-
2
-
-
84994401544
-
Robust audio watermarking in the time domain
-
Rhodes, Greece, 8-11 September
-
Bassia, P. and I. Pitas (1998) "Robust Audio Watermarking in the Time Domain," in IX European Signal Processing Conference (EUSIPCO'98), Rhodes, Greece, vol. I, pp. 25-28, 8-11 September.
-
(1998)
IX European Signal Processing Conference (EUSIPCO'98)
, vol.1
, pp. 25-28
-
-
Bassia, P.1
Pitas, I.2
-
4
-
-
84892282177
-
-
BBB
-
BBB (2003) is URL www.bbbonline.com.
-
(2003)
-
-
-
5
-
-
0030384775
-
Techniques for data hiding
-
Bender, W., D. Gruhl, N. Morimoto, and A. Lu (1996) "Techniques for Data Hiding," IBM Systems Journal, 35(3,4)313-336.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
7
-
-
85062838317
-
Safeguarding cryptographic keys
-
Blakley, G. R. (1979) "Safeguarding Cryptographic Keys," in AFIPS Conference Proceedings, 48:313-317.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
8
-
-
0002161311
-
The quefrency alanysis of time series for echoes: Cepstrum, pseudo-autocovariance, cross-cepstrum, and saphe cracking
-
Rosenthal, M. (ed.), New York, John Wiley
-
Bogert, B. P., M. J. R. Healy, and J. W. Tukey (1963) "The Quefrency Alanysis of Time Series for Echoes: Cepstrum, Pseudo-Autocovariance, Cross-Cepstrum, and Saphe Cracking," in Proceedings of the Symposium on Time Series Analysis, Rosenthal, M. (ed.), New York, John Wiley, pp. 209-243.
-
(1963)
Proceedings of the Symposium on Time Series Analysis
, pp. 209-243
-
-
Bogert, B.P.1
Healy, M.J.R.2
Tukey, J.W.3
-
9
-
-
84892312900
-
-
BPCS
-
BPCS (2003) is URL http://www.know.comp.kyutech.ac.jp/BPCSe/ file BPCSe-principle.html.
-
(2003)
-
-
-
10
-
-
0032738756
-
Digital watermarking: From concepts to real-time video applications
-
January/February
-
Busch, C, W. Funk, and S. Wolthusen (1999) "Digital Watermarking: From Concepts to Real-Time Video Applications," IEEE Computer Graphics and Applications, Image Security, January/February, pp. 25-35.
-
(1999)
IEEE Computer Graphics and Applications, Image Security
, pp. 25-35
-
-
Busch, C.1
Funk, W.2
Wolthusen, S.3
-
11
-
-
84892242375
-
How to break gifford's cipher
-
July
-
Cain, Thomas R., and Alan T. Sherman (1997) "How to Break Gifford's Cipher," Cryptologia, 21(3)237-286, July.
-
(1997)
Cryptologia
, vol.21
, Issue.3
, pp. 237-286
-
-
Cain, T.R.1
Sherman, A.T.2
-
12
-
-
84962952893
-
DES is not a group
-
New York, Springer Verlag
-
Campbell, K. W., and M. J. Wiener (1993) "DES Is Not a Group," Advances in Cryptology, CRYPTO '92, New York, Springer Verlag, pp. 512-520.
-
(1993)
Advances in Cryptology, CRYPTO '92
, pp. 512-520
-
-
Campbell, K.W.1
Wiener, M.J.2
-
13
-
-
0033707358
-
A secure data hiding scheme for two-color images
-
Also available (in PDF format) from URL
-
Chen Yu-Yuan, Hsiang-Kuang Pan, and Yu-Chee Tseng (2000) "A Secure Data Hiding Scheme for Two-Color Images," in IEEE Symposium on Computers and Communications, ISCC 2000, pp. 750-755. Also available (in PDF format) from URL http://citeseer.nj.nee.com/chenOOsecure.html
-
(2000)
IEEE Symposium on Computers and Communications, ISCC 2000
, pp. 750-755
-
-
Yu-Yuan, C.1
Pan, H.2
Tseng, Y.3
-
14
-
-
85014948392
-
General solution of the adfgvx cipher system
-
Aegean Park Press
-
Childs, J. Rives (2000) General Solution of the ADFGVX Cipher System, Laguna Hills, Calif., Aegean Park Press, vol. C-88.
-
(2000)
Laguna Hills, Calif.
, vol.C-88
-
-
Childs, J.R.1
-
15
-
-
5244228754
-
Finite state languages
-
May
-
Chomsky, Noam, and George A. Miller (1958) "Finite State Languages," Information and Control, 1(2)91-112, May.
