|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 687 occurrences of 262 keywords
|
|
|
Results
Found 3812 publication records. Showing 3812 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
99 | Ingemar J. Cox |
Watermarking, steganography and content forensics. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
content forensics, steganography, digital watermarking, data hiding, steganalysis |
88 | Young-Shil Kim, Sang Park, Suk-Hee Wang, Seung Lee |
Information Hiding Method Using CDMA on Wave Files. |
PARA |
2004 |
DBLP DOI BibTeX RDF |
Stego-Data, Cover- Data, Wave file, Steganography, CDMA, Information Hiding |
85 | Junhui He, Jiwu Huang, Guoping Qiu |
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. |
IWDW |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Zhili Chen, Liusheng Huang, Zhenshan Yu, Lingjun Li, Wei Yang 0011 |
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
linguistic steganalysis, distribution of words, statistical, detection, linguistic steganography |
78 | Karen Bailey, Kevin Curran |
An evaluation of image based steganography methods. |
Multim. Tools Appl. |
2006 |
DBLP DOI BibTeX RDF |
Steganography, Steganalysis |
78 | Junhui He, Jiwu Huang |
Steganalysis of stochastic modulation steganography. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
stochastic modulation, statistical distribution models of difference, steganography, information hiding, steganalysis |
74 | Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang |
Analysis of Current Steganography Tools: Classifications & Features. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Hideki Noda, Tomonori Furuta, Michiharu Niimi, Eiji Kawaguchi |
Application of BPCS steganography to wavelet compressed video. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
74 | Hideki Noda, Jeremiah Spaulding, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi |
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
|
70 | Hedieh Sajedi, Mansour Jamzad |
Secure Cover Selection Steganography. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Cover Selection, Steganography Capacity, Steganography |
67 | Ma Xiu-ying, Lin Jia-jun |
HVS-Based Imperceptibility Evaluation for Steganography. |
Infoscale |
2009 |
DBLP DOI BibTeX RDF |
evaluation, steganography, HVS, Peak Signal to Noise Ratio, imperceptibility |
67 | Diego F. de Carvalho, Rafael Chies, André Pimenta Freire, Luciana Andréia Fondazzi Martimiano, Rudinei Goularte |
Video steganography for confidential documents: integrity, privacy and version control. |
SIGDOC |
2008 |
DBLP DOI BibTeX RDF |
document version control, multimedia, steganography, MPEG-4, collaborative systems |
67 | Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin |
Syntax and Semantics-Preserving Application-Layer Protocol Steganography. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
application protocols, semantics, steganography, syntax, SSH |
64 | Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang 0011, Lingjun Li, Xueling Zheng, Xinxin Zhao |
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Eiji Kawaguchi |
BPCS-Steganography - Principle and Applications. |
KES (4) |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Luis von Ahn, Nicholas J. Hopper |
Public-Key Steganography. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Christopher B. Smith, Sos S. Agaian |
Denoising and the active warden. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Abdelrahman Desoky |
Listega: list-based steganography methodology. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Steganography, Linguistic steganography |
56 | Zuzana Oplatková, Jiri Holoska, Ivan Zelinka, Roman Senkerik |
Steganography Detection by Means of Neural Networks. |
DEXA Workshops |
2008 |
DBLP DOI BibTeX RDF |
neural networks, classification, Steganography |
56 | Jeong-Chun Joo, Hae-Yeoun Lee, Cong Nguyen Bui, Won-Young Yoo, Heung-Kyu Lee |
Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function. |
PCM |
2008 |
DBLP DOI BibTeX RDF |
Pixel-value differencing, Modulus function, Steganography, Steganalysis |
56 | Mohammad Shirali-Shahreza |
A New Persian/Arabic Text Steganography Using "La" Word. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
Feature Coding, Persian/Arabic Text, Unicode Standard, Information Security, Text Steganography |
56 | Weiming Zhang, Xinpeng Zhang 0001, Shuozhong Wang |
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
stego-codes, covering codes, embedding efficiency, embedding rate, steganography, Hamming codes, wet paper codes |
56 | Rajarathnam Chandramouli |
A mathematical framework for active steganalysis. |
Multim. Syst. |
2003 |
DBLP DOI BibTeX RDF |
Security, Independent component analysis, Steganography, Steganalysis |
53 | Sajad Shirali-Shahreza, Mohammad T. Manzuri Shalmani |
High capacity error free wavelet Domain Speech Steganography. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Yuling Liu, Xingming Sun, Can Gan, Hong Wang 0009 |
