Conferences in DBLP
Scott Craver , Bede Liu , Wayne Wolf An Implementation of, and Attacks on, Zero-Knowledge Watermarking. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:1-12 [Conf ] Qiming Li , Ee-Chien Chang On the Possibility of Non-invertible Watermarking Schemes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:13-24 [Conf ] Dariusz Bogumil Reversing Global and Local Geometrical Distortions in Image Watermarking. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:25-37 [Conf ] Wei Sun , En-Hui Yang On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:38-51 [Conf ] Andrea Abrardo , Mauro Barni Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:52-66 [Conf ] Jessica J. Fridrich Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:67-81 [Conf ] Rainer Böhme , Andreas Westfeld Exploiting Preserved Statistics for Steganalysis. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:82-96 [Conf ] Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:97-115 [Conf ] Peizhong Lu , Xiangyang Luo , Qingyang Tang , Li Shen An Improved Sample Pairs Method for Detection of LSB Embedding. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:116-127 [Conf ] Alin C. Popescu , Hany Farid Statistical Tools for Digital Forensics. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:128-147 [Conf ] Jennifer L. Wong , Miodrag Potkonjak Relative Generic Computational Forensic Techniques. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:148-163 [Conf ] Norka B. Lucena , James Pease , Payman Yadollahpour , Steve J. Chapin Syntax and Semantics-Preserving Application-Layer Protocol Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:164-179 [Conf ] Igor A. Bolshakov A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:180-191 [Conf ] Christian S. Collberg , Andrew Huntwork , Edward Carter , Gregg M. Townsend Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:192-207 [Conf ] Jasvir Nagra , Clark D. Thomborson Threading Software Watermarks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:208-223 [Conf ] Lin Yuan , Pushkin R. Pari , Gang Qu Soft IP Protection: Watermarking HDL Codes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:224-238 [Conf ] Markus G. Kuhn An Asymmetric Security Mechanism for Navigation Signals. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:239-252 [Conf ] Jae-Gwi Choi , Ji-Hwan Park , Ki-Ryong Kwon Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:253-265 [Conf ] Xinwen Fu , Bryan Graham , Dong Xuan , Riccardo Bettati , Wei Zhao Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:266-281 [Conf ] Hirofumi Muratani Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:282-292 [Conf ] George Danezis , Andrei Serjantov Statistical Disclosure or Intersection Attacks on Anonymity Systems. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:293-308 [Conf ] Claudia Díaz , Bart Preneel Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:309-325 [Conf ] Dogan Kesdogan , Lexi Pimenidis The Hitting Set Attack on Anonymity Protocols. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:326-339 [Conf ] Lin Yuan , Gang Qu Information Hiding in Finite State Machine. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:340-354 [Conf ] Steven J. Murdoch , Piotr Zielinski Covert Channels for Collusion in Online Computer Games. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:355-370 [Conf ]