-
(1958)
Information and Control
, vol.1
, Issue.2
, pp. 91-112
-
-
Chomsky, N.1
Miller, G.A.2
-
16
-
-
0021405335
-
Data compression using adaptive coding and partial string matching
-
April. Conceptlabs (2004) is URL
-
Cleary, J. G., and I. H. Witten (1984) "Data Compression Using Adaptive Coding and Partial String Matching," IEEE Transactions on Communications COM-32(4):396-402, April. Conceptlabs (2004) is URL http://www.conceptlabs.co.uk/alicebob.html.
-
(1984)
IEEE Transactions on Communications
, vol.COM-32
, Issue.4
, pp. 396-402
-
-
Cleary, J.G.1
Witten, I.H.2
-
17
-
-
84994869893
-
A software-optimized encryption algorithm
-
New York, Springer-Verlag
-
Coppersmith, Donald, and Philip Rogaway (1994) "A Software-Optimized Encryption Algorithm," Fast Software Encryption, Cambridge Security Workshop Proceedings, New York, Springer-Verlag, pp. 56-63.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop Proceedings
, pp. 56-63
-
-
Coppersmith, D.1
Rogaway, P.2
-
18
-
-
57849101321
-
-
United States Patent 5,454,039, 26 September
-
Coppersmith, Donald, and Philip Rogaway (1995) "Software-Efficient Pseudorandom Function and the Use Thereof for Encryption," United States Patent 5,454,039, 26 September.
-
(1995)
Software-Efficient Pseudorandom Function and the Use Thereof for Encryption
-
-
Coppersmith, D.1
Rogaway, P.2
-
19
-
-
0001553281
-
AA secure, robust watermark for multimedia
-
Newton Institute, Cambridge University, May. Also available in PDF format from URL
-
Cox, Ingemar J., Joe Kilian, Tom Leighton, and Talal Shamoon (1996) aA Secure, Robust Watermark for Multimedia," Workshop on Information Hiding, Newton Institute, Cambridge University, May. Also available in PDF format from URL ftp://ftp.nj.nee.com/pub/ingemar/papers/cam96.zip.
-
(1996)
Workshop on Information Hiding
-
-
Cox, I.J.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
20
-
-
0004026002
-
-
San Francisco, Morgan Kaufmann
-
Cox, Ingemar J. (2002) Digital Watermarking, San Francisco, Morgan Kaufmann.
-
(2002)
Digital Watermarking
-
-
Cox, I.J.1
-
21
-
-
84892217333
-
-
Crap
-
Crap (2003) is URL http://www.mat .dtu.dk/people/Lars.R.Knudsen/crap. html.
-
(2003)
-
-
-
22
-
-
84892205444
-
-
Cryptologia
-
Cryptologia (2003) is URL http://www.dean.usma.edu/math/pubs/cryptologia/ .
-
(2003)
-
-
-
23
-
-
84892346053
-
-
Cryptology
-
Cryptology (2003) is URL h t t p : / / l i n k . springer. de/link/service/journals/00145/.
-
(2003)
-
-
-
24
-
-
84892309229
-
-
cypherpunks
-
cypherpunks (2004) is ftp://ftp.csua.berkeley.edu/pub/cypherpunks/ steganography/.
-
(2004)
-
-
-
25
-
-
84892354781
-
-
CSE, is URL, CSE http://www.cse.dnd.ca/
-
CSE (2001) is URL http://www.cse.dnd.ca/. CSE (2003) is URL http://www.cse.dnd.ca/.
-
(2001)
-
-
-
26
-
-
84892330715
-
-
DES
-
DES (1999) is http://csrc.nist.gOv/publications/fips/fips46-3/fips46~3. pdf.
-
(1999)
-
-
-
27
-
-
84892340036
-
-
Despan
-
Despan (2004) is URL http://www.oneoffcd.com/info/historycd.cfm.
-
(2004)
-
-
-
28
-
-
84892350951
-
-
DSD
-
DSD (2003) is URL http://www.dsd.gov.au/.
-
(2003)
-
-
-
30
-
-
0029707854
-
Lossless compression of gray images via context tree weighting
-
in Storer, James A. (ed.), Los Alamitos, CA, IEEE Computer Society Press, April
-
Ekstrand, Nicklas (1996) "Lossless Compression of Gray Images via Context Tree Weighting," in Storer, James A. (ed.), DCC '96: Data Compression Conference, Los Alamitos, CA, IEEE Computer Society Press, pp. 132-139, April.
-
(1996)
DCC '96: Data Compression Conference
, pp. 132-139
-
-
Ekstrand, N.1
-
31
-
-
84892323310
-
-
FAQS
-
FAQS (2004) is URL http://www.faqs.org/faqs/compression-faq/partl/.
