Conferences in DBLP
Junhui He , Jiwu Huang , Guoping Qiu A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:1-14 [Conf ] Ingemar J. Cox , Ton Kalker , Georg Pakura , Mathias Scheel Information Transmission and Steganography. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:15-29 [Conf ] Valery I. Korzhik , Guillermo Morales-Luna , Moon Ho Lee On the Existence of Perfect Stegosystems. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:30-38 [Conf ] Tomás Pevný , Jessica J. Fridrich Towards Multi-class Blind Steganalyzer for JPEG Images. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:39-53 [Conf ] Seunglim Yong , Sang-Ho Lee An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:54-66 [Conf ] Yan Zhu , Dengguo Feng , Wei Zou Collusion Secure Convolutional Spread Spectrum Fingerprinting. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:67-83 [Conf ] Shan He , Min Wu Performance Study on Multimedia Fingerprinting Employing Traceability Codes. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:84-96 [Conf ] Negar Kiyavash , Pierre Moulin Regular Simplex Fingerprints and Their Optimality Properties. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:97-109 [Conf ] Jiangqun Ni , Rongyue Zhang , Jiwu Huang , Chuntao Wang A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:110-123 [Conf ] Xingliang Huang , Bo Zhang Robust Detection of Transform Domain Additive Watermarks. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:124-138 [Conf ] Xiangui Kang , Yun Q. Shi , Jiwu Huang , Wenjun Zeng Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:139-146 [Conf ] P. Vinod , P. K. Bora A New Inter-frame Collusion Attack and a Countermeasure. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:147-157 [Conf ] Roberto Caldelli , Alessandro Piva , Mauro Barni , Andrea Carboni Effectiveness of ST-DM Watermarking Against Intra-video Collusion. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:158-170 [Conf ] Ilaria Venturini Oracle Attacks and Covert Channels. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:171-185 [Conf ] Patrick Bas , Jarmo Hurri Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:186-200 [Conf ] Teddy Furon A Survey of Watermarking Security. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:201-215 [Conf ] Gwenaël J. Doërr , Jean-Luc Dugelay Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:216-230 [Conf ] Miguel Soriano , Marcel Fernandez , Josep Cotrina Navau Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:231-243 [Conf ] José-Emilio Vila-Forcén , Sviatoslav Voloshynovskiy , Oleksiy J. Koval , Fernando Pérez-González , Thierry Pun Practical Data-Hiding: Additive Attacks Performance Analysis. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:244-259 [Conf ] Pedro Comesaña , Luis Pérez-Freire , Fernando Pérez-González The Return of the Sensitivity Attack. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:260-274 [Conf ] In-Gook Chun Look Up Table(LUT) Method for Halftone Image Watermarking. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:275-285 [Conf ] Sergio Vicente Denser Pamboukian , Hae Yong Kim New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:286-298 [Conf ] Balaji Venkatachalam Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:299-312 [Conf ] Min-Su Kim , Sébastien Valette , Ho-Youl Jung , Rémy Prost Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:313-324 [Conf ] Marcos de Castro Pacitti , Weiler Alves Finamore Digital Watermarking Robustness and Fragility Characteristics: New Modelling and Coding Influence. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:325-335 [Conf ] Félix Balado New Geometric Analysis of Spread-Spectrum Data Hiding with Repetition Coding, with Implications for Side-Informed Schemes. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:336-350 [Conf ] Andrea Abrardo , Mauro Barni , Fernando Pérez-González , Carlos Mosquera Trellis-Coded Rational Dither Modulation for Digital Watermarking. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:351-360 [Conf ] Wei Sun , En-Hui Yang Closed-Form Formulas for Private Watermarking Capacities of Laplacian Sources with the Magnitude-Error Distortion Measure and Under Additive Attacks. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:361-371 [Conf ] Pierre Moulin , Ying Wang Improved QIM Strategies for Gaussian Watermarking. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:372-386 [Conf ] Mark T. Hogan , Félix Balado , Neil J. Hurley , Guenole C. M. Silvestre On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:387-402 [Conf ] Marcos de Castro Pacitti , Weiler Alves Finamore Performance Lower Bounds for Existing and New Uncoded Digital Watermarking Modulation Techniques. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:403-417 [Conf ] Hae-Yeoun Lee , In Koo Kang , Heung-Kyu Lee , Young-Ho Suh Evaluation of Feature Extraction Techniques for Robust Watermarking. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:418-431 [Conf ] Patrizio Campisi , Alessandro Neri Perceptual Video Watermarking in the 3D-DWT Domain Using a Multiplicative Approach. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:432-443 [Conf ] Amir Houman Sadr , Shahrokh Ghaemmaghami Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:444-458 [Conf ] Angela S. L. Wong , Matthew Sorell , Robert Clarke Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:459-469 [Conf ] Mercan Topkara , Ashish Kamra , Mikhail J. Atallah , Cristina Nita-Rotaru ViWiD : Visible Watermarking Based Defense Against Phishing. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:470-483 [Conf ]