An Efficient Linguistic Steganography for Chinese Text. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Hwajong Oh, Kwangsoo Lee, Sangjin Lee 0002 |
Attack on JPEG2000 Steganography Using LRCA. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Regunathan Radhakrishnan, Mehdi Kharrazi, Nasir D. Memon |
Data Masking: A New Approach for Steganography? |
J. VLSI Signal Process. |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy |
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu |
JPEG Compression Immune Steganography Using Wavelet Transform. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Rainer Böhme, Andreas Westfeld |
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
53 | Rajarathnam Chandramouli, Mehdi Kharrazi, Nasir D. Memon |
Image Steganography and Steganalysis: Concepts and Practice. |
IWDW |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Ren-Junn Hwang, Timothy K. Shih, Chuan-Ho Kao, Tsung-Ming Chang |
Lossy Compression Tolerant Steganography. |
Human.Society@Internet |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Zainab Famili, Karim Faez, Abbas Fadavi |
A New Steganography Based on chi2 Technic. |
CIARP |
2009 |
DBLP DOI BibTeX RDF |
cover image, ? 2-test, Steganography, stego image |
46 | Weihui Dai, Yue Yu, Bin Deng |
BinText steganography based on Markov state transferring probability. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
Markov transferring probability, online communication, information hiding, text steganography |
46 | Bin Liu 0008, Fenlin Liu, Chunfang Yang, Yifeng Sun |
Secure Steganography in Compressed Video Bitstreams. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Video Steganography, Statistical Invisibility, Data Hiding |
46 | Wojciech Mazurczyk, Krzysztof Szczypiorski |
Steganography of VoIP Streams. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
steganography, VoIP, information hiding |
46 | Johann Barbier, Kichenakoumar Mayoura |
Steganalysis of Multi Bit Plane Image Steganography. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
Multi bit plane image steganography, Fisher discriminant, RS steganalysis |
46 | Anna Lysyanskaya, Mira Meyerovich |
Provably Secure Steganography with Imperfect Sampling. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
digital signatures, Markov processes, steganography, Information hiding |
46 | Guillermo A. Francia III, Tyler S. Gomez |
Steganography obliterator: an attack on the least significant bits. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
digital copyright management, steganography, computer security, information hiding, digital forensics, intellectual property, enterprise application |
46 | Sos S. Agaian, Ravindranath Cherukuri |
Run Length Based Steganography for Binary Images. |
PReMI |
2005 |
DBLP DOI BibTeX RDF |
Run length, steganography, binary image |
46 | Dorian A. Flowers |
Investigating steganography. |
ACM Southeast Regional Conference |
2004 |
DBLP DOI BibTeX RDF |
JPEG Format, image processing, steganography |
46 | Elke Franz 0001, Antje Schneidewind |
Adaptive steganography based on dithering. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
image processing, adaptivity, steganography |
46 | Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere |
Steganography for Executables and Code Transformation Signatures. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
code transformation signature, steganography, executables |
46 | Kai Fan, Weidong Kou |
A Secure Steganography Scheme Based on (N, t) Threshold. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
e-commerce, steganography, threshold |
46 | Malte Diehl |
Secure covert channels in multiplayer games. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
security, game theory, information theory, steganography, information hiding |
46 | Kisik Chang, Robert H. Deng, Feng Bao 0001, Sangjin Lee 0002, HyungJun Kim, Jongin Lim 0001 |
On Security Notions for Steganalysis. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
pseudoprocessingness, steganography, steganalysis |
46 | Ana Georgina Flesia, David L. Donoho |
Implications for Image Watermarking of Recent Work in Image Analysis and Representation. |
IWDW |
2002 |
DBLP DOI BibTeX RDF |
Image Steganography, Natural Scene Statistics, Geometric Diffusion by Level Set Methods, Computational Harmonic Analysis, Wavelets, Interpolation, Discrete Cosine Transform, Inpainting, Image Watermarking, Total Variation |
43 | Nicholas J. Hopper, Luis von Ahn, John Langford 0001 |
Provably Secure Steganography. |
IEEE Trans. Computers |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Min-Wen Chao, Chao-Hung Lin, Cheng-Wei Yu, Tong-Yee Lee |
A High Capacity 3D Steganography Algorithm. |
IEEE Trans. Vis. Comput. Graph. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Lifang Yu, Yao Zhao 0001, Rongrong Ni, Zhenfeng Zhu |
PM1 steganography in JPEG images using genetic algorithm. |