-
(2004)
-
-
-
32
-
-
0002163975
-
Discrete cosine transform algorithms for image data compression
-
Boston, MA
-
Feig, Ephraim N,, and Elliot Linzer (1990) "Discrete Cosine Transform Algorithms for Image Data Compression," in Proceedings Electronic Imaging '90 East, pages 84-87, Boston, MA.
-
(1990)
Proceedings Electronic Imaging '90 East
, pp. 84-87
-
-
Feig, E.N.1
Linzer, E.2
-
33
-
-
0024135240
-
Zero knowledge proofs of identity
-
Feige, Uriel, Amos Fiat, and Adi Shamir (1988) "Zero Knowledge Proofs of Identity," Journal of Cryptology, 1(2)77-94.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
34
-
-
0001820140
-
Cryptography and computer privacy
-
15-23, May
-
Feistel, Horst (1973) "Cryptography and Computer Privacy," Scientific American, 228(5) 15-23, May.
-
(1973)
Scientific American
, vol.228
, Issue.5
-
-
Feistel, H.1
-
36
-
-
84892285092
-
-
Fraimhofer, FreeBSD Words (2003) is URL ftp://www.freebsd.org/usr/share/ dict/words
-
Fraimhofer (2001) is URL http://syscop.igd.fhg.de/. FreeBSD Words (2003) is URL ftp://www.freebsd.org/usr/share/dict/words.
-
(2001)
-
-
-
38
-
-
0002321371
-
Methods for tamper detection in digital images
-
Orlando, Fla., October
-
Pridrich, Jiri (1999) "Methods for Tamper Detection in Digital Images," in Proceedings of the ACM Workshop on Multimedia and Security, pp. 19-23, Orlando, Fla., October.
-
(1999)
Proceedings of the ACM Workshop on Multimedia and Security
, pp. 19-23
-
-
Pridrich, J.1
-
39
-
-
84892244237
-
-
Punet
-
Punet (2003) is URL ftp://nic.funet.fi/pub/graphics/misc/test-images/.
-
(2003)
-
-
-
42
-
-
0542373633
-
The mathematics of identification numbers
-
Gallian,, J. A. (1991) "The Mathematics of Identification Numbers," College Mathematics Journal, 22(3):194-202.
-
(1991)
College Mathematics Journal
, vol.223
, pp. 194-202
-
-
Gallian, J.A.1
-
43
-
-
0001594973
-
Mathematical games
-
August
-
Gardner, Martin (1972) "Mathematical Games," Scientific American, 227(2): 106, August.
-
(1972)
Scientific American
, vol.227
, Issue.2
, pp. 106
-
-
Gardner, M.1
-
45
-
-
84892338552
-
-
GCHQ
-
GCHQ (2003) is URL http://www.gchq.gov.uk/.
-
(2003)
-
-
-
46
-
-
0022062271
-
The application of digital broadcast communications to large-scale information systems
-
May
-
Gifford, David K., et al. (1985) "The Application of Digital Broadcast Communications to Large-Scale Information Systems," IEEE Journal on Selected Areas in Communications, SAC-3(3)457-467, May.
-
(1985)
IEEE Journal on Selected Areas in Communications
, vol.SAC-3
, Issue.3
, pp. 457-467
-
-
Gifford, D.K.1
-
47
-
-
84892300116
-
-
GnuPG
-
GnuPG (2004) is http://www.gnupg.org/.
-
(2004)
-
-
-
48
-
-
84892363822
-
-
Goettingen
-
Goettingen (2004) is URL http://www.num.math.uni-goettingen.de/Lehre/ Lehrmaterial/Vorlesungen/Informatik/1998/skript/texte/abthesis.html.
-
(2004)
-
-
-
49
-
-
0000499681
-
Notes on digital coding
-
Golay, Marcel (1949) "Notes on Digital Coding," Proceedings of the IRE, 37:657.
-
(1949)
Proceedings of the IRE
, vol.37
, pp. 657
-
-
Golay, M.1
-
54
-
-
84892223829
-
-
Grafica
-
Grafica (1996) is URL http://www.sgi.com/grafica/huffmaui/.
-
(1996)
-
-
-
55
-
-
0004086411
-
-
United States Patent 2,632,058, March 17
-
Gray, Frank (1953) "Pulse Code Communication," United States Patent 2,632,058, March 17.
