-
1
-
-
50049114378
-
Improving BTC image compression using a fuzzy complement edge operator
-
Amarunnishad T.M., Govindan V.K., and Mathew A.T. Improving BTC image compression using a fuzzy complement edge operator. Signal Processing 88 (2008) 2989-2997
-
(2008)
Signal Processing
, vol.88
, pp. 2989-2997
-
-
Amarunnishad, T.M.1
Govindan, V.K.2
Mathew, A.T.3
-
5
-
-
1442360452
-
Quantitative steganalysis of digital images: Estimating the secret message length
-
Fridrich J. Quantitative steganalysis of digital images: Estimating the secret message length. ACM Multimedia Systems Journal 9 (2003) 288-302
-
(2003)
ACM Multimedia Systems Journal
, vol.9
, pp. 288-302
-
-
Fridrich, J.1
-
6
-
-
0036034444
-
Practical steganalysis of digital images-state of the art
-
Fridrich, J., & Goljan, M. (2002). Practical steganalysis of digital images-state of the art. In Proceedings of SPIE photonics imaging 2002, security and watermarking of multimedia contents (Vol. 4675, pp. 1-13).
-
(2002)
Proceedings of SPIE photonics imaging 2002, security and watermarking of multimedia contents
, vol.4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
7
-
-
0035472155
-
Detecting LSB steganography in color and gray-scale images
-
Fridrich J., Goljan M., and Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8 (2001) 22-28
-
(2001)
IEEE Multimedia
, vol.8
, pp. 22-28
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
9
-
-
0003482562
-
-
Kluwer Academic Publishers, Boston, MA
-
Johnson N., Duric Z., and Jajodia S. Information hiding: Steganography and watermarking-attacks and countermeasures (2001), Kluwer Academic Publishers, Boston, MA
-
(2001)
Information hiding: Steganography and watermarking-attacks and countermeasures
-
-
Johnson, N.1
Duric, Z.2
Jajodia, S.3
-
10
-
-
0030692404
-
A new fuzzy edge detection method for image enhancement
-
Kuo, Y. H., Lee, C. S., & Liu, C. C. (1997). A new fuzzy edge detection method for image enhancement. In Proceedings of the 6th IEEE international conference on fuzzy systems (Vol. 2, pp. 1069-1074).
-
(1997)
Proceedings of the 6th IEEE international conference on fuzzy systems
, vol.2
, pp. 1069-1074
-
-
Kuo, Y.H.1
Lee, C.S.2
Liu, C.C.3
-
14
-
-
33846911544
-
Image processing, analysis, and machine vision
-
Sonka, M., Hlavac, V., & Boyle, R. (1999). Image processing, analysis, and machine vision. Thomson Brooks/Cole.
-
(1999)
Thomson Brooks/Cole
-
-
Sonka, M.1
Hlavac, V.2
Boyle, R.3
-
15
-
-
0027226682
-
A Fuzzy if-then approach to edge detection
-
Tao, C. W., Thompson, W. E., & Taur, J. S. (1993). A Fuzzy if-then approach to edge detection. In Proceedings of the second IEEE international conference on fuzzy systems (Vol. 2, pp. 1356-1360).
-
(1993)
Proceedings of the second IEEE international conference on fuzzy systems
, vol.2
, pp. 1356-1360
-
-
Tao, C.W.1
Thompson, W.E.2
Taur, J.S.3
-
18
-
-
0001849187
-
Attacks on steganographic systems
-
Proceedings of information hiding, The third international workshop
-
Westfeld, A., & Pfitzmann, A. (1999). Attacks on steganographic systems. In Proceedings of information hiding - The third international workshop, lecture notes in computer science (Vol. 1768, pp. 61-76).
-
(1768)
lecture notes in computer science
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
|