Soft Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Kotaro Yamamoto, Munetoshi Iwakiri |
A Standard MIDI File Steganography Based on Fluctuation of Duration. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Mohammad Shirali-Shahreza |
Pseudo-space Persian/Arabic text steganography. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
43 | K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal 0001, Lalit M. Patnaik |
Genetic Algorithm Based Steganography Using Wavelets. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Kenneth Sullivan, Kaushal Solanki, B. S. Manjunath, Upamanyu Madhow, Shivkumar Chandrasekaran |
Determining Achievable Rates for Secure, Zero Divergence, Steganography. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Cong Nguyen Bui, Sang Moon Yoon, Heung-Kyu Lee |
Multi Bit Plane Image Steganography. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
|
43 | N. Santosh Arjun, Atul Negi |
A High Embedding Capacity Approach to Adaptive Steganography. |
ICDIM |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs |
Implementation of LSB Steganography and Its Evaluation for Various Bits. |
ICDIM |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Michiharu Niimi, Tomohito Ei, Hideki Noda, Eiji Kawaguchi, Bruce Segee |
An attack to BPCS-steganography using complexity histogram and countermeasure. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Xiangwei Kong, Rufeng Chu, Xiaohui Ba, Ting Zhang, Deli Yang |
A Perception Evaluation Scheme for Steganography. |
IDEAL |
2003 |
DBLP DOI BibTeX RDF |
|
43 | Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter |
Spread spectrum image steganography. |
IEEE Trans. Image Process. |
1999 |
DBLP DOI BibTeX RDF |
|
43 | Scott Craver |
On Public-Key Steganography in the Presence of an Active Warden. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
|
43 | Neil F. Johnson 0001, Sushil Jajodia |
Steganalysis of Images Created Using Current Steganography Software. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Yali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal |
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Johann Barbier, Stéphanie Alt |
Practical Insecurity for Effective Steganalysis. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
practical steganalysis, security models |
40 | Christian Kraetzer, Jana Dittmann, Ronny Merkel |
WLAN steganography revisited. |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Adem Orsdemir, Oktay Altun, Gaurav Sharma 0001, Mark F. Bocko |
Steganalysis aware steganography: statistical indistinguishability despite high distortion. |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Anindya Sarkar, Kaushal Solanki, B. S. Manjunath |
Further study on YASS: steganography based on randomized embedding to resist blind steganalysis. |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Richard Bergmair |
A comprehensive bibliography of linguistic steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Andrew D. Ker |
Batch steganography and the threshold game. |
Security, Steganography, and Watermarking of Multimedia Contents |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Jessica J. Fridrich, Tomás Filler |
Practical methods for minimizing embedding impact in steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Christian Kraetzer, Jana Dittmann |
Mel-cepstrum-based steganalysis for VoIP steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Cüneyt M. Taskiran, Umut Topkara, Mercan Topkara, Edward J. Delp |
Attacks on lexical natural language steganography systems. |
Security, Steganography, and Watermarking of Multimedia Contents |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Sos S. Agaian, Benjamin M. Rodriguez, Juan P. Perez |
Stego sensitivity measure and multibit plane based steganography using different color models. |
Security, Steganography, and Watermarking of Multimedia Contents |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Christian Kraetzer, Jana Dittmann, Andreas Lang 0001 |
Transparency benchmarking on audio watermarks and steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Younhee Kim, Zoran Duric, Dana Richards |
Limited distortion in LSB steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Mark T. Hogan, Félix Balado, Neil J. Hurley, Guénolé C. M. Silvestre |
New results on robustness of secure steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon |
Improving steganalysis by fusion techniques: a case study with image steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Ying Wang 0021, Pierre Moulin |
Statistical modelling and steganalysis of DFT-based image steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Pablo Hennings, Marios Savvides, B. V. K. Vijaya Kumar |
Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers. |
Security, Steganography, and Watermarking of Multimedia Contents |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Mark T. Hogan, Neil J. Hurley, Guenole C. M. Silvestre, Félix Balado, Kevin M. Whelan |