-
(1953)
Pulse Code Communication
-
-
Gray, F.1
-
56
-
-
84955119830
-
Echo hiding
-
R. J. Anderson, ed., Springer-Verlag, Berlin
-
Gruhl, Daniel, Walter Bender, and Anthony Lu (1996) "Echo Hiding," in Information Hiding: First International Workshop, Lecture Notes in Computer Science, volume 1174, R. J. Anderson, ed., pp. 295-315, Springer-Verlag, Berlin
-
(1996)
Information Hiding: First International Workshop, Lecture Notes in Computer Science
, vol.1174
, pp. 295-315
-
-
Gruhl, D.1
Bender, W.2
Lu, A.3
-
57
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory
-
Berlin, Springer-Verlag
-
Guillou, Louis, and Jean-Jacques Quisquater (1988) "A Practical Zero-Knowledge Protocol Fitted to Security Microprocessors Minimizing Both Transmission and Memory," in Advances in Cryptology, Eurocrypt '88 Proceedings, pp. 123-128, Berlin, Springer-Verlag.
-
(1988)
Advances in Cryptology, Eurocrypt '88 Proceedings
, pp. 123-128
-
-
Guillou, L.1
Quisquater, J.2
-
58
-
-
84892303386
-
-
Gutenberg
-
Gutenberg (2004) is URL http://www.gutenberg.net/.
-
(2004)
-
-
-
59
-
-
0004236341
-
-
2nd edition, Englewood Cliffs, NJ, Prentice-Hall
-
Hamming, Richard (1986) Coding and Information Theory, 2nd edition, Englewood Cliffs, NJ, Prentice-Hall.
-
(1986)
Coding and Information Theory
-
-
Hamming, R.1
-
60
-
-
0002161015
-
Origins of the binary code
-
August
-
Heath, F. G. (1972) "Origins of the Binary Code," Scientific American, 227(2):76, August.
-
(1972)
Scientific American
, vol.227
, Issue.2
, pp. 76
-
-
Heath, F.G.1
-
63
-
-
84938015047
-
A method for the construction of minimum redundancy codes
-
Huffman, David (1952) "A Method for the Construction of Minimum Redundancy Codes," Proceedings of the IRE, 40(9):1098-1101.
-
(1952)
Proceedings of the IRE
, vol.40
, Issue.9
, pp. 1098-1101
-
-
Huffman, D.1
-
64
-
-
0019038089
-
International digital facsimile coding standards
-
July
-
Hunter, R., and A. H, Robinson (1980) "International Digital Facsimile Coding Standards," Proceedings of the IEEE, 68(7):854-867, July.
-
(1980)
Proceedings of the IEEE
, vol.68
, Issue.7
, pp. 854-867
-
-
Hunter, R.1
Robinson, A.H.2
-
65
-
-
84892301634
-
-
ISBN
-
ISBN (2004) is URL http://www.isbn-international.org/en/identifiers/, file allidentifiers.html
-
(2004)
-
-
-
66
-
-
0003482562
-
Information hiding: steganography and watermarking- attacks and countermeasures
-
Boston, Kluwer Academic
-
Johnson, Neil F., et al. (2001) Information Hiding: Steganography and Watermarking- Attacks and Countermeasures, Advances in Information Security, volume 1, Boston, Kluwer Academic.
-
(2001)
Advances in Information Security
, vol.1
-
-
Johnson, N.F.1
-
69
-
-
0003185688
-
La cryptographic militaire
-
161-191, January-February. Also available in html format from URL
-
Kerckhoffs, Auguste (1883) "La Cryptographic Militaire," Journal des Sciences Militaires, 9:5-38, 161-191, January-February. Also available in html format from URL http://www.petitcolas,net/fabien/kerckhoffs/ la-cryptographie jnilitaire-i.htm.
-
(1883)
Journal des Sciences Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
73
-
-
0001492890
-
Dynamic huffman coding
-
Knuth, D. E. (1985) "Dynamic Huffman Coding," Journal of Algorithms 6:163-180.
-
(1985)
Journal of Algorithms
, vol.6
, pp. 163-180
-
-
Knuth, D.E.1
-
74
-
-
0031381355
-
A robust digital image watermarking scheme using wavelet-based fusion
-
October
-
Kundur, Deepa, and Dimitrios Hatzinakos (1997) "A Robust Digital Image Watermarking Scheme Using Wavelet-Based Fusion," in Proceedings of the IEEE International Conference On Image Processing, Santa Barbara, Calif., 1, pp. 544-547, October.
-
(1997)
Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, Calif.
, vol.1
, pp. 544-547
-
-
Kundur, D.1
Hatzinakos, D.2
-
75
-
-
0031619127
-
Digital watermarking using multiresolution wavelet decomposition
-
Seattle, Wash., May
-
Kundur, Deepa, and Dimitrios Hatzinakos (1998) "Digital Watermarking Using Multiresolution Wavelet Decomposition," Proceedings of the IEEE International Conference On Acoustics, Speech and Signal Processing, Seattle, Wash., 5, pp. 2969-2972, May.
