-
1
-
-
70350553133
-
-
Ph. D. dissertation, Faculty of Comput. Sci., Technische Universität, Dresden, Germany
-
R. Böhme, "Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals", Ph. D. dissertation, Faculty of Comput. Sci., Technische Universität, Dresden, Germany, 2008.
-
(2008)
Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals
-
-
Böhme, R.1
-
2
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science
-
Y. Kim, Z. Duric, and D. Richards, "Modified matrix encoding technique for minimal distortion steganography", in Proc. 8th Int. Workshop Inf. Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 314-327.
-
(2006)
Proc. 8th Int. Workshop Inf. Hiding
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
3
-
-
70449664021
-
Fast BCH syndrome coding for steganography
-
S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7-10, Lecture Notes in Computer Science
-
R. Zhang, V. Sachnev, and H. J. Kim, "Fast BCH syndrome coding for steganography", in Proc. 11th Int. Workshop Inf. Hiding, S. Katzenbeisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7-10, 2009, vol. 5806, Lecture Notes in Computer Science, pp. 31-47.
-
(2009)
Proc. 11th Int. Workshop Inf. Hiding
, vol.5806
, pp. 31-47
-
-
Zhang, R.1
Sachnev, V.2
Kim, H.J.3
-
4
-
-
70449657749
-
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
-
J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
-
V. Sachnev, H. J. Kim, and R. Zhang, "Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding", in Proc. 11th ACM Multimedia Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 131-140.
-
(2009)
Proc. 11th ACM Multimedia Security Workshop
, pp. 131-140
-
-
Sachnev, V.1
Kim, H.J.2
Zhang, R.3
-
5
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
P. W. L. Fong, R. Böhme, and R. Safavi-Naini, Eds., Calgary, Canada, Jun. 28-30, Lecture Notes in Computer Science
-
T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography", in Proc. 12th Int. Workshop Inf. Hiding, P. W. L. Fong, R. Böhme, and R. Safavi-Naini, Eds., Calgary, Canada, Jun. 28-30, 2010, vol. 6387, Lecture Notes in Computer Science, pp. 161-177.
-
(2010)
Proc. 12th Int. Workshop Inf. Hiding
, vol.6387
, pp. 161-177
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
6
-
-
56749154804
-
On completeness of feature spaces in blind steganalysis
-
A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U. K., Sep. 22-23
-
J. Kodovský and J. Fridrich, "On completeness of feature spaces in blind steganalysis", in Proc. 10th ACM Multimedia Security Workshop, A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U. K., Sep. 22-23, 2008, pp. 123-132.
-
(2008)
Proc. 10th ACM Multimedia Security Workshop
, pp. 123-132
-
-
Kodovský, J.1
Fridrich, J.2
-
8
-
-
34548216307
-
Practical methods for minimizing embedding impact in steganography
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1
-
J. Fridrich and T. Filler, "Practical methods for minimizing embedding impact in steganography", in Proc. SPIE, Electron. Imag., Security, Steganography, Watermark. Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1, 2007, vol. 6505, pp. 02-03.
-
(2007)
Proc. SPIE, Electron. Imag., Security, Steganography, Watermark. Multimedia Contents IX
, vol.6505
, pp. 02-03
-
-
Fridrich, J.1
Filler, T.2
-
9
-
-
84940671644
-
Binary quantization using belief propagation over factor graphs of LDGM codes
-
Control, Comput., Allerton, IL, Sep. 26-28
-
T. Filler and J. Fridrich, "Binary quantization using belief propagation over factor graphs of LDGM codes", presented at the 45th Annu. Allerton Conf. Commun., Control, Comput., Allerton, IL, Sep. 26-28, 2007.
-
(2007)
The 45th Annu. Allerton Conf. Commun.