ML detection of steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Taras Holotyak, Jessica J. Fridrich, David Soukal |
Stochastic approach to secret message length estimation in ±k embedding steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jana Dittmann, Danny Hesse, Reyk Hillert |
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. |
Security, Steganography, and Watermarking of Multimedia Contents |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak |
Forensic steganalysis: determining the stego key in spatial domain steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Jessica J. Fridrich, David Soukal, Miroslav Goljan |
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. |
Security, Steganography, and Watermarking of Multimedia Contents |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Hideki Noda, Tomofumi Furuta, Michiharu Niimi, Eiji Kawaguchi |
Video steganography based on bit-plane decomposition of wavelet-transformed video. |
Security, Steganography, and Watermarking of Multimedia Contents |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Rajarathnam Chandramouli, Shalin P. Trivedi, R. N. Uma |
On the complexity and hardness of the steganography embedding problem. |
Security, Steganography, and Watermarking of Multimedia Contents |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Toshiyuki Umeda, Ana B. Batolomeu, Filipe A. Francob, Damien Delannay, Benoît Macq |
Rate-distortion analysis of steganography for conveying stereovision disparity maps. |
Security, Steganography, and Watermarking of Multimedia Contents |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Shalin P. Trivedi, Rajarathnam Chandramouli |
Locally most-powerful detector for secret key estimation in spread spectrum image steganography. |
Security, Steganography, and Watermarking of Multimedia Contents |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Jessica J. Fridrich, Miroslav Goljan |
On estimation of secret message length in LSB steganography in spatial domain. |
Security, Steganography, and Watermarking of Multimedia Contents |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Kalavathi Alla, R. Siva Rama Prasad |
A New Approach to Hindi Text Steganography Using Matraye, Core Classification and HHK Scheme. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Hindi OCR, Information hiding, Text Steganography, Linguistic steganography |
39 | Kalavathi Alla, R. Siva Rama Prasad |
An Evolution of Hindi Text Steganography. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Hindi Text, Hindi OCR, Cryptography, Steganography, Text Steganography |
39 | Jessica J. Fridrich, Miroslav Goljan, Rui Du |
Reliable detection of LSB steganography in color and grayscale images. |
MM&Sec |
2001 |
DBLP DOI BibTeX RDF |
LSB embedding, detection of LSB steganography - algorithms, steganography, attacks, steganalysis, results |
35 | Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell |
Upper and Lower Bounds on Black-Box Steganography. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Rejection sampling, Pseudorandomnness, Huge random objects, Lower bound, Steganography, Information hiding, Covert communication |
35 | Katia Kermanidis, Emmanouil Magkos |
Empirical Paraphrasing of Modern Greek Text in Two Phases: An Application to Steganography. |
CICLing |
2009 |
DBLP DOI BibTeX RDF |
steganography, supervised learning, shallow parsing, paraphrasing |
35 | Hui Tian 0002, Ke Zhou 0001, Hong Jiang 0001, Dan Feng 0001 |
Digital logic based encoding strategies for steganography on voice-over-IP. |
ACM Multimedia |
2009 |
DBLP DOI BibTeX RDF |
steganography, VoIP, transparency, digital logic |
35 | Rongyue Zhang, Vasiliy Sachnev, Hyoung-Joong Kim |
Fast BCH Syndrome Coding for Steganography. |
Information Hiding |
2009 |
DBLP DOI BibTeX RDF |
syndrome coding, error correction code, steganography, data hiding, BCH coding |
35 | Mansour Jamzad, Zahra Zahedi Kermani |
Secure Steganography Using Gabor Filter and Neural Networks. |
Trans. Data Hiding Multim. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Texture similarity, Kohonen Neural Networks, Steganography, DCT, Image database, Gabor Filter |
35 | Jae-Gil Yu, Eun-Joon Yoon, Sang-Ho Shin, Kee-Young Yoo |
A New Image Steganography Based on 2k Correction and Edge-Detection. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
indexcolor, graycolor, image, steganography, PSNR |
35 | Hafiz Malik |
Steganalysis of QIM steganography using irregularity measure. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
kullback-liebler divergence, tsallis-divergence, steganography, steganalysis, kernel density estimation, divergence, higher-order statistics, quantization index modulation |
35 | Jessica J. Fridrich, Tomás Pevný, Jan Kodovský |
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
steganography, capacity, steganalysis, JPEG, blind steganalysis |
Displaying result #1 - #100 of 3812 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|