-
(1998)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing
, vol.5
, pp. 2969-2972
-
-
Kundur, D.1
Hatzinakos, D.2
-
76
-
-
0021469033
-
Implementation of a method guaranteeing retrieval in one access
-
July
-
Larson, P. A., and A. Kajla (1984) "Implementation of a Method Guaranteeing Retrieval in One Access," Communications of the ACM, 27(7)670-677, July.
-
(1984)
Communications of the ACM
, vol.27
, Issue.7
, pp. 670-677
-
-
Larson, P.A.1
Kajla, A.2
-
79
-
-
56849108755
-
-
New York, Viking
-
Levy, Steven (2001) Crypto, New York, Viking.
-
(2001)
Crypto
-
-
Levy, S.1
-
81
-
-
0018918171
-
An algorithm for vector quantization design
-
January
-
Linde, Y., A. Buzo, and R. M. Gray (1980) "An Algorithm for Vector Quantization Design," IEEE Transactions on Communications, COM-28:84-95, January.
-
(1980)
IEEE Transactions on Communications
, vol.COM-28
, pp. 84-95
-
-
Linde, Y.1
Buzo, A.2
Gray, R.M.3
-
82
-
-
0024885515
-
Practical fast 1-d dct algorithms with 11 multiplications
-
Loeffler, C, A. Ligtenberg, and G. Moschytz (1989) "Practical Fast 1-D DCT Algorithms with 11 Multiplications," Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP '89), pp. 988-991.
-
(1989)
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP '89)
, pp. 988-991
-
-
Loeffler, C.1
Ligtenberg, A.2
Moschytz, G.3
-
83
-
-
84947944750
-
StegFS: A steganographic file system for linux
-
New York, Springer-Verlag, LNCS 1768
-
McDonald, Andrew D., and Markus G. Kuhn (1999) "StegFS: A Steganographic File System for Linux," in Proceedings of Information Hiding, New York, Springer-Verlag, LNCS 1768, pp. 463-477. Also available from http: //www.mcdonald.org.uk/StegFS/.
-
(1999)
Proceedings of Information Hiding
, pp. 463-477
-
-
McDonald, A.D.1
Kuhn, M.G.2
-
86
-
-
84892212729
-
-
is html file Gram-SchmidtOrthonormalization.html
-
MathWorld (2003) is html file Gram-SchmidtOrthonormalization.html in URL http://mathworld.wolfram.com/.
-
(2003)
-
-
Math, W.1
-
88
-
-
0019587141
-
On the security of multiple encryption
-
Merkle, R. C, and M. Hellman (1981) "On the Security of Multiple Encryption," Communications of the ACM, 24(7)465-467.
-
(1981)
Communications of the ACM
, vol.24
, Issue.7
, pp. 465-467
-
-
Merkle, R.C.1
Hellman, M.2
-
90
-
-
0025516650
-
Implementing the ppm data compression scheme
-
November
-
Moffat, Alistair (1990) "Implementing the PPM Data Compression Scheme," IEEE Transactions on Communications COM-38(11): 1917-1921, November.
-
(1990)
IEEE Transactions on Communications
, vol.COM-38
, Issue.11
, pp. 1917-1921
-
-
Moffat, A.1
-
91
-
-
0032108353
-
Arithmetic coding revisited
-
July
-
Moffat, Alistair, Radford Neal, and Ian H. Witten (1998) "Arithmetic Coding Revisited," ACM Transactions on Information Systems, 16(3):256-294, July.
-
(1998)
ACM Transactions on Information Systems
, vol.16
, Issue.3
, pp. 256-294
-
-
Moffat, A.1
Radford, N.2
Witten, I.H.3
-
92
-
-
84892360973
-
-
NCM
-
NCM (2003) is URL http://www.nsa.gov/museum/.
-
(2003)
-
-
-
94
-
-
84892235457
-
-
Nicetext
-
Nicetext (2004) is URL http://www.nicetext.com/.
-
(2004)
-
-
-
95
-
-
84892212731
-
-
NSA
-
NSA (2003) is URL http://www.nsa.gov/.
-
(2003)
-
-
-
96
-
-
84892315595
-
-
NSA
-
NSA (2004) is http://www.nsa.gov/venona/.
-
(2004)
-
-
-
97
-
-
79957590676
-
Acertain topics in telegraph transmission theory
-
April
-
Nyquist, Harry (1928) aCertain Topics in Telegraph Transmission Theory," Transactions of the AIEE, 47(3):617-644, April.
-
(1928)
Transactions of the AIEE
, vol.47
, Issue.3
, pp. 617-644
-
-
Nyquist, H.1
-
98
-
-
84892206997
-
-
OpenPGP
-
OpenPGP (2004) is http://www.openpgp.org/.
