A new paradigm hidden in steganography
Proceedings of the 2000 workshop on New security paradigms
Hiding Functions and Computational Security of Image Watermarking Systems
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
An information-theoretic model for steganography
Information and Computation
A computational model for watermark robustness
IH'06 Proceedings of the 8th international conference on Information hiding
Bandwidth optimal steganography secure against adaptive chosen stegotext attacks
IH'06 Proceedings of the 8th international conference on Information hiding
Transactions on data hiding and multimedia security III
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
Public-key steganography with active attacks
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
A secure steganographic scheme in binary image
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Efficient steganography with provable security guarantees
IH'05 Proceedings of the 7th international conference on Information Hiding
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
IH'12 Proceedings of the 14th international conference on Information Hiding
Hi-index | 0.00 |