-
-
Filler, T.1
Fridrich, J.2
-
10
-
-
34247247816
-
Efficient double-layered steganographic embedding
-
DOI 10.1049/el:20070248
-
X. Zhang, W. Zhang, and S. Wang, "Efficient double-layered steganographic embedding", Electron. Lett., vol. 43, pp. 482-483, Apr. 2007. (Pubitemid 46609952)
-
(2007)
Electronics Letters
, vol.43
, Issue.8
, pp. 482-483
-
-
Zhang, X.1
Zhang, W.2
Wang, S.3
-
11
-
-
34548335302
-
Improving embedding efficiency of covering codes for applications in steganography
-
DOI 10.1109/LCOMM.2007.070438
-
W. Zhang, S. Wang, and X. Zhang, "Improving embedding efficiency of covering codes for applications in steganography", IEEE Commun. Lett., vol. 11, pp. 680-682, Aug. 2007. (Pubitemid 47342268)
-
(2007)
IEEE Communications Letters
, vol.11
, Issue.8
, pp. 680-682
-
-
Zhang, W.1
Wang, S.2
Zhang, X.3
-
12
-
-
56749177023
-
Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes
-
K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, Lecture Notes in Computer Science
-
W. Zhang, X. Zhang, and S. Wang, "Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes", in Proc. 10th Int. Workshop Inf. Hiding, K. Solanki, K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19-21, 2008, vol. 5284, Lecture Notes in Computer Science, pp. 60-71.
-
(2008)
Proc. 10th Int. Workshop Inf. Hiding
, vol.5284
, pp. 60-71
-
-
Zhang, W.1
Zhang, X.2
Wang, S.3
-
13
-
-
77949783466
-
Wet ZZW construction for steganography
-
London, U. K., Dec. 6-9
-
T. Filler and J. Fridrich, "Wet ZZW construction for steganography", presented at the 1st IEEE Int. Workshop Inf. Forensics Security, London, U. K., Dec. 6-9, 2009.
-
(2009)
The 1st IEEE Int. Workshop Inf. Forensics Security
-
-
Filler, T.1
Fridrich, J.2
-
14
-
-
77951866880
-
Improving the embedding efficiency of wet paper codes by paper folding
-
Sep.
-
W. Zhang and X. Zhu, "Improving the embedding efficiency of wet paper codes by paper folding", IEEE Signal Process. Lett., vol. 16, pp. 794-797, Sep. 2009.
-
(2009)
IEEE Signal Process. Lett.
, vol.16
, pp. 794-797
-
-
Zhang, W.1
Zhu, X.2
-
15
-
-
69749111992
-
Generalization of the ZZW embedding construction for steganography
-
Sep.
-
W. Zhang and X. Wang, "Generalization of the ZZW embedding construction for steganography", IEEE Trans. Inf. Forensics Security, vol. 4, pp. 564-569, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, pp. 564-569
-
-
Zhang, W.1
Wang, X.2
-
16
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities
-
DOI 10.1145/1288869.1288872, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
J. Fridrich, T. Pevný, and J. Kodovský, "Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities", in Proc. 9th ACM Multimedia Security Workshop, J. Dittmann and J. Fridrich, Eds., Dallas, TX, Sep. 20-21, 2007, pp. 3-14. (Pubitemid 351203799)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 3-14
-
-
Fridrich, J.1
Pevny, T.2
Kodovsky, J.3
-
17
-
-
77951871502
-
Minimizing embedding impact in steganography using trellis-coded quantization
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21
-
T. Filler, J. Judas, and J. Fridrich, "Minimizing embedding impact in steganography using trellis-coded quantization", in Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21, 2010, vol. 7541, pp. 05-01-05-14.
-
(2010)
Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XII
, vol.7541
, pp. 0501-0514
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
18
-
-
80051722687
-
Using non-binary embedding operation to minimize additive distortion functions in steganography
-
Seattle, WA, Dec. 12-15
-
T. Filler and J. Fridrich, "Using non-binary embedding operation to minimize additive distortion functions in steganography", presented at the 2nd IEEE Int. Workshop Inf. Forensics Security, Seattle, WA, Dec. 12-15, 2010.
