Secure high data embedding rate for steganographic application
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Associating network flows with user and application information
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
A new paradigm hidden in steganography
Proceedings of the 2000 workshop on New security paradigms
Digital Steganography: Hiding Data within Data
IEEE Internet Computing
IEEE Transactions on Computers
BPCS steganography using EZW lossy compressed images
Pattern Recognition Letters
Multimedia content screening using a dual watermarking and fingerprinting system
Proceedings of the tenth ACM international conference on Multimedia
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Robust Block Oriented Watermarking Scheme in Spatial Domain
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
SVD-Based Approach to Transparent Embedding Data into Digital Images
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Reed Solomon Codes for Digital Fingerprinting
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Practical Capacity of Digital Watermarks
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Audio Watermark Robustness to Desynchronization via Beat Detection
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Towards a Practical Secure Framework for Mobile Code Commerce
ISW '00 Proceedings of the Third International Workshop on Information Security
An Optimized Spatial Data Hiding Scheme Combined with Convolutional Codes and Hilbert Scan
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Applied Information Security for m-Commerce and Digital Television Environments
EC-Web 2001 Proceedings of the Second International Conference on Electronic Commerce and Web Technologies
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Hiding Functions and Computational Security of Image Watermarking Systems
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Capacity is the wrong paradigm
Proceedings of the 2002 workshop on New security paradigms
A new approach to reliable detection of LSB steganography in natural images
Signal Processing - Special section: Security of data hiding technologies
Protection of wavelet-based watermarking systems using filter parametrization
Signal Processing - Special section: Security of data hiding technologies
Watermarking relational data: framework, algorithms and analysis
The VLDB Journal — The International Journal on Very Large Data Bases
Authentication of LZ-77 compressed data
Proceedings of the 2003 ACM symposium on Applied computing
Two content protection schemes for digital items
Acta Cybernetica
Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA
Proceedings of the conference on Design, automation and test in Europe - Volume 3
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
A new channel for image hiding based on interpolating polynomials
Fundamenta Informaticae
A novel VQ-based watermarking scheme with genetic codebook partition
Design and application of hybrid intelligent systems
A Dual Watermark-Fingerprint System
IEEE MultiMedia
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
Steganography may increase learning everywhere
Journal of Computing Sciences in Colleges
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
An SVD-based audio watermarking technique
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Watermill: an optimized fingerprinting system for highly constrained data
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Behavioral synthesis techniques for intellectual property protection
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A VLSI architecture for watermarking in a secure still digital camera (S2DC) design
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Cryptography and steganography: teaching experience
Enhanced methods in computer security, biometric and artificial intelligence systems
Spatial domain image hiding scheme using pixel-values differencing
Fundamenta Informaticae
A wide-area Distribution Network for free software
ACM Transactions on Internet Technology (TOIT)
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Digital invisible ink and its applications in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A new topology-based watermarking method for layered 3D triangular mesh models
Machine Graphics & Vision International Journal
PCA-based web page watermarking
Pattern Recognition
A DCT-based Mod4 steganographic method
Signal Processing
Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images
Fundamenta Informaticae
Multiuser-based shadow watermark extraction system
Information Sciences: an International Journal
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Video waterscrambling: towards a video protection scheme based on the disturbance of motion vectors
EURASIP Journal on Applied Signal Processing
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Visual detection of LSB-encoded natural image steganography
ACM Transactions on Applied Perception (TAP)
Steganographic methods based on digital logic
SIP'07 Proceedings of the 6th Conference on 6th WSEAS International Conference on Signal Processing - Volume 6
Wavelet-based robust digital watermarking considering human visual system
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
A secure mobile communication approach based on information hiding
International Journal of Ad Hoc and Ubiquitous Computing
A novel covert channel based on the IP header record route option
International Journal of Advanced Media and Communication
Lossless data hiding for color images based on block truncation coding
Pattern Recognition
Color PCA eigenimages and their application to compression and watermarking
Image and Vision Computing
Spread spectrum watermarking for low rate video
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Informed watermarking for low rate video
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Error detection and concealment for video transmission using information hiding
Image Communication
Adaptive watermark mechanism for rightful ownership protection
Journal of Systems and Software
Ubiquity
Recovering a website's server components from the web infrastructure
