelligence
Comparison of perceptual shaping techniques for digital image watermarking
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
A secure DVB set-top box via trusting computing technologies
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
On observable delegation of personal data by watermarking
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Detecting intrusion faults in remotely controlled systems
ACC'09 Proceedings of the 2009 conference on American Control Conference
Speech watermarking for analog flat-fading bandpass channels
IEEE Transactions on Audio, Speech, and Language Processing
An Image Authentication Based on Discrete Fourier Transform
Fundamenta Informaticae
Pixel-wise based digital watermarking using Weiner filter in chrominance channel
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Improved performance of image watermarking by reducing luminance bias
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Enhanced image watermarking using adaptive pixel prediction
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
A reversible data hiding scheme using complementary embedding strategy
Information Sciences: an International Journal
Improving embedding efficiency via matrix embedding: a case study
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Security evaluation of informed watermarking schemes
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
A hybrid model for digital camera source identification
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Analysis of digital image watermark attacks
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Robust audio identification for MP3 popular music
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
An adaptive audio watermarking based on the singular value decomposition in the wavelet domain
Digital Signal Processing
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Using quad smoothness to efficiently control capacity-distortion of reversible data hiding
Journal of Systems and Software
FLD-based detection of re-compressed speech signals
Proceedings of the 12th ACM workshop on Multimedia and security
Watermark detection on quantized transform coefficients using product bernoulli distributions
Proceedings of the 12th ACM workshop on Multimedia and security
A game-theoretic system security design for the visible watermarking
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
A perfect maze based steganographic method
Journal of Systems and Software
Statistical-mechanical approach for multiple watermarks using spectrum spreading
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
A reversible data hiding scheme using even-odd embedding method
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Computation of embedding capacity in reversible watermarking schemes
Proceedings of the Seventh Indian Conference on Computer Vision, Graphics and Image Processing
A game-theoretic framework for the security system of visible watermarking
Expert Systems with Applications: An International Journal
Technical Section: Robust and blind mesh watermarking based on volume moments
Computers and Graphics
Hamiltonian graph approach to steganography
International Journal of Electronic Security and Digital Forensics
A fragile color image watermarking framework focusing a new invisible domain
Proceedings of the 2011 International Conference on Communication, Computing & Security
A chip-based watermarking framework for color image authentication
Proceedings of the 2011 International Conference on Communication, Computing & Security
A steganographic scheme by fully exploiting modification directions
Expert Systems with Applications: An International Journal
Haptic annotation for an interactive image
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Multimedia Tools and Applications
Rational enforcement of digital oblivion
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
Transform based additive data hiding based on a hierarchical prior
ECC'11 Proceedings of the 5th European conference on European computing conference
How quantization based schemes can be used in image steganographic context
Image Communication
A cover image model for reliable steganalysis
IH'11 Proceedings of the 13th international conference on Information hiding
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
On the security and practicality of a buyer seller watermarking protocol for DRM
Proceedings of the 4th international conference on Security of information and networks
A progressive quality hiding strategy based on equivalence partitions of hiding units
Transactions on data hiding and multimedia security VI
A framework for avoiding steganography usage over HTTP
Journal of Network and Computer Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Implementation of the DSSS method in watermarking digital audio objects
Annales UMCS, Informatica - Security Systems
Computer Standards & Interfaces
Optimizing least-significant-bit substitution using cat swarm optimization strategy
Information Sciences: an International Journal
Watermarking using similarities based on fractal codification
Digital Signal Processing
Fragile watermarking tamper detection with images compressed by fuzzy transform
Information Sciences: an International Journal
A robust region-adaptive dual image watermarking technique
Journal of Visual Communication and Image Representation
Digital audio watermarking technique using pseudo-zernike moments
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Watermark detection for video bookmarking using mobile phone camera
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Reversible image watermarking through coordinate logic operation based prediction
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
A robust content based audio watermarking using UDWT and invariant histogram
Multimedia Tools and Applications
Secret message in a ping: creation and prevention
SITE'12 Proceedings of the 11th international conference on Telecommunications and Informatics, Proceedings of the 11th international conference on Signal Processing
PC-based real-time video watermark embedding system independent of platform for parallel computing
Transactions on Data Hiding and Multimedia Security VII
Robust track-and-trace video watermarking
Security and Communication Networks
An image steganography for colour images using lossless compression technique
International Journal of Computational Science and Engineering
A hybrid embedded steganography technique: optimum pixel method and matrix embedding
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Use of "emergable watermarks" as copy indicators for securing video content
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Data forensics constructions from cryptographic hashing and coding
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Schur decomposition and dither modulation: an efficient and robust audio watermarking technique
Proceedings of the CUBE International Information Technology Conference
Modular data hiding for improved web-portal security
Proceedings of the 13th International Conference on Computer Systems and Technologies
A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function
Fundamenta Informaticae
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
Digital Signal Processing
A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristics
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
A Survey of Digital Forensic Techniques for Digital Libraries
International Journal of Digital Library Systems
M-Identity and its authentication protocol for secure mobile commerce applications
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hiding Message in Map Along Pre-Hamiltonian Path
International Journal of Information Security and Privacy
International Journal of Organizational and Collective Intelligence
International Journal of Systems and Service-Oriented Engineering
A novel approach to digital watermarking, exploiting colour spaces
Signal Processing
Distributed multicast of fingerprinted content based on a rational peer-to-peer community
Computer Communications
Statistical detection of LSB matching using hypothesis testing theory
IH'12 Proceedings of the 14th international conference on Information Hiding
Information theory applications in error bit rate analysis of digital image watermarking
Computers and Electrical Engineering
Joint watermarking and progressive geometric compression of 3D meshes
Proceedings of the first ACM workshop on Information hiding and multimedia security
Monitoring heart disease and diabetes with mobile internet communications
International Journal of Telemedicine and Applications
A generalized tamper localization approach for reversible watermarking algorithms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A robust zero-watermarking scheme using Canny edge detector
International Journal of Electronic Security and Digital Forensics
Journal of Systems and Software
Abstracting images into continuous-line artistic styles
The Visual Computer: International Journal of Computer Graphics
Adaptive visible watermarking in Hadamard domain for digital images
International Journal of Information and Computer Security
Anti-cropping digital image watermarking using Sudoku
International Journal of Grid and Utility Computing
Block-based image steganalysis: Algorithm and performance evaluation
Journal of Visual Communication and Image Representation
An Improved Reversible Data Hiding Scheme Based On Neighboring Pixel Differences
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Dual-purpose semi-fragile watermark: Authentication and recovery of digital images
Computers and Electrical Engineering
A new approach to high-capacity annotation watermarking based on digital fountain codes
Multimedia Tools and Applications
Image encryption based on the finite field cosine transform
Image Communication
Communications of the ACM
Bayesian Segmentation Based Local Geometrically Invariant Image Watermarking
Fundamenta Informaticae
An adaptive steganographic algorithm for 3D polygonal models using vertex decimation
Multimedia Tools and Applications
Hi-index | 0.02 |
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.*This new edition now contains essential information on steganalysis and steganography*New concepts and new applications including QIM introduced*Digital watermark embedding is given a complete update with new processes and applications