-
(2010)
The 2nd IEEE Int. Workshop Inf. Forensics Security
-
-
Filler, T.1
Fridrich, J.2
-
19
-
-
0019148101
-
Coding for channel with random parameters
-
S. I. Gel'fand and M. S. Pinsker, "Coding for channel with random parameters", Problems Control Inf. Theory, vol. 9, no. 1, pp. 19-31, 1980.
-
(1980)
Problems Control Inf. Theory
, vol.9
, Issue.1
, pp. 19-31
-
-
Gel'fand, S.I.1
Pinsker, M.S.2
-
20
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, Lecture Notes in Computer Science
-
A. D. Ker, "Batch steganography and pooled steganalysis", in Proc. 8th Int. Workshop Inf. Hiding, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds., Alexandria, VA, Jul. 10-12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 265-281.
-
(2006)
Proc. 8th Int. Workshop Inf. Hiding
, vol.4437
, pp. 265-281
-
-
Ker, A.D.1
-
21
-
-
0003214704
-
Coding theorems for a discrete source with a fidelity criterion
-
C. E. Shannon, "Coding theorems for a discrete source with a fidelity criterion", IRE Nat. Conv. Rec., vol. 4, pp. 142-163, 1959.
-
(1959)
IRE Nat. Conv. Rec.
, vol.4
, pp. 142-163
-
-
Shannon, C.E.1
-
23
-
-
84937814312
-
F5-A steganographic algorithm: High capacity despite better steganalysis
-
Information Hiding
-
A. Westfeld, "High capacity despite better steganalysis (F5-A steganographic algorithm)", in Proc. 4th Int. Workshop Inf. Hiding, I. S. Moskowitz, Ed., Pittsburgh, PA, Apr. 25-27, 2001, vol. 2137, Lecture Notes in Computer Science, pp. 289-302. (Pubitemid 33367674)
-
(2001)
Lecture Notes in Computer Science
, Issue.2137
, pp. 289-302
-
-
Westfeld, A.1
-
24
-
-
30744445178
-
Perturbed quantization steganography
-
DOI 10.1007/s00530-005-0194-3
-
J. Fridrich, M. Goljan, and D. Soukal, "Perturbed quantization steganography", ACM Multimedia Syst. J., vol. 11, no. 2, pp. 98-107, 2005. (Pubitemid 43099511)
-
(2005)
Multimedia Systems
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
25
-
-
21844470700
-
Writing on wet paper
-
DOI 10.1109/TSP.2005.855393
-
J. Fridrich, M. Goljan, D. Soukal, and P. Lisonek, "Writing on wet paper", IEEE Trans. Signal Process., Special Issue on Media Security, vol. 53, pp. 3923-3935, Oct. 2005. (Pubitemid 41638244)
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.10
, pp. 3923-3935
-
-
Fridrich, J.1
Goljan, M.2
Lisonek, P.3
Soukal, D.4
-
26
-
-
28944435491
-
Data-hiding codes
-
P. Moulin and R. Koetter, "Data-hiding codes", Proc. IEEE, vol. 93, no. 12, pp. 2083-2126, 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.12
, pp. 2083-2126
-
-
Moulin, P.1
Koetter, R.2
-
27
-
-
14844285173
-
Some notes on steganography
-
Online. Available
-
R. Crandall, "Some notes on steganography", in Steganography Mailing List [Online]. Available: http://os.inf.tu-dresden. de/westfeld/ crandall.pdf 1998
-
(1998)
Steganography Mailing List
-
-
Crandall, R.1
-
28
-
-
33645661269
-
-
Online. Available
-
J. Bierbrauer, On Crandall's Problem [Online]. Available: http://www.ws.binghamton. edu/fridrich/covcodes.pdf 1998
-
(1998)
On Crandall's Problem
-
-
Bierbrauer, J.1
-
30
-
-
0242640249
-
Embedding information in grayscale images
-
Enschede, The Netherlands, May 15-16
-
M. van Dijk and F. Willems, "Embedding information in grayscale images", in Proc. 22nd Symp. Inf. Commun. Theory, Enschede, The Netherlands, May 15-16, 2001, pp. 147-154.
