-
1
-
-
40849109803
-
-
Provos N. and Honeyman, P., Detecting Steganographic Content on the Internet, Center for Information Technology Integration, University of Michigan, Technical Report 01-11, 2001
-
Provos N. and Honeyman, P., "Detecting Steganographic Content on the Internet", Center for Information Technology Integration, University of Michigan, Technical Report 01-11, 2001
-
-
-
-
3
-
-
0031996445
-
Exploring steganography: Seeing the unseen
-
Feb
-
Johnson N. and Jajodia S., "Exploring steganography: Seeing the unseen", Computer, 31, no 2:26-34, Feb. 1998.
-
(1998)
Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.1
Jajodia, S.2
-
4
-
-
2642549992
-
-
ACM Press
-
Fridrich J., Goljan M., and Hogea D., "Attacking the OutGuess," Proc. ACM Workshop Multimedia and Security2002, ACM Press, 2002.
-
(2002)
"Attacking the OutGuess," Proc. ACM Workshop Multimedia and Security2002
-
-
Fridrich, J.1
Goljan, M.2
Hogea, D.3
-
5
-
-
3042742327
-
Hide and Seek: An Introduction to Steganography
-
MAY/JUNE
-
Provos N., Honeyman P., "Hide and Seek: An Introduction to Steganography", IEEE SECURITY & PRIVACY, MAY/JUNE 2003
-
(2003)
IEEE SECURITY & PRIVACY
-
-
Provos, N.1
Honeyman, P.2
-
6
-
-
0001849187
-
Attacks on Steganographic Systems
-
Pfitzmann A, eds, 3rd International Workshop, Springer-Verlag, Berlin Heidelberg New York
-
Westfeld A., and Pfitzmann A., "Attacks on Steganographic Systems". In: Pfitzmann A. (eds.): 3rd International Workshop. Lecture Notes in Computer Science, Vol.1768, Springer-Verlag, Berlin Heidelberg New York (2000)
-
(2000)
Lecture Notes in Computer Science
, vol.1768
-
-
Westfeld, A.1
Pfitzmann, A.2
-
7
-
-
21144449328
-
Detecting Low Embedding Rates
-
Netherlands, Oct. 7
-
Westfeld, A. "Detecting Low Embedding Rates". 5th Information Hiding Workshop, Netherlands, Oct. 7. 9, 2002
-
(2002)
5th Information Hiding Workshop
, pp. 9
-
-
Westfeld, A.1
-
8
-
-
40849104150
-
-
Pik-Wah C., Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery, A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Philosophy in Computer Science and Engineering, The Chinese University of Hong Kong, July, 2004
-
Pik-Wah C., "Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery", A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Philosophy in Computer Science and Engineering, The Chinese University of Hong Kong, July, 2004
-
-
-
-
9
-
-
0033717151
-
-
Huang C. and Wu J., A watermark optimization technique based on genetic algorithms, SPIE Electronic Imaging 2000 San Jose, Jan.2000.
-
Huang C. and Wu J., "A watermark optimization technique based on genetic algorithms", SPIE Electronic Imaging 2000 San Jose, Jan.2000.
-
-
-
-
10
-
-
40849148518
-
-
Steganography software for Windows
-
Steganography software for Windows, http://members.tripod.com/ steganography/stego/software.html
-
-
-
-
11
-
-
84937814312
-
High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm)
-
Springer-Verlag, Berlin Heidelberg New York
-
th International Workshop. LectureNotes in Computer Science, Vol.2137. Springer-Verlag, Berlin Heidelberg New York, 2001, pp. 289-302
-
(2001)
th International Workshop. LectureNotes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
14
-
-
40849108248
-
-
Bassia P. and Pitas I., Robust audio watermarking in the time domain, Findings report, Dept. of Informatics, University of Thessaloniki 1998.
-
Bassia P. and Pitas I., "Robust audio watermarking in the time domain", Findings report, Dept. of Informatics, University of Thessaloniki 1998.
-
-
-
-
17
-
-
40849131228
-
-
http://www.outguess.org/download.php
-
-
-
-
18
-
-
40849128750
-
-
http://www.umoncton.ca/turk
-
-
-
|