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
Web services for digital rights management and copyright protection in digital media
Proceedings of the 3rd international conference on Digital Interactive Media in Entertainment and Arts
An improvement of EMD embedding method for large payloads by pixel segmentation strategy
Image and Vision Computing
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Fragile Watermarking Schemes for Tamperproof Web Pages
ISNN '08 Proceedings of the 5th international symposium on Neural Networks: Advances in Neural Networks, Part II
A novel steganographic algorithm using animations as cover
Decision Support Systems
StegCure: a comprehensive steganographic tool using enhanced LSB scheme
WSEAS Transactions on Computers
Hiding data in spatial domain images with distortion tolerance
Computer Standards & Interfaces
Hiding a Needle in a Haystack Using Negative Databases
Information Hiding
Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transform
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
The use of digital watermarking for intelligence multimedia document distribution
Journal of Theoretical and Applied Electronic Commerce Research
Reversible Fragile Watermarking for E-Learning Media
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
On the Complexity of Obtaining Optimal Watermarking Schemes
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
A High Payload VQ Steganographic Method for Binary Images
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
StegCure: an amalgamation of different steganographic methods in GIF image
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
The triple-watermarking algorithm with multiple description coding over lossy communication networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Applying robust multibit watermarks to digital images
Journal of Computational and Applied Mathematics
Reversible Watermark with Large Capacity Based on the Prediction Error Expansion
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE - Transactions on Information and Systems
Reversible Data Hiding in the VQ-Compressed Domain
IEICE - Transactions on Information and Systems
Reversible Steganographic Method with High Payload for JPEG Images
IEICE - Transactions on Information and Systems
Digital watermarking for relational databases using traceability parameter
International Journal of Computer Applications in Technology
A framework for synthetic stego
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Digital Watermarking and Steganography
Digital Watermarking and Steganography
A robust spread spectrum watermarking method using two levels DCT
International Journal of Electronic Security and Digital Forensics
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
A Statistical and Iterative Method for Data Hiding in Palette-Based Images
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Detection of distributed steganographic information in social networks
Proceedings of the 2008 Euro American Conference on Telematics and Information Systems
A new approach to covert communication via PDF files
Signal Processing
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Robust multiplicative patchwork method for audio watermarking
IEEE Transactions on Audio, Speech, and Language Processing
Technical section: Steganography on point-sampled geometry
Computers and Graphics
IEEE Transactions on Multimedia
Random-coding lower bounds for the error exponent of joint quantization and watermarking systems
IEEE Transactions on Information Theory
Reversible Data Hiding Based on Histogram
ICIC '07 Proceedings of the 3rd International Conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence
Steganalysis of LSB based image steganography using spatial and frequency domain features
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
A lossless robust data hiding scheme
Pattern Recognition
Complete video quality-preserving data hiding
IEEE Transactions on Circuits and Systems for Video Technology
Annales UMCS, Informatica
A new approach for data hiding in gray-level images
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
Benchmarking tools for fairly comparing watermarking algorithms
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
Multimedia Tools and Applications
Secure semi-blind watermarking based on iteration mapping and image features
Pattern Recognition
Hiding secret data in images via predictive coding
Pattern Recognition
A new spread spectrum watermarking method using two levels DCT
International Journal of Electronic Security and Digital Forensics
An information hiding method based on computational intractable problems
PCI'01 Proceedings of the 8th Panhellenic conference on Informatics
Time-scale invariant audio watermarking based on the statistical features in time domain
IH'06 Proceedings of the 8th international conference on Information hiding
A computational model for watermark robustness
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Information hiding system stegoWaveK for improving capacity
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Wavelet-based blind watermarking technique for real-time watermark interpretation
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Watermarking techniques for electronic circuit design
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Verification across intellectual property boundaries
CAV'07 Proceedings of the 19th international conference on Computer aided verification
Information Sciences: an International Journal
Audio Watermarking Based on Advanced Wigner Distribution and Important Frequency Peaks
International Journal of High Performance Computing Applications
A security steganography method for lossy compression gray scale image
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
A new adjustable blind watermarking based on GA and SVD
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Content-based image watermarking via public-key cryptosystems
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Journal of Visual Communication and Image Representation
Data hiding based on the similarity between neighboring pixels with reversibility