-
(2001)
Proc. 22nd Symp. Inf. Commun. Theory
, pp. 147-154
-
-
Van Dijk, M.1
Willems, F.2
-
31
-
-
33750922236
-
Embedding with syndrome coding based on BCH codes
-
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
-
D. Schönfeld and A. Winkler, "Embedding with syndrome coding based on BCH codes", in Proc. 8th ACM Multimedia Security Workshop, S. Voloshynovskiy, J. Dittmann, and J. Fridrich, Eds., Geneva, Switzerland, Sep. 26-27, 2006, pp. 214-223. (Pubitemid 44729598)
-
(2006)
Proceedings of the Multimedia and Security Workshop 2006, MM and Sec'06
, vol.2006
, pp. 214-223
-
-
Schonfeld, D.1
Winkler, A.2
-
32
-
-
33748096430
-
Matrix embedding for large payloads
-
J. Fridrich and D. Soukal, "Matrix embedding for large payloads", IEEE Trans. Information Forensics and Security, vol. 1, no. 3, pp. 390-394, 2006.
-
(2006)
IEEE Trans. Information Forensics and Security
, vol.1
, Issue.3
, pp. 390-394
-
-
Fridrich, J.1
Soukal, D.2
-
33
-
-
60449112398
-
Asymptotic behavior of the ZZW embedding construction
-
Mar.
-
J. Fridrich, "Asymptotic behavior of the ZZW embedding construction", IEEE Trans. Inf. Forensics Security, vol. 4, pp. 151-153, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, pp. 151-153
-
-
Fridrich, J.1
-
34
-
-
33645015900
-
Wet paper codes with improved embedding efficiency
-
J. Fridrich, M. Goljan, and D. Soukal, "Wet paper codes with improved embedding efficiency", IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 102-110, 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 102-110
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
35
-
-
67650099990
-
Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels
-
Jul.
-
E. Arikan, "Channel polarization: A method for constructing capacityachieving codes for symmetric binary-input memoryless channels", IEEE Trans. Inf. Theory, vol. 55, pp. 3051-3073, Jul. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, pp. 3051-3073
-
-
Arikan, E.1
-
36
-
-
77950200691
-
Polar codes are optimal for lossy source coding
-
Apr.
-
S. B. Korada and R. L. Urbanke, "Polar codes are optimal for lossy source coding", IEEE Trans. Inf. Theory, vol. 56, pp. 1751-1768, Apr. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, pp. 1751-1768
-
-
Korada, S.B.1
Urbanke, R.L.2
-
37
-
-
0004272772
-
-
Cambridge, U. K.: Cambridge Univ. Press, Online. Available
-
D. MacKay, Information Theory, Inference, and Learning Algorithms. Cambridge, U. K.: Cambridge Univ. Press, 2003 [Online]. Available: http://www.inference.phy.cam.ac.uk/mackay/itila
-
(2003)
Information Theory, Inference, and Learning Algorithms
-
-
MacKay, D.1
-
38
-
-
70350562893
-
The square root law of steganographic capacity for markov covers
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21
-
T. Filler, A. D. Ker, and J. Fridrich, "The Square Root Law of steganographic capacity for Markov covers", in Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XI, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 18-21, 2009, vol. 7254, pp. 081-0811.
-
(2009)
Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XI
, vol.7254
, pp. 081-0811
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
39
-
-
70449644855
-
Steganalysis by subtractive pixel adjacency matrix
-
J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
-
T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix", in Proc. 11th ACM Multimedia Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 75-84.
