Conferences in DBLP
Ingemar J. Cox , Gwenaël J. Doërr , Teddy Furon Watermarking Is Not Cryptography. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:1-15 [Conf ] Ton Kalker , Michael Malkin Secure Quantization Index Modulation Watermark Detection. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:16-18 [Conf ] Andreas Westfeld Steganalysis in the Presence of Weak Cryptography and Encoding. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:19-34 [Conf ] Kwangsoo Lee , Andreas Westfeld , Sangjin Lee Category Attack for LSB Steganalysis of JPEG Images. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:35-48 [Conf ] Guorong Xuan , Yun Q. Shi , Cong Huang , Dongdong Fu , Xiuming Zhu , Peiqi Chai , Jianjiong Gao Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA). [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:49-60 [Conf ] Bui Cong Nguyen , Sang Moon Yoon , Heung-Kyu Lee Multi Bit Plane Image Steganography. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:61-70 [Conf ] Zhe-Ming Lu , Hao Luo , Jeng-Shyang Pan Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:71-81 [Conf ] Anja Keskinarkaus , Anu Pramila , Tapio Seppänen , Jaakko J. Sauvola Wavelet Domain Print-Scan and JPEG Resilient Data Hiding Method. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:82-95 [Conf ] C. Culnane , H. Treharne , Anthony T. S. Ho A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:96-110 [Conf ] Xinshan Zhu , Zhi Tang , Liesen Yang A Novel Multibit Watermarking Scheme Combining Spread Spectrum and Quantization. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:111-122 [Conf ] Min-Su Kim , Jae-Won Cho , Rémy Prost , Ho-Youl Jung Wavelet Analysis Based Blind Watermarking for 3-D Surface Meshes. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:123-137 [Conf ] Suk Hwan Lee , Ki-Ryong Kwon , Dong Kyue Kim Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:138-149 [Conf ] Liesen Yang , Zongming Guo A Robust Video Watermarking Scheme Via Temporal Segmentation and Middle Frequency Component Adaptive Modification. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:150-161 [Conf ] Ivan Damnjanovic , Ebroul Izquierdo Capacity Enhancement of Compressed Domain Watermarking Channel Using Duo-binary Coding. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:162-176 [Conf ] Dongdong Fu , Yun Q. Shi , Wei Su Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:177-187 [Conf ] Goo-Rak Kwon , Kwan-Hee Lee , Sang-Jae Nam , Sung-Jea Ko Intellectual Property Rights Management Using Combination Encryption in MPEG-4. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:188-196 [Conf ] Dekun Zou , Jun Tian , Jeffrey Bloom , Jiefu Zhai Data Hiding in Film Grain. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:197-211 [Conf ] Chao-Yong Hsu , Chun-Shien Lu , Soo-Chang Pei Joint Screening Halftoning and Visual Cryptography for Image Protection. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:212-225 [Conf ] Shijun Xiang , Jiwu Huang , Rui Yang , Chuntao Wang , Hongmei Liu Robust Audio Watermarking Based on Low-Order Zernike Moments. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:226-240 [Conf ] Siho Kim , Keun-Sung Bae Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:241-252 [Conf ] Johann Barbier , Eric Filiol , Kichenakoumar Mayoura Universal JPEG Steganalysis in the Compressed Frequency Domain. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:253-267 [Conf ] Hwajong Oh , Kwangsoo Lee , Sangjin Lee Attack on JPEG2000 Steganography Using LRCA. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:268-281 [Conf ] Gaurav Gupta , Josef Pieprzyk A Low-Cost Attack on Branch-Based Software Watermarking Schemes. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:282-293 [Conf ] Chaw-Seng Woo , Jiang Du , Binh Pham Geometric Invariant Domain for Image Watermarking. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:294-307 [Conf ] Zhongxuan Liu , Shiguo Lian , Ronggang Wang , Zhen Ren Desynchronization in Compression Process for Collusion Resilient Video Fingerprint. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:308-322 [Conf ] Guorong Xuan , Qiuming Yao , Chengyun Yang , Jianjiong Gao , Peiqi Chai , Yun Q. Shi , Zhicheng Ni Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:323-332 [Conf ] Yongjian Hu , Byeungwoo Jeon , Zhiquan Lin , Hui Yang Analysis and Comparison of Typical Reversible Watermarking Methods. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:333-347 [Conf ] JinHa Hwang , Jong-Weon Kim , Jong-Uk Choi A Reversible Watermarking Based on Histogram Shifting. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:348-361 [Conf ] Younhee Kim , Zoran Duric , Dana Richards Towards Lower Bounds on Embedding Distortion in Information Hiding. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:362-376 [Conf ] Goo-Rak Kwon , Seung-Won Jung , Sang-Jae Nam , Sung-Jea Ko Improved Differential Energy Watermarking for Embedding Watermark. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:377-386 [Conf ] Chih-Chieh Liu , Yu-Feng Kuo , Chun-Hsiang Huang , Ja-Ling Wu A Colorization Based Animation Broadcast System with Traitor Tracing Capability. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:387-396 [Conf ] Hyun Park , Sung Hyun Lee , Young Shik Moon Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:397-406 [Conf ] Yong Geun Won , Tae Meon Bae , Yong Man Ro Scalable Protection and Access Control in Full Scalable Video Coding. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:407-421 [Conf ] Hong-jie He , Jiashu Zhang , Heng-Ming Tai A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:422-432 [Conf ] Aweke N. Lemma , Stefan Katzenbeisser , Mehmet Utku Celik , Michiel van der Veen Secure Watermark Embedding Through Partial Encryption. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:433-445 [Conf ] Jiangqun Ni , Rongyue Zhang , Jiwu Huang , Chuntao Wang , Quanbo Li A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:446-460 [Conf ] Shuiming Ye , Qibin Sun , Ee-Chien Chang Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:461-472 [Conf ]