-
(2004)
-
-
-
99
-
-
0040253703
-
-
3rd edition, Peterborough, N.H., Helmers Publishing
-
Palmer, Roger C. (1995) The Bar Code Book, 3rd edition, Peterborough, N.H., Helmers Publishing
-
(1995)
The Bar Code Book
-
-
Palmer, R.C.1
-
100
-
-
0004091209
-
-
Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, Stanford, Calif
-
Pasco, R. (1976) "Source Coding Algorithms for Fast Data Compression," Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, Stanford, Calif.
-
(1976)
Source Coding Algorithms for Fast Data Compression
-
-
Pasco, R.1
-
102
-
-
84892363452
-
-
Petitcolas
-
Petitcolas (2003) is URL http://www.petitcolas.net/fabien/stegcinography/ bibliography/.
-
(2003)
-
-
-
103
-
-
84955568589
-
Information hiding terminology
-
New York, Springer Lecture Notes in Computer Science
-
Pfitzmann, B. (1996) "Information Hiding Terminology," in Information Hiding, New York, Springer Lecture Notes in Computer Science, 1174:347-350.
-
(1996)
Information Hiding
, vol.1174
, pp. 347-350
-
-
Pfitzmann, B.1
-
104
-
-
33745454562
-
LZW data compression
-
Circuit Cellar Inc. June/July
-
Phillips, Dwayne (1992) "LZW Data Compression," The Computer Application Journal, Circuit Cellar Inc., 27:36-48, June/July.
-
(1992)
The Computer Application Journal
, vol.27
, pp. 36-48
-
-
Phillips, D.1
-
105
-
-
84892236814
-
-
PKCS
-
PKCS (2004) is http://www.rsasecurity.com/rsalabs/node.asp?id=2124.
-
(2004)
-
-
-
106
-
-
58749110701
-
Digital image watermarking using visual models
-
February
-
Podilchuk, C. I., and W. Zeng (1997) "Digital Image Watermarking Using Visual Models," in Proceedings of the IS&T/SPIE Conference on Human Vision and Electronic Imaging II, 3016, pp. 100-111, February.
-
(1997)
Proceedings of the IS&T/SPIE Conference on Human Vision and Electronic Imaging II
, vol.3016
, pp. 100-111
-
-
Podilchuk, C.I.1
Zeng, W.2
-
111
-
-
0003575679
-
-
N.J., Prentice-Hall
-
Rao, K., and J. J. Hwang (1996) Techniques and Standards for Image, Video, and Audio Coding, Upper Saddle River, N.J., Prentice-Hall, pp. 273-322.
-
(1996)
Techniques and Standards for Image, Video, and Audio Coding, Upper Saddle River
, pp. 273-322
-
-
Rao, K.1
Hwang, J.J.2
-
112
-
-
0001174154
-
Polynomial codes over certain finite fields
-
Reed, Irving S., and Gustave Solomon (1960) "Polynomial Codes over Certain Finite Fields," SIAM Journal of Applied Mathematics, 8(10):300-304.
-
(1960)
SIAM Journal of Applied Mathematics
, vol.8
, Issue.10
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
114
-
-
84892343132
-
-
RFC804
-
RFC804 (2003) is URL http://www.faqs.org/rfcs/rfc804.html.
-
(2003)
-
-
-
115
-
-
84892361012
-
-
rfcl321
-
rfcl321 (2003) is URL http://www. ietf .org/rf c/rf cl321 .txt.
-
(2003)
-
-
-
116
-
-
0000506580
-
Generalized kraft inequality and arithmetic coding
-
May
-
Rissanen, Jorma (1976) "Generalized Kraft Inequality and Arithmetic Coding' IBM Journal of Research and Development, 20:198-203, May.
-
(1976)
IBM Journal of Research and Development
, vol.20
, pp. 198-203
-
-
Rissanen, J.1
-
117
-
-
84892354443
-
-
Ritter (2004) is URL http://www.ciphersbyritter.com/ARTS/PRACTLAT.HTM.
-
(2004)
-
-
Ritter1
-
118
-
-
78650922644
-
The md4 message digest algorithm
-
in Menezes, A. J., and S. A. Vanstone, (eds.), New York, Springer-Verlag
-
Rivest, R. (1991) "The MD4 Message Digest Algorithm," in Menezes, A. J., and S. A. Vanstone, (eds.), Advances in Cryptology: CRYPTO '90 Proceedings, pp. 303-311, New York, Springer-Verlag.
