-
1
-
-
0032307120
-
Using the fractal code to watermark images
-
Bas P. Chassery J.-M. Davoine F. Using the fractal code to watermark images Proc. ICIP 1 1998 469-473
-
(1998)
Proc. ICIP
, vol.1
, pp. 469-473
-
-
Bas, P.1
Chassery, J.-M.2
Davoine, F.3
-
2
-
-
0036709226
-
Geometrically invariant watermarking using feature points
-
Bas P. Chassery J.-M. Macq B. Geometrically invariant watermarking using feature points IEEE Trans. Image Process. 11 9 2002 1014-1028
-
(2002)
IEEE Trans. Image Process.
, vol.11
, Issue.9
, pp. 1014-1028
-
-
Bas, P.1
Chassery, J.-M.2
Macq, B.3
-
5
-
-
0032187555
-
A virtual image cryptosystem based upon vector quantization
-
Chen T.-S. Chang C.-C. Hwang M.-S. A virtual image cryptosystem based upon vector quantization IEEE Trans. Image Process. 7 10 1998 1485-1488
-
(1998)
IEEE Trans. Image Process.
, vol.7
, Issue.10
, pp. 1485-1488
-
-
Chen, T.-S.1
Chang, C.-C.2
Hwang, M.-S.3
-
8
-
-
0347390532
-
Applications of data hiding in digital images
-
Brisbane, Australia, August 1999
-
Fridrich, J., 1999a. Applications of data hiding in digital images. Tutorial for The ISSPA'99, Brisbane, Australia, August 1999
-
(1999)
Tutorial for The ISSPA'99
-
-
Fridrich, J.1
-
9
-
-
1542363250
-
-
IS-T PICS, Savannah, Georgia, 25-28 April 1999
-
Fridrich, J., 1999b. A new steganographic method for palette-based images. IS-T PICS, Savannah, Georgia, 25-28 April 1999, pp. 285-289
-
(1999)
A New Steganographic Method for Palette-based Images
, pp. 285-289
-
-
Fridrich, J.1
-
10
-
-
84940448623
-
Secure steganographic methods for palette images
-
LNCS New York: Springer-Verlag
-
Fridrich J. Du J. Secure steganographic methods for palette images Proc. the Third Inform. Hiding Workshop LNCS vol. 1768 2000 47-60 Springer-Verlag New York
-
(2000)
Proc. the Third Inform. Hiding Workshop
, vol.1768
, pp. 47-60
-
-
Fridrich, J.1
Du, J.2
-
11
-
-
35248884299
-
Steganalysis of JPEG Images: Breaking the F5 Algorithm
-
Noordwijkerhout, The Netherlands, October 2002
-
Fridrich, J., Goljan, M., Hogea, D., 2002. Steganalysis of JPEG Images: Breaking the F5 Algorithm, 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, October 2002, pp. 310-323
-
(2002)
5th Information Hiding Workshop
, pp. 310-323
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
12
-
-
0030383845
-
Hidden signatures in images
-
Hsu C.-T. Wu J.-L. Hidden signatures in images Proc. ICIP 1996 223-226
-
(1996)
Proc. ICIP
, pp. 223-226
-
-
Hsu, C.-T.1
Wu, J.-L.2
-
13
-
-
0032292654
-
A digital watermark based on wavelet transform and its robustness on image processing
-
Inoue H. Miyazaki A. Yamamoto A. Katsura T. A digital watermark based on wavelet transform and its robustness on image processing Proc. ICIP 2 1998 391-395
-
(1998)
Proc. ICIP
, vol.2
, pp. 391-395
-
-
Inoue, H.1
Miyazaki, A.2
Yamamoto, A.3
Katsura, T.4
-
14
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
LNCS Springer-Verlag
-
Johnson N.F. Jajodia S. Steganalysis of images created using current steganography software Proc. the Second Inform. Hiding Workshop LNCS vol. 1525 1998 273-289 Springer-Verlag
-
(1998)
Proc. the Second Inform. Hiding Workshop
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
15
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
February
-
Johnson N.F. Jajodia S. Exploring steganography: seeing the unseen IEEE Comput. February 1998 26-34
-
(1998)
IEEE Comput.
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
17
-
-
85030922355
-
-
Gifshuffle 2.0. Available from
-
Kwan, M., 2003. Gifshuffle 2.0. Available from
-
(2003)
-
-
Kwan, M.1
-
19
-
-
85030921276
-
-
EZ Stego, Stego Online, Stego. Available from
-
Machado, R., 1997. EZ Stego, Stego Online, Stego. Available from
-
(1997)
-
-
Machado, R.1
-
23
-
-
0030385474
-
Phase watermarking of digital images
-
Solachidis V. Boland F.M. Phase watermarking of digital images Proc. ICIP 3 1996 239-242
-
(1996)
Proc. ICIP
, vol.3
, pp. 239-242
-
-
Solachidis, V.1
Boland, F.M.2
-
24
-
-
0035510211
-
Circularly symmetric watermark embedding in 2-D DFT domain
-
Solachidis V. Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain IEEE Trans. Image Process. 10 11 2001 1741-1753
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.11
, pp. 1741-1753
-
-
Solachidis, V.1
Pitas, I.2
-
26
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
Wu D.C. Tsai W.H. A steganographic method for images by pixel-value differencing Pattern Recognition Lett. 24 2003 1613-1626
-
(2003)
Pattern Recognition Lett.
, vol.24
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
|