Digital Signal Processing
Robust image data hiding using geometric mean quantization
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Tri-layer stego for enhanced security: a keyless random approach
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Optimal linear detector for spread spectrum based multidimensional signal watermarking
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
A logarithmic quantization index modulation for perceptually better data hiding
IEEE Transactions on Image Processing
An adaptive audio watermarking based on the singular value decomposition in the wavelet domain
Digital Signal Processing
Digital steganography for ASCII text documents Ph.D. research proposal
Proceedings of the 7th International Conference on Frontiers of Information Technology
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Genetic algorithm optimization of multiwavelet-based audio watermarking
AEE'10 Proceedings of the 9th WSEAS international conference on Applications of electrical engineering
Robust audio watermarking using multiwavelet transform and genetic algorithm
WSEAS TRANSACTIONS on SYSTEMS
Passive steganalysis based on higher order image statistics of curvelet transform
International Journal of Automation and Computing
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
A genetic algorithm optimization technique for multiwavelet-based digital audio watermarking
EURASIP Journal on Advances in Signal Processing - Special issue on time-frequency analysis and its applications to multimedia signals
Query-preserving watermarking of relational databases and Xml documents
ACM Transactions on Database Systems (TODS)
Digital image forensics: a booklet for beginners
Multimedia Tools and Applications
Hamiltonian graph approach to steganography
International Journal of Electronic Security and Digital Forensics
Robust watermarking scheme using wave atoms
EURASIP Journal on Advances in Signal Processing - Special issue on theory and application of general linear image processing
Robust audio watermarking by using low-frequency histogram
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Robust blind watermarking scheme using wave atoms
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
High capacity digital image watermarking with increased number of blocks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Tamper detection marking for object files
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Progressive exponential clustering-based steganography
EURASIP Journal on Advances in Signal Processing
Image adaptive watermarking using fuzzy logic on FPGA
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Multimedia Tools and Applications
A new robust reference logo watermarking scheme
Multimedia Tools and Applications
An ASIC implementation of a low power robust invisible watermarking processor
Journal of Systems Architecture: the EUROMICRO Journal
MIV'05 Proceedings of the 5th WSEAS international conference on Multimedia, internet & video technologies
Multimedia robust watermarking: commercial application and standardisation approaches
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
An adaptive robust watermarking algorithm for audio signals using SVD
Transactions on computational science X
Varying radix numeral system based adaptive image steganography
Information Processing Letters
Optimal parameter selection for image watermarking using MOGA
PReMI'11 Proceedings of the 4th international conference on Pattern recognition and machine intelligence
How quantization based schemes can be used in image steganographic context
Image Communication
Images encryption by the use of evolutionary algorithms
Analog Integrated Circuits and Signal Processing
Undergraduate research in computer forensics
Proceedings of the 2011 Information Security Curriculum Development Conference
Adaptive partial-matching steganography for voice over IP using triple M sequences
Computer Communications
Advances in Software Engineering
Rights protection for data cubes
ISC'06 Proceedings of the 9th international conference on Information Security
A statistical approach for ownership identification of digital images
ACIVS'06 Proceedings of the 8th international conference on Advanced Concepts For Intelligent Vision Systems
Personal rights management– enabling privacy rights in digital online content
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Analysis of ISB watermarking model: block based methods vs embedding repetition methods
Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia
An information hiding framework for lightweight mobile devices with digital camera
PReMI'05 Proceedings of the First international conference on Pattern Recognition and Machine Intelligence
A novel data hiding algorithm using normal vectors of 3d model
CGI'06 Proceedings of the 24th international conference on Advances in Computer Graphics
Steganography on 3d models using a spatial subdivision technique
CGI'06 Proceedings of the 24th international conference on Advances in Computer Graphics
Cryptanalysis of “wavelet tree quantization” watermarking scheme
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Alternatives for multimedia messaging system steganography
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Statistical tools for digital forensics
IH'04 Proceedings of the 6th international conference on Information Hiding
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
Protecting secret data from insider attacks
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Enhancing the transmission security of content-based hidden biometric data
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
A dual cepstrum-based watermarking scheme with self-synchronization
Signal Processing
A data hiding algorithm for point-sampled geometry
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
A new algorithm of gray watermark embedding
ICAT'06 Proceedings of the 16th international conference on Advances in Artificial Reality and Tele-Existence
Invertible watermarking scheme for authentication and integrity
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Noise-Robust watermarking for numerical datasets