-
(1991)
Advances in Cryptology: CRYPTO '90 Proceedings
, pp. 303-311
-
-
Rivest, R.1
-
121
-
-
84892263304
-
-
RSA
-
RSA (2001) is URL h t t p : //www. rsasecurity. com/rsalabs/challenges/f actoring/ file f aq.html.
-
(2001)
-
-
-
122
-
-
84892261712
-
-
RSA
-
RSA (2004) is URL http://www.rsasecurity.com/.
-
(2004)
-
-
-
123
-
-
0018542103
-
Arithmetic stream coding using fixed precision registers
-
November
-
Rubin, F. (1979) "Arithmetic Stream Coding Using Fixed Precision Registers," IEEE Transactions on Information Theory 25(6):672-675, November.
-
(1979)
IEEE Transactions on Information Theory
, vol.25
, Issue.6
, pp. 672-675
-
-
Rubin, F.1
-
127
-
-
84892298561
-
-
Savard
-
Savard (2003) is URL http://home.ecn.ab. ca/~jsavard/crypto/jscrypt .htm.
-
(2003)
-
-
-
128
-
-
0001254670
-
Fast software encryption
-
New York, Springer-Verlag. Also available from
-
Schneier, Bruce (1993) "Fast Software Encryption," in Cambridge Security Workshop Proceedings, pp. 191-204. New York, Springer-Verlag. Also available from http://www.counterpane.com/bfsverlag.html.
-
(1993)
Cambridge Security Workshop Proceedings
, pp. 191-204
-
-
Schneier, B.1
-
129
-
-
0003851399
-
-
2nd edition, New York, John Wiley
-
Schneier, Bruce (1995) Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, New York, John Wiley.
-
(1995)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
130
-
-
84892236347
-
-
Schneier, Bruce (2003) is URL http://www.counterpane.com/crypto-gram. html.
-
(2003)
-
-
Schneier, B.1
-
131
-
-
84892233393
-
-
Some page photos from this old book are available at URL
-
Schotti, Gaspari (1665) Schola Steganographica, Jobus Hertz, printer. Some page photos from this old book are available at URL http://www.cl.cam.ac. uk/~fapp2/steganography/steganographica/index.html.
-
(1665)
Schola Steganographica, Jobus Hertz, Printer
-
-
Schotti, G.1
-
132
-
-
0018545449
-
How to share a secret
-
November
-
Shamir, Adi (1979) "How to Share a Secret," Communications of the ACM, 22(11):612-613, November.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
133
-
-
84890522850
-
Communication theory of secrecy systems
-
October
-
Shannon, Claude E, (1949) "Communication Theory of Secrecy Systems," Bell System Technical Journal, 28:656-715, October.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
134
-
-
84944486544
-
Prediction and entropy of printed english
-
January
-
Shannon, Claude E. (1951) "Prediction and Entropy of Printed English," Bell System Technical Journal, 30:50-64, January.
-
(1951)
Bell System Technical Journal
, vol.30
, pp. 50-64
-
-
Shannon, C.E.1
-
135
-
-
77953864168
-
The des, an extensive documentation and evaluation
-
Aegean Park Press
-
Simovits, Mikael J. (1996) The DES, an Extensive Documentation and Evaluation, Laguna Hills, Calif., Aegean Park Press, vol. C-68.
-
(1996)
Laguna Hills, Calif.
, vol.C-68
-
-
Simovits, M.J.1
-
136
-
-
0004034591
-
-
New York, Doubleday
-
Singh, Simon (1999) The Code Book, New York, Doubleday.
-
(1999)
The Code Book
-
-
Singh, S.1
-
137
-
-
0003967331
-
-
New Mathematical Library, No, 22, Washington, D.C., Mathematical Assn. of America
-
Sinkov, A. (1980) Elementary Crypt analysis: A Mathematical Approach (New Mathematical Library, No, 22), Washington, D.C., Mathematical Assn. of America.
-
(1980)
Elementary Crypt Analysis: A Mathematical Approach
-
-
Sinkov, A.1
-
138
-
-
84950911208
-
-
Cryptologia, January. An addendum is in 8(3)260-261
-
Sorkin, Arthur (1984) "Lucifer, A Cryptographic Algorithm," Cryptologia, 8(1):22-41, January. An addendum is in 8(3)260-261.
-
(1984)
Lucifer, A Cryptographic Algorithm
, vol.8
, Issue.1
, pp. 22-41
-
-
Sorkin, A.1
-
140
-
-
84892237790
-
-
Steganosaurus
-
Steganosaurus (2004) is URL http://www.fourmilab.to/stego/.
-
(2004)
-
-
-
141
-
-
84892319181
-
-
Stego
-
Stego (2004) is URL http://www.stego.com/.
