The SCEAS System
Navigation Menu

Conferences in DBLP

Information Hiding Workshop (ih)
2004 (conf/ih/2004)

  1. Scott Craver, Bede Liu, Wayne Wolf
    An Implementation of, and Attacks on, Zero-Knowledge Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:1-12 [Conf]
  2. Qiming Li, Ee-Chien Chang
    On the Possibility of Non-invertible Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:13-24 [Conf]
  3. Dariusz Bogumil
    Reversing Global and Local Geometrical Distortions in Image Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:25-37 [Conf]
  4. Wei Sun, En-Hui Yang
    On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:38-51 [Conf]
  5. Andrea Abrardo, Mauro Barni
    Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:52-66 [Conf]
  6. Jessica J. Fridrich
    Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:67-81 [Conf]
  7. Rainer Böhme, Andreas Westfeld
    Exploiting Preserved Statistics for Steganalysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:82-96 [Conf]
  8. Andrew D. Ker
    Improved Detection of LSB Steganography in Grayscale Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:97-115 [Conf]
  9. Peizhong Lu, Xiangyang Luo, Qingyang Tang, Li Shen
    An Improved Sample Pairs Method for Detection of LSB Embedding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:116-127 [Conf]
  10. Alin C. Popescu, Hany Farid
    Statistical Tools for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:128-147 [Conf]
  11. Jennifer L. Wong, Miodrag Potkonjak
    Relative Generic Computational Forensic Techniques. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:148-163 [Conf]
  12. Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin
    Syntax and Semantics-Preserving Application-Layer Protocol Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:164-179 [Conf]
  13. Igor A. Bolshakov
    A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:180-191 [Conf]
  14. Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend
    Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:192-207 [Conf]
  15. Jasvir Nagra, Clark D. Thomborson
    Threading Software Watermarks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:208-223 [Conf]
  16. Lin Yuan, Pushkin R. Pari, Gang Qu
    Soft IP Protection: Watermarking HDL Codes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:224-238 [Conf]
  17. Markus G. Kuhn
    An Asymmetric Security Mechanism for Navigation Signals. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:239-252 [Conf]
  18. Jae-Gwi Choi, Ji-Hwan Park, Ki-Ryong Kwon
    Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:253-265 [Conf]
  19. Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao
    Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:266-281 [Conf]
  20. Hirofumi Muratani
    Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:282-292 [Conf]
  21. George Danezis, Andrei Serjantov
    Statistical Disclosure or Intersection Attacks on Anonymity Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:293-308 [Conf]
  22. Claudia Díaz, Bart Preneel
    Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:309-325 [Conf]
  23. Dogan Kesdogan, Lexi Pimenidis
    The Hitting Set Attack on Anonymity Protocols. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:326-339 [Conf]
  24. Lin Yuan, Gang Qu
    Information Hiding in Finite State Machine. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:340-354 [Conf]
  25. Steven J. Murdoch, Piotr Zielinski
    Covert Channels for Collusion in Online Computer Games. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:355-370 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002