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Information hiding method using CDMA on wave files
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
A print-scan resistable digital seal system
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
A steganographic method for digital images robust to RS steganalysis
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Shadow watermark extraction system
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A new steganography scheme in the domain of side-match vector quantization
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
VQ image steganographic method with high embedding capacity using multi-way search approach
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Cryptanalysis of a wavelet based watermarking scheme
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
A robust image watermarking technique for JPEG images using quadtrees
PCM'04 Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II
VQ-Based gray watermark hiding scheme and genetic index assignment
PCM'04 Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II
A bandwidth efficiency of lempel-ziv scheme for data authentication
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Steganography for executables and code transformation signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A block oriented fingerprinting scheme in relational database
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
An intelligent chaotic embedding approach to enhance stego-image quality
Information Sciences: an International Journal
Robust and secured image-adaptive data hiding
Digital Signal Processing
Watermarking using similarities based on fractal codification
Digital Signal Processing
Reversible watermark with large capacity using the predictive coding
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Multiple messages embedding using DCT-Based mod4 steganographic method
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Personal rights management – taming camera-phones for individual privacy enforcement
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
New image steganographic methods using run-length approach
Information Sciences: an International Journal
Traceroute based IP channel for sending hidden short messages
IWSEC'06 Proceedings of the 1st international conference on Security
Category attack for LSB steganalysis of JPEG images
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Watermarking non-numerical databases
MDAI'06 Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence
A study on visual attack to BPCS-Steganography and countermeasure
VLBV'05 Proceedings of the 9th international conference on Visual Content Processing and Representation
Very low bitrate video: a statistical analysis in the DCT domain
VLBV'05 Proceedings of the 9th international conference on Visual Content Processing and Representation
A formulation of conditional states on steganalysis approach
WSEAS Transactions on Mathematics
Information Sciences: an International Journal
Sherlock Holmes and the case of the advanced persistent threat
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Secure watermarking on 3d geometry via ICA and orthogonal transformation
Transactions on Data Hiding and Multimedia Security VII
A new blind method for detecting novel steganography
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Securing fingerprint images using a hybrid technique
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Reversible Steganography for BTC-compressed Images
Fundamenta Informaticae
A new watermarking method with obfuscated quasi-chirp transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing
Fundamenta Informaticae
Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images
Fundamenta Informaticae
A New Channel for Image Hiding Based on Interpolating polynomials
Fundamenta Informaticae
Game-based forensics course for first year students
Proceedings of the 13th annual conference on Information technology education
A novel colorImage steganography using Discrete Wavelet Transform
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Robust algorithm for detection of copy-move forgery in digital images based on ridgelet transform
AICI'12 Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence
Digital Signal Processing
Verification across Intellectual Property Boundaries
ACM Transactions on Software Engineering and Methodology (TOSEM)
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
Hiding Message in Map Along Pre-Hamiltonian Path
International Journal of Information Security and Privacy
International Journal of Organizational and Collective Intelligence
International Journal of Systems and Service-Oriented Engineering
Non-Integer expansion embedding for prediction-based reversible watermarking
IH'12 Proceedings of the 14th international conference on Information Hiding
Region duplication detection based on Harris corner points and step sector statistics
Journal of Visual Communication and Image Representation
Using PSO in a spatial domain based image hiding scheme with distortion tolerance
Computers and Electrical Engineering
On optimal detection for matrix multiplicative data hiding
Proceedings of the first ACM workshop on Information hiding and multimedia security
Performance analysis of current data hiding algorithms for VoIP
Proceedings of the 16th Communications & Networking Symposium
An efficient fragile web pages watermarking for integrity protection of XML documents
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
From an IP address to a street address: using wireless signals to locate a target
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
Copyright for web content using invisible text watermarking
Computers in Human Behavior
An enhanced Hill cipher approach for image encryption in steganography
International Journal of Electronic Security and Digital Forensics
Self-synchronising image steganography algorithms based on error-correcting codes
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.06 |
From the Publisher:Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.