The SCEAS System
Navigation Menu

Conferences in DBLP

International Workshop on Digital Watermarking (iwdw)
2005 (conf/iwdw/2005)

  1. Junhui He, Jiwu Huang, Guoping Qiu
    A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:1-14 [Conf]
  2. Ingemar J. Cox, Ton Kalker, Georg Pakura, Mathias Scheel
    Information Transmission and Steganography. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:15-29 [Conf]
  3. Valery I. Korzhik, Guillermo Morales-Luna, Moon Ho Lee
    On the Existence of Perfect Stegosystems. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:30-38 [Conf]
  4. Tomás Pevný, Jessica J. Fridrich
    Towards Multi-class Blind Steganalyzer for JPEG Images. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:39-53 [Conf]
  5. Seunglim Yong, Sang-Ho Lee
    An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:54-66 [Conf]
  6. Yan Zhu, Dengguo Feng, Wei Zou
    Collusion Secure Convolutional Spread Spectrum Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:67-83 [Conf]
  7. Shan He, Min Wu
    Performance Study on Multimedia Fingerprinting Employing Traceability Codes. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:84-96 [Conf]
  8. Negar Kiyavash, Pierre Moulin
    Regular Simplex Fingerprints and Their Optimality Properties. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:97-109 [Conf]
  9. Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang
    A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:110-123 [Conf]
  10. Xingliang Huang, Bo Zhang
    Robust Detection of Transform Domain Additive Watermarks. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:124-138 [Conf]
  11. Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng
    Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:139-146 [Conf]
  12. P. Vinod, P. K. Bora
    A New Inter-frame Collusion Attack and a Countermeasure. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:147-157 [Conf]
  13. Roberto Caldelli, Alessandro Piva, Mauro Barni, Andrea Carboni
    Effectiveness of ST-DM Watermarking Against Intra-video Collusion. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:158-170 [Conf]
  14. Ilaria Venturini
    Oracle Attacks and Covert Channels. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:171-185 [Conf]
  15. Patrick Bas, Jarmo Hurri
    Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:186-200 [Conf]
  16. Teddy Furon
    A Survey of Watermarking Security. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:201-215 [Conf]
  17. Gwenaël J. Doërr, Jean-Luc Dugelay
    Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:216-230 [Conf]
  18. Miguel Soriano, Marcel Fernandez, Josep Cotrina Navau
    Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:231-243 [Conf]
  19. José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun
    Practical Data-Hiding: Additive Attacks Performance Analysis. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:244-259 [Conf]
  20. Pedro Comesaña, Luis Pérez-Freire, Fernando Pérez-González
    The Return of the Sensitivity Attack. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:260-274 [Conf]
  21. In-Gook Chun
    Look Up Table(LUT) Method for Halftone Image Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:275-285 [Conf]
  22. Sergio Vicente Denser Pamboukian, Hae Yong Kim
    New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:286-298 [Conf]
  23. Balaji Venkatachalam
    Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:299-312 [Conf]
  24. Min-Su Kim, Sébastien Valette, Ho-Youl Jung, Rémy Prost
    Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:313-324 [Conf]
  25. Marcos de Castro Pacitti, Weiler Alves Finamore
    Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:325-335 [Conf]
  26. Félix Balado
    New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:336-350 [Conf]
  27. Andrea Abrardo, Mauro Barni, Fernando Pérez-González, Carlos Mosquera
    Trellis-Coded Rational Dither Modulation for Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:351-360 [Conf]
  28. Wei Sun, En-Hui Yang
    Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:361-371 [Conf]
  29. Pierre Moulin, Ying Wang
    Improved QIM Strategies for Gaussian Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:372-386 [Conf]
  30. Mark T. Hogan, Félix Balado, Neil J. Hurley, Guenole C. M. Silvestre
    On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:387-402 [Conf]
  31. Marcos de Castro Pacitti, Weiler Alves Finamore
    Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:403-417 [Conf]
  32. Hae-Yeoun Lee, In Koo Kang, Heung-Kyu Lee, Young-Ho Suh
    Evaluation of Feature Extraction Techniques for Robust Watermarking. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:418-431 [Conf]
  33. Patrizio Campisi, Alessandro Neri
    Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:432-443 [Conf]
  34. Amir Houman Sadr, Shahrokh Ghaemmaghami
    Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:444-458 [Conf]
  35. Angela S. L. Wong, Matthew Sorell, Robert Clarke
    Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:459-469 [Conf]
  36. Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru
    ViWiD : Visible Watermarking Based Defense Against Phishing. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:470-483 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002