-
(2009)
Proc. 11th ACM Multimedia Security Workshop
, pp. 75-84
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
40
-
-
70449646940
-
Calibration revisited
-
J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8
-
J. Kodovský and J. Fridrich, "Calibration revisited", in Proc. 11th ACM Multimedia Security Workshop, J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7-8, 2009, pp. 63-74.
-
(2009)
Proc. 11th ACM Multimedia Security Workshop
, pp. 63-74
-
-
Kodovský, J.1
Fridrich, J.2
-
41
-
-
0016058778
-
Trellis encoding of memoryless discrete-time sources with a fidelity criterion
-
May
-
A. Viterbi and J. Omura, "Trellis encoding of memoryless discrete-time sources with a fidelity criterion", IEEE Trans. Inf. Theory, vol. 20, pp. 325-332, May 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.20
, pp. 325-332
-
-
Viterbi, A.1
Omura, J.2
-
42
-
-
27744488578
-
On the error exponent of trellis source coding
-
DOI 10.1109/TIT.2005.856953
-
I. Hen and N. Merhav, "On the error exponent of trellis source coding", IEEE Trans. Inf. Theory, vol. 51, no. 11, pp. 3734-3741, 2005. (Pubitemid 41622576)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.11
, pp. 3734-3741
-
-
Hen, I.1
Merhav, N.2
-
43
-
-
0037356065
-
Distributed source coding using syndromes (DISCUS): Design and construction
-
S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction", IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 626-643
-
-
Pradhan, S.1
Ramchandran, K.2
-
44
-
-
0028514190
-
Decoding of convolutional codes using a syndrome trellis
-
V. Sidorenko and V. Zyablov, "Decoding of convolutional codes using a syndrome trellis", IEEE Trans. Inf. Theory, vol. 40, no. 5, pp. 1663-1666, 1994.
-
(1994)
IEEE Trans. Inf. Theory
, vol.40
, Issue.5
, pp. 1663-1666
-
-
Sidorenko, V.1
Zyablov, V.2
-
45
-
-
0029304929
-
Covering properties of convolutional codes and associated lattices
-
A. Calderbank, P. Fishburn, and A. Rabinovich, "Covering properties of convolutional codes and associated lattices", IEEE Trans. Inf. Theory, vol. 41, no. 3, pp. 732-746, 1995.
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, Issue.3
, pp. 732-746
-
-
Calderbank, A.1
Fishburn, P.2
Rabinovich, A.3
-
46
-
-
34548220950
-
Trellis coded modulation to improve dirty paper trellis watermarking
-
E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1
-
C. K. Wang, G. Doërr, and I. Cox, "Trellis coded modulation to improve dirty paper trellis watermarking", in Proc. SPIE, EI, Security, Steganography, Watermarking Multimedia Contents IX, E. J. Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29-Feb. 1, 2007, p. 65050G.
-
(2007)
Proc. SPIE, EI, Security, Steganography, Watermarking Multimedia Contents IX
-
-
Wang, C.K.1
Doërr, G.2
Cox, I.3
-
47
-
-
77951862698
-
Modern steganalysis can detect YASS
-
N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21
-
J. Kodovský, T. Pevný, and J. Fridrich, "Modern steganalysis can detect YASS", in Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XII, N. D. Memon, E. J. Delp, P. W. Wong, and J. Dittmann, Eds., San Jose, CA, Jan. 17-21, 2010, vol. 7541, pp. 02-01-02-11.
-
(2010)
Proc. SPIE, Electron. Imag., Security, Forensics Multimedia XII
, vol.7541
, pp. 0201-0211
-
-
Kodovský, J.1
Pevný, T.2
Fridrich, J.3
-
48
-
-
78649422691
-
-
Online. Available
-
P. Bas and T. Furon, BOWS-2 [Online]. Available: http://bows2.gipsalab. inpg.fr Jul. 2007
-
(2007)
BOWS-2
-
-
Bas, P.1
Furon, T.2
|