-
1
-
-
33947612811
-
Steganography: Past, Present, Future
-
November 30, last visited: 1 May
-
J.C. Judge, "Steganography: Past, Present, Future", SANS white paper, November 30, 2001, http://www.sans.org/rr/papers/index.php? id=552, last visited: 1 May 2006.
-
(2001)
SANS white paper
-
-
Judge, J.C.1
-
2
-
-
0035167458
-
Analysis of LSB based image Steganography techniques
-
7-10 Oct
-
R. Chandramouli, and N. Memon, "Analysis of LSB based image Steganography techniques", Proceedings of the International Conference on Image Processing, vol. 3, 7-10 Oct. 2001, pp. 1019-1022.
-
(2001)
Proceedings of the International Conference on Image Processing
, vol.3
, pp. 1019-1022
-
-
Chandramouli, R.1
Memon, N.2
-
3
-
-
22944479005
-
An Improved Method for Steganography on Mobile Phone
-
July
-
M. Shirali Shahreza, "An Improved Method for Steganography on Mobile Phone", WSEAS Transactions on Systems, vol. 4, Issue 7, July 2005, pp. 955-957.
-
(2005)
WSEAS Transactions on Systems
, vol.4
, Issue.7
, pp. 955-957
-
-
Shirali Shahreza, M.1
-
4
-
-
0037399652
-
A Guide Tour of Video Watermarking
-
G. Doërr and J.L. Dugelay, "A Guide Tour of Video Watermarking", Signal Processing: Image Communication, vol. 18, Issue 4, 2003, pp. 263-282.
-
(2003)
Signal Processing: Image Communication
, vol.18
, Issue.4
, pp. 263-282
-
-
Doërr, G.1
Dugelay, J.L.2
-
5
-
-
4744367575
-
Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing
-
G. Doërr and J.L. Dugelay, "Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking", IEEE Transactions on Signal Processing, Supplement on Secure Media, vol. 52, Issue 10, 2004, pp. 2955-2964.
-
(2004)
Supplement on Secure Media
, vol.52
, Issue.10
, pp. 2955-2964
-
-
Doërr, G.1
Dugelay, J.L.2
-
6
-
-
0141701930
-
Audio steganography using bit modification
-
6-10 April
-
K. Gopalan, "Audio steganography using bit modification", Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP '03), vol. 2, 6-10 April 2003, pp. 421-424.
-
(2003)
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP '03)
, vol.2
, pp. 421-424
-
-
Gopalan, K.1
-
7
-
-
0029394108
-
Electronic Marking and Identification Techniques to Discourage Document Copying
-
October
-
J.T. Brassil, S. Low, N.F. Maxemchuk, and L. O'Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying", IEEE Journal on Selected Areas in Communications, vol. 13, Issue. 8, October 1995, pp. 1495-1504.
-
(1995)
IEEE Journal on Selected Areas in Communications
, vol.13
, Issue.8
, pp. 1495-1504
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
O'Gorman, L.4
-
8
-
-
0030384775
-
Techniques for data hiding
-
Issues 3&4
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding", IBM Systems Journal, vol. 35, Issues 3&4, 1996, pp. 313-336.
-
(1996)
IBM Systems Journal
, vol.35
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
9
-
-
0031384941
-
Marking Text Documents
-
Santa Barbara, CA, USA, Oct. 26-29
-
N. F. Maxemchuk and S. Low, "Marking Text Documents", Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, CA, USA, Oct. 26-29, 1997, pp. 13-16.
-
(1997)
Proceedings of the IEEE International Conference on Image Processing
, pp. 13-16
-
-
Maxemchuk, N.F.1
Low, S.2
-
10
-
-
33646845990
-
Steganography and Steganalysis
-
May 15, last visited: 1 May
-
T. Moerland, "Steganography and Steganalysis", May 15, 2003, www.liacs.nl/home/tmoerlan/privtech.pdf. last visited: 1 May 2006.
-
(2003)
-
-
Moerland, T.1
-
12
-
-
61849153506
-
Document marking and identification using both line and word shifting
-
2-6 April
-
S.H. Low, N.F. Maxemchuk, J.T. Brassil, and L. O'Gorman, "Document marking and identification using both line and word shifting", Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '95), 2-6 April 1995, vol.2, pp. 853-860.
