-
2
-
-
0141953943
-
A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement
-
Sept
-
C. Tzeng and W. Tsai, "A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement," IEEE Commun. Lett., vol. 7, no. 9, pp. 443-445, Sept. 2003.
-
(2003)
IEEE Commun. Lett
, vol.7
, Issue.9
, pp. 443-445
-
-
Tzeng, C.1
Tsai, W.2
-
3
-
-
12344293379
-
A secure authentication watermarking for halftone and binary images
-
H. Kim and A. Afif, "A secure authentication watermarking for halftone and binary images," Int. J. Imaging Syst. Technol., vol. 14, no. 4, pp. 147-152, 2004.
-
(2004)
Int. J. Imaging Syst. Technol
, vol.14
, Issue.4
, pp. 147-152
-
-
Kim, H.1
Afif, A.2
-
4
-
-
85027184013
-
-
NIST Special Publication 800-57. (2006, May). Recommendation for Key Management-Part 1: General (Revised).
-
NIST Special Publication 800-57. (2006, May). Recommendation for Key Management-Part 1: General (Revised).
-
-
-
-
5
-
-
85027104076
-
-
Available
-
[Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-57/ SP800-57-Part1.pdf
-
-
-
-
6
-
-
33749597759
-
A new public-key authentication watermarking for binary document images resistant to parity checks
-
H. Kim, "A new public-key authentication watermarking for binary document images resistant to parity checks," Proc. IEEE International Conference on Image Processing (ICIP), vol. 2, pp. 1074-1077, 2005.
-
(2005)
Proc. IEEE International Conference on Image Processing (ICIP)
, vol.2
, pp. 1074-1077
-
-
Kim, H.1
-
7
-
-
33645695834
-
Some notes on steganography
-
posted on Steganography Mailing List
-
R. Crandall, "Some notes on steganography," posted on Steganography Mailing List, 1998.
-
(1998)
-
-
Crandall, R.1
-
8
-
-
84937814312
-
High capacity despite better steganalysis (F5-A steganographic algorithm)
-
Proc. Information Hiding. 4th International Workshop, Springer-Verlag
-
A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)," Proc. Information Hiding. 4th International Workshop. LNCS, vol. 2137, pp. 289-302, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
-
9
-
-
3242759877
-
Data hiding in binary images for authentication and annotation
-
Aug
-
M. Wu and B. Liu, "Data hiding in binary images for authentication and annotation," IEEE Trans. Multimed., vol. 6, no. 4, pp. 528-538, Aug. 2004.
-
(2004)
IEEE Trans. Multimed
, vol.6
, Issue.4
, pp. 528-538
-
-
Wu, M.1
Liu, B.2
-
10
-
-
33748096430
-
Matrix embedding for large payload
-
Information Forensics and Security, Sept
-
J. Fridrich and D. Soukal, "Matrix embedding for large payload," IEEE Trans. Information Forensics and Security, vol. 1, no. 3, pp. 390-395, Sept. 2006.
-
(2006)
IEEE Trans
, vol.1
, Issue.3
, pp. 390-395
-
-
Fridrich, J.1
Soukal, D.2
|