-
1
-
-
0032682054
-
Spread spectrum image steganography
-
L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. Image Process. 8(8), 1075-1083 (1999).
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.8
, pp. 1075-1083
-
-
Marvel, L.M.1
Boncelet Jr., C.G.2
Retter, C.T.3
-
3
-
-
0035472155
-
Deteting LSB steganography in color and gray-scale images
-
J. Fridrich, M. Goljan, and R. Du, "Deteting LSB steganography in color and gray-scale images," IEEE Trans. Multimedia 8(4), 22-28 (2001).
-
(2001)
IEEE Trans. Multimedia
, vol.8
, Issue.4
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
4
-
-
0035167458
-
Analysis of LSB based image steganography techniques
-
R. Chandramouli and N. Memon, "Analysis of LSB based image steganography techniques," Proc. Image Process. 3, 1019-1022 (2001).
-
(2001)
Proc. Image Process.
, vol.3
, pp. 1019-1022
-
-
Chandramouli, R.1
Memon, N.2
-
6
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process. 6(12), 1673-1687 (1997).
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
7
-
-
0037508344
-
Invisibility and application functionalities in perceptual watermarking-an overview
-
C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, "Invisibility and application functionalities in perceptual watermarking-An overview," Proc. IEEE 90(1), 64-77 (2002).
-
(2002)
Proc. IEEE
, vol.90
, Issue.1
, pp. 64-77
-
-
Vleeschouwer, C.D.1
Delaigle, J.F.2
Macq, B.3
-
8
-
-
0032785523
-
Hidden digital watermarks in images
-
C. T. Hsu and J. L. Wu, "Hidden digital watermarks in images," IEEE Trans. Image Process. 8(1), 58-68 (1999).
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.1
, pp. 58-68
-
-
Hsu, C.T.1
Wu, J.L.2
-
9
-
-
0345510755
-
A bi-polar multiple-base data hiding technique on information security and authentication
-
H. M. Chao and Y. S. Tsai, "A bi-polar multiple-base data hiding technique on information security and authentication," IPPR Conf. Comput. Vision, Graphics Image Process., pp. 307-313 (2000).
-
(2000)
IPPR Conf. Comput. Vision, Graphics Image Process.
, pp. 307-313
-
-
Chao, H.M.1
Tsai, Y.S.2
-
10
-
-
0033309034
-
Data hiding in image with adaptive numbers of least significant bits based on the human visual system
-
(Oct.)
-
W. N. Lie and L. C. Chang, "Data hiding in image with adaptive numbers of least significant bits based on the human visual system," IEEE Intl. Conf. Image Process., 28, 286-290 (Oct. 1999).
-
(1999)
IEEE Intl. Conf. Image Process.
, vol.28
, pp. 286-290
-
-
Lie, W.N.1
Chang, L.C.2
-
11
-
-
0034514476
-
Hiding data in images by optimal moderately-significant-bit replacement
-
R. Z. Wang, C. F. Lin, and J. C. Lin, "Hiding data in images by optimal moderately-significant-bit replacement," Electron. Lett. 36(25), 2069-2070 (2000).
-
(2000)
Electron. Lett.
, vol.36
, Issue.25
, pp. 2069-2070
-
-
Wang, R.Z.1
Lin, C.F.2
Lin, J.C.3
-
12
-
-
0344217010
-
Steganography: An efficient data hiding method
-
Y. C. Hou and Y. F. Chiao, "Steganography: an efficient data hiding method," J. Technol. 15(3), 363-372 (2000).
-
(2000)
J. Technol.
, vol.15
, Issue.3
, pp. 363-372
-
-
Hou, Y.C.1
Chiao, Y.F.2
-
13
-
-
0032206939
-
Data hiding in images via multiple-based number conversion and lossy compression
-
D. C. Wu and W. H. Tsai, "Data hiding in images via multiple-based number conversion and lossy compression," IEEE Trans. Consum. Electron. 44(4), 1406-1412 (1998).
-
(1998)
IEEE Trans. Consum. Electron.
, vol.44
, Issue.4
, pp. 1406-1412
-
-
Wu, D.C.1
Tsai, W.H.2
-
14
-
-
0032187555
-
A virtual image cryptosystem based upon vector quantization
-
T. S. Chen, C. C. Chang, and M. S. Hwang, "A virtual image cryptosystem based upon vector quantization," IEEE Trans. Image Process. 7(10), 1485-1488 (1998).
-
(1998)
IEEE Trans. Image Process.
, vol.7
, Issue.10
, pp. 1485-1488
-
-
Chen, T.S.1
Chang, C.C.2
Hwang, M.S.3
-
15
-
-
0032631520
-
Low-complexity fractal-based image compression using two-stage search strategy
-
(June)
-
C. C. Wang and C. C. Chen, "Low-complexity fractal-based image compression using two-stage search strategy," Opt. Eng. 38(6), 1006-1013 (June 1999).
-
(1999)
Opt. Eng.
, vol.38
, Issue.6
, pp. 1006-1013
-
-
Wang, C.C.1
Chen, C.C.2
-
16
-
-
0017018484
-
New directions in cryptograph
-
(Nov.)
-
W. Diffie and M. E. Hellman, "New directions in cryptograph," IEEE Trans. Inf. Theory IT-22, 644-654 (Nov. 1976).
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
17
-
-
0031335088
-
Fast public-key watermarking of compressed video
-
(Oct.)
-
F. Hartung and B. Girod, "Fast public-key watermarking of compressed video," IEEE Intl. Conf. Image Process. 1, 528-531 (Oct. 1997).
-
(1997)
IEEE Intl. Conf. Image Process.
, vol.1
, pp. 528-531
-
-
Hartung, F.1
Girod, B.2
-
18
-
-
0344217013
-
The RSA algorithm
-
Prentice Hall International Edition, pp. 173-183, Prentice Hall, New York
-
W. Stallings, "The RSA algorithm" in Cryptograph and Network Security Principle and Practice, 2nd ed., Prentice Hall International Edition, pp. 173-183, Prentice Hall, New York (1999).
-
(1999)
Cryptograph and Network Security Principle and Practice, 2nd Ed.
-
-
Stallings, W.1
-
19
-
-
0028526033
-
Security of RSA-type cryptoystem over elliptic curves against Hastad attack
-
H. Kuwakado and K. Koyama, "Security of RSA-type cryptoystem over elliptic curves against Hastad attack," Electron. Lett. 30(22), 1843-1844 (1994).
-
(1994)
Electron. Lett.
, vol.30
, Issue.22
, pp. 1843-1844
-
-
Kuwakado, H.1
Koyama, K.2
-
21
-
-
0029540975
-
Security estimates for 512-bit RSA
-
M. J. B. Robshaw, "Security estimates for 512-bit RSA," WESCON'95 Conf. Record, pp. 409-412 (1995).
-
(1995)
WESCON'95 Conf. Record
, pp. 409-412
-
-
Robshaw, M.J.B.1
|