-
2
-
-
0017930809
-
A method for obtaining digital signature and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signature and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
3
-
-
0032680807
-
Information hiding-a survey
-
July
-
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information hiding-a survey," Proc. IEEE, vol. 7, pp. 1062-1078, July 1999.
-
(1999)
Proc. IEEE
, vol.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
5
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Syst. J., vol. 35, pp. 313-336, 1996.
-
(1996)
IBM Syst. J.
, vol.35
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
6
-
-
0000370347
-
Video-steganography: How to secretly embed a signature in a picture
-
K. Matsui and K. Tanaka, "Video-steganography: How to secretly embed a signature in a picture," in Proc. IMA Intellectual Property Project, vol. 1, 1994, pp. 187-205.
-
(1994)
Proc. IMA Intellectual Property Project
, vol.1
, pp. 187-205
-
-
Matsui, K.1
Tanaka, K.2
-
7
-
-
0032682054
-
Spread spectrum image steganography
-
Aug.
-
L. M. Marvel, C. G. Boncelet, and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. Image Processing, vol. 8, pp. 1075-1083, Aug. 1999.
-
(1999)
IEEE Trans. Image Processing
, vol.8
, pp. 1075-1083
-
-
Marvel, L.M.1
Boncelet, C.G.2
Retter, C.T.3
-
8
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
9
-
-
0034483631
-
Cocktail watermarking for digital image protection
-
Dec.
-
C.-S. Lu, S.-K. Huang, C.-J. Sze, and H.-Y. M. Liao, "Cocktail watermarking for digital image protection," IEEE Trans. Multimedia, vol. 2, pp. 209-224, Dec. 2000.
-
(2000)
IEEE Trans. Multimedia
, vol.2
, pp. 209-224
-
-
Lu, C.-S.1
Huang, S.-K.2
Sze, C.-J.3
Liao, H.-Y.M.4
-
10
-
-
0034140535
-
Fault resilient and compression tolerant digital signature for image authentication
-
Feb.
-
D.-C. Lou and J.-L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Trans. Consumer Electron., vol. 46, pp. 31-39, Feb. 2000.
-
(2000)
IEEE Trans. Consumer Electron.
, vol.46
, pp. 31-39
-
-
Lou, D.-C.1
Liu, J.-L.2
-
11
-
-
0035421311
-
Adaptive digital watermarking using fuzzy clustering technique
-
Aug.
-
D.-C. Lou and T.-L. Yin, "Adaptive digital watermarking using fuzzy clustering technique," IEICE Trans. Fund. Electron., Commun., Comput. Sci., vol. E84-A, no. 8, pp. 2052-2060, Aug. 2001.
-
(2001)
IEICE Trans. Fund. Electron., Commun., Comput. Sci.
, vol.E84-A
, Issue.8
, pp. 2052-2060
-
-
Lou, D.-C.1
Yin, T.-L.2
-
12
-
-
84962642939
-
Watermarking applications and their properties
-
Mar.
-
I. J. Cox, M. L. Miller, and J. A. Bloom, "Watermarking applications and their properties," in Proc. Int. Conf. Information Technology: Coding and Computing 2000, Mar. 2000, pp. 6-10.
-
(2000)
Proc. Int. Conf. Information Technology: Coding and Computing 2000
, pp. 6-10
-
-
Cox, I.J.1
Miller, M.L.2
Bloom, J.A.3
-
13
-
-
0001217738
-
The prisoners' problem and the subliminal channels
-
Santa Barbara, CA
-
G. J. Simmons, "The prisoners' problem and the subliminal channels," in Proc. Annu. Int. Cryptology Conf., Santa Barbara, CA, 1984, pp. 51-67.
-
(1984)
Proc. Annu. Int. Cryptology Conf.
, pp. 51-67
-
-
Simmons, G.J.1
-
15
-
-
0000657882
-
Period of a discrete cat mapping
-
Aug.-Sept.
-
F. J. Dyson and H. Falk, "Period of a discrete cat mapping," Amer. Math. Mon., vol. 99, pp. 603-624, Aug.-Sept. 1992.
-
(1992)
Amer. Math. Mon.
, vol.99
, pp. 603-624
-
-
Dyson, F.J.1
Falk, H.2
-
17
-
-
0009237032
-
On the signature reblocking problem in public-key cryptosystem
-
L. M. Konfelder, "On the signature reblocking problem in public-key cryptosystem," Commun. ACM, vol. 21, no. 2, p. 179, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 179
-
-
Konfelder, L.M.1
-
18
-
-
84957886335
-
Modeling the security of steganographic systems
-
Apr.
-
J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the security of steganographic systems," in Proc. Second Workshop on Information Hiding, Apr. 1998, pp. 344-354.
-
(1998)
Proc. Second Workshop on Information Hiding
, pp. 344-354
-
-
Zollner, J.1
Federrath, H.2
Klimant, H.3
Pfitzmann, A.4
Piotraschke, R.5
Westfeld, A.6
Wicke, G.7
Wolf, G.8
-
19
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Apr.
-
N. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in Proc. Second Workshop on Information Hiding, Apr. 1998, pp. 273-289.
-
(1998)
Proc. Second Workshop on Information Hiding
, pp. 273-289
-
-
Johnson, N.1
Jajodia, S.2
-
21
-
-
0030143030
-
Fast exponentiation method obtained by folding the exponent in half
-
May
-
D.-C. Lou and C.-C. Chang, "Fast exponentiation method obtained by folding the exponent in half," Electron. Lett., vol. 32, no. 11, pp. 984-985, May 1996.
-
(1996)
Electron. Lett.
, vol.32
, Issue.11
, pp. 984-985
-
-
Lou, D.-C.1
Chang, C.-C.2
|