-
(1995)
Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '95)
, vol.2
, pp. 853-860
-
-
Low, S.H.1
Maxemchuk, N.F.2
Brassil, J.T.3
O'Gorman, L.4
-
13
-
-
8844287566
-
Proceedings of SPIE - Volume 5306, Security, Steganography, and Watermarking of Multimedia Contents VI
-
June
-
A.M. Alattar and O.M. Alattar, "Watermarking electronic text documents containing justified paragraphs and irregular line spacing", Proceedings of SPIE - Volume 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, June 2004, pp. 685-695.
-
(2004)
, pp. 685-695
-
-
Alattar, A.M.1
Alattar, O.M.2
-
14
-
-
84945968328
-
A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics
-
Y. Kim, K. Moon, and I. Oh, "A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics", Proceedings of the Seventh International Conference on Document Analysis and Recognition (JCDAR'03), 2003, pp. 775-779
-
(2003)
Proceedings of the Seventh International Conference on Document Analysis and Recognition (JCDAR'03)
, pp. 775-779
-
-
Kim, Y.1
Moon, K.2
Oh, I.3
-
15
-
-
33947671106
-
A Framework of Text-based Steganography Using SD-Form Semantics Model
-
Kyushu Institute of Technology, Kitakyushu, Japan, July 3-4
-
M. Niimi, S. Minewaki, H. Noda, and E. Kawaguchi, "A Framework of Text-based Steganography Using SD-Form Semantics Model", Pacific Rim Workshop on Digital Steganography 2003, Kyushu Institute of Technology, Kitakyushu, Japan, July 3-4, 2003.
-
(2003)
Pacific Rim Workshop on Digital Steganography 2003
-
-
Niimi, M.1
Minewaki, S.2
Noda, H.3
Kawaguchi, E.4
-
16
-
-
33646234795
-
Steganography-The Art of Hiding Data
-
K. Rabah, "Steganography-The Art of Hiding Data", Information Technology Journal, vol. 3, Issue 3, pp. 245-269, 2004.
-
(2004)
Information Technology Journal
, vol.3
, Issue.3
, pp. 245-269
-
-
Rabah, K.1
-
17
-
-
0035694579
-
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images
-
December
-
D. Huang, and H. Yan, "Interword Distance Changes Represented by Sine Waves for Watermarking Text Images", IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 12, December 2001, pp. 1237-1245
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.12
, pp. 1237-1245
-
-
Huang, D.1
Yan, H.2
-
18
-
-
33645117321
-
A Robust Page Segmentation Method for Persian/Arabic Document
-
Nov
-
M. H. Shirali-Shahreza, and S. Shirali-Shahreza, "A Robust Page Segmentation Method for Persian/Arabic Document", WSEAS Transactions on Computers, vol. 4, Issue 11, Nov. 2005, pp. 1692-1698.
-
(2005)
WSEAS Transactions on Computers
, vol.4
, Issue.11
, pp. 1692-1698
-
-
Shirali-Shahreza, M.H.1
Shirali-Shahreza, S.2
-
19
-
-
0032637701
-
Copyright Protection for the Electronic Distribution of Text Documents
-
July
-
J.T. Brassil, S. Low, and N. F. Maxemchuk, "Copyright Protection for the Electronic Distribution of Text Documents", Proceedings of the IEEE, vol. 87, Issue. 7, July 1999, pp. 1181-1196.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
20
-
-
33947684070
-
-
J. T. Brassil, S . Low, N. F. Maxemchuk, and L. O'Gorman, Marking Text Features of Document Images to Deter Illicit Dissemination, Proceedings of the 12th IAPR International Conference on Pattern Recognition, 1994, 2, 9-13 Oct. 1994, pp. 315-319.
-
J. T. Brassil, S . Low, N. F. Maxemchuk, and L. O'Gorman, "Marking Text Features of Document Images to Deter Illicit Dissemination", Proceedings of the 12th IAPR International Conference on Pattern Recognition, 1994, vol. 2, 9-13 Oct. 1994, pp. 315-319.
-
-
-
|