-
1
-
-
0036688310
-
A secure data hiding scheme for binary images
-
Y. Tseng; Y. Chen; H. Pan, " A secure data hiding scheme for binary images", IEEE Transactions on Communications, vol. 50, pp. 1227-1231, 2002.
-
(2002)
IEEE Transactions on Communications
, vol.50
, pp. 1227-1231
-
-
Tseng, Y.1
Chen, Y.2
Pan, H.3
-
2
-
-
0034774869
-
Data hiding in binary text documents
-
Q. Mei, E. K. Wong, and N. Memon, "Data hiding in binary text documents," in Proc.SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 369-375, 2001.
-
(2001)
Proc.SPIE, Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 369-375
-
-
Mei, Q.1
Wong, E.K.2
Memon, N.3
-
3
-
-
3242759877
-
Data Hiding in Binary Image for Authentication and Annotation
-
M. Wu and. B. Liu, "Data Hiding in Binary Image for Authentication and Annotation," IEEE Trans. On Multimedia, vol. 6, NO. 4, pp. 528-538, 2004.
-
(2004)
IEEE Trans. On Multimedia
, vol.6
, Issue.4
, pp. 528-538
-
-
Wu, M.1
Liu, B.2
-
4
-
-
0009604608
-
A novel data hiding method, for two-color images
-
G. Pan, Y. J. Wu, and Z. H. Wu, " A novel data hiding method, for two-color images," Lecture Notes in Computer Science, vol. 2229, pp. 261-270, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2229
, pp. 261-270
-
-
Pan, G.1
Wu, Y.J.2
Wu, Z.H.3
-
5
-
-
20444484176
-
A Public-Key Authentication Watermarking for Binary Images
-
H. Y. Kim and R. L. Queiroz, "A Public-Key Authentication Watermarking for Binary Images," in Proc. of IEEE Int. Conf. Image Processing, vol. 5, pp.3459 - 3462, 2004.
-
(2004)
Proc. of IEEE Int. Conf. Image Processing
, vol.5
, pp. 3459-3462
-
-
Kim, H.Y.1
Queiroz, R.L.2
-
6
-
-
33646811529
-
Data Hiding for Text Document Image Authentication by Connectivity-Preserving
-
H. Yang and A. C. Kot, "Data Hiding for Text Document Image Authentication by Connectivity-Preserving," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. II, pp. 505-508, 2005.
-
(2005)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, vol.2
, pp. 505-508
-
-
Yang, H.1
Kot, A.C.2
-
7
-
-
33749242438
-
Detection of Data hiding in Binary Text Images
-
J. Cheng, A. C. Kot, J. Liu and H. Cao, "Detection of Data hiding in Binary Text Images," in Proc IEEE Inf. Conf. Image Processing, vol. III, pp.73-76, 2005.
-
(2005)
Proc IEEE Inf. Conf. Image Processing
, vol.3
, pp. 73-76
-
-
Cheng, J.1
Kot, A.C.2
Liu, J.3
Cao, H.4
-
8
-
-
20444438003
-
Quantitative Steganalysis of binary images
-
M. Jiang, X.Wu, E.K.Wong, and N. Memon, "Quantitative Steganalysis of binary images," in Proc. IEEE Int. Conf. Image Processing, pp. 29-32, 2004.
-
(2004)
Proc. IEEE Int. Conf. Image Processing
, pp. 29-32
-
-
Jiang, M.1
Wu, X.2
Wong, E.K.3
Memon, N.4
-
9
-
-
0038343416
-
Steganalysis using image quality metrics
-
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics ", IEEE Trans. On Image Processing, vol. 12, pp. 221-229, 2003.
-
(2003)
IEEE Trans. On Image Processing
, vol.12
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
10
-
-
27944495266
-
Objective distortion measure for binary images
-
J. Cheng and A. C. Kot, "Objective distortion measure for binary images," in Proc IEEE TENCON, pp. 355-358, 2004.
-
(2004)
Proc IEEE TENCON
, pp. 355-358
-
-
Cheng, J.1
Kot, A.C.2
-
12
-
-
34547507090
-
Objective distortion measure for binary text image based on edge line segment similarity
-
Submitted to
-
J. Cheng and. A.C. Kot, "Objective distortion measure for binary text image based on edge line segment similarity", Submitted to IEEE Trans. On Image Processing.
-
IEEE Trans. On Image Processing
-
-
Cheng, J.1
Kot, A.C.2
-
13
-
-
0442311212
-
Distance-reciprocal distortion measure for binary document images
-
H. Lu, A. C. Kot, and Y. Q. Shi, "Distance-reciprocal distortion measure for binary document images," IEEE Signal Processing Letters, vol. 11, Issue: 2, pp. 228 - 231, 2004.
-
(2004)
IEEE Signal Processing Letters
, vol.11
, Issue.2
, pp. 228-231
-
-
Lu, H.1
Kot, A.C.2
Shi, Y.Q.3
-
14
-
-
0028547556
-
Floating search methods in feature selection
-
P. Pudil, J. Novovicova and J. Kittler, "Floating search methods in feature selection," Patttern Recognitions Letters, vol. 15, pp. 1119-1125, 1994.
-
(1994)
Patttern Recognitions Letters
, vol.15
, pp. 1119-1125
-
-
Pudil, P.1
Novovicova, J.2
Kittler, J.3
-
15
-
-
10044235999
-
LIBSVM: A library for support vector machines
-
available at
-
CC Chang and C.J. Lin, LIBSVM: a library for support vector machines, 2001. Software available at: http://www.csie.ntu.edu.tw /-cjlin/libsvm.
-
(2001)
Software
-
-
Chang, C.C.1
Lin, C.J.2
|