Informed Watermarking
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
IEEE Transactions on Information Theory
Writing on dirty paper (Corresp.)
IEEE Transactions on Information Theory
A steganographic method based upon JPEG and particle swarm optimization algorithm
Information Sciences: an International Journal
High-performance JPEG steganography using complementary embedding strategy
Pattern Recognition
Hiding Secret Information Using Adaptive Side-Match VQ
IEICE - Transactions on Information and Systems
LSB-Based Steganography Using Reflected Gray Code
IEICE - Transactions on Information and Systems
Performance comparison of DCT and Walsh transform for steganography
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A security steganography method for lossy compression gray scale image
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
JPEG2000 steganography possibly secure against histogram-based attack
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Hi-index | 0.10 |
This paper presents a novel approach to fingerprint alignment based on the optimization of cost functions. The optimization is performed in two stages: the first stage provides a robust initial registration based on non-minutiae features, and the second ...