-
(2004)
-
-
-
143
-
-
0020190931
-
Data compression via textual substitution
-
Storer, J, A., and T, G. Szymanski (1982) "Data Compression via Textual Substitution," Journal of the A CM 29:928-951.
-
(1982)
Journal of the A CM
, vol.29
, pp. 928-951
-
-
Storer, J.A.1
Szymanski, T.G.2
-
146
-
-
0038080571
-
-
Trithemius, Johannes (1606) Steganographia. Available (for private use only) from URL http://www.esotericarchives.com/tritheim/stegano.htm.
-
(1606)
Steganographia
-
-
Trithemius, J.1
-
147
-
-
0034998078
-
ASecure and invisible data hiding in 2-color images
-
Tseng, Yu-Chee, and Hsiang-Kuang Pan (2001) aSecure and Invisible Data Hiding in 2-Color Images," IEEE Infocom 2001. Also available from URL http://www.ieee-infocom.org/2001/paper/20.pdf.
-
(2001)
IEEE Infocom 2001
-
-
Tseng, Y.-C.1
Pan, H.2
-
148
-
-
84892282263
-
-
UCC
-
UCC (2004) is URL http://www.uc-council.org/.
-
(2004)
-
-
-
150
-
-
84892307010
-
Error detecting decimal codes
-
Unicode Amsterdam, Verhoeff Jacobus (1969)
-
Unicode (2003) is URL http://www.unicode.org. Verhoeff, Jacobus (1969) "Error Detecting Decimal Codes," Mathematical Center Tract 29, Amsterdam.
-
(2003)
Mathematical Center Tract 29
-
-
-
152
-
-
0023436103
-
Design and analysis of dynamic huffman codes
-
October
-
Vitter, Jeffrey S. (1987) "Design and Analysis of Dynamic Huffman Codes," Journal of the ACM, 34(4):825-845, October.
-
(1987)
Journal of the ACM
, vol.34
, Issue.4
, pp. 825-845
-
-
Vitter, J.S.1
-
153
-
-
84892358116
-
-
WatermarkingWorld, is located at URL
-
WatermarkingWorld (2003) is located at URL http://www.watermarkingworld. org/.
-
(2003)
-
-
-
154
-
-
0029710367
-
LOCO-I: A low complexity, context-based, lossless image compression algorithm
-
in Storer J., (ed.), IEEE Computer Society Press
-
Weinberger, M. J., G, Seroussi, and G. Sapiro (1996) "LOCO-I: A Low Complexity, Context-Based, Lossless Image Compression Algorithm," in Storer J., (ed.), Proceedings of Data Compression Conference, Los Alamitos, Calif., IEEE Computer Society Press, pp. 140-149.
-
(1996)
Proceedings of Data Compression Conference, Los Alamitos, Calif.
, pp. 140-149
-
-
Weinberger, M.J.1
Seroussi, G.2
Sapiro, G.3
-
155
-
-
0021439618
-
A technique for high-performance data compression
-
June
-
Welch, T. A. (1984) "A Technique for High-Performance Data Compression," IEEE Computer, 17(6):8-19, June.
-
(1984)
IEEE Computer
, vol.17
, Issue.6
, pp. 8-19
-
-
Welch, T.A.1
-
156
-
-
0542421135
-
Error detecting schemes using dihedral groups
-
Winters, S. J. (1990) "Error Detecting Schemes Using Dihedral Groups," UMAP Journal, ll(4):299-308.
-
(1990)
UMAP Journal
, vol.11
, Issue.4
, pp. 299-308
-
-
Winters, S.J.1
-
157
-
-
0023364261
-
Arithmetic coding for data compression
-
Witten, Ian H,, Radford M. Neal, and John G. Cleary (1987) "Arithmetic Coding for Data Compression," Communications of the ACM, 30(6):520-540.
-
(1987)
Communications of the ACM
, vol.30
, Issue.6
, pp. 520-540
-
-
Witten, I.H.1
Neal, R.M.2
Cleary, J.G.3
-
158
-
-
84950895792
-
Mimic functions
-
July
-
Wayner, Peter (1992) "Mimic Functions," Cryptologia, XVI(3): 193-214, July.
-
(1992)
Cryptologia
, vol.14
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
161
-
-
0000863143
-
Wavelet-transform based watermark for digital images
-
December 7
-
Xia, Xiang-Gen, Charles G. Boncelet, and Gonzalo R. Arce (1998) "Wavelet-Transform Based Watermark for Digital Images," Optics Express 3(12):497-511, December 7.
-
(1998)
Optics Express
, vol.3
, Issue.12
, pp. 497-511
-
-
Xia, X.-G.1
Boncelet, C.G.2
Arce, G.R.3
-
162
-
-
0001320242
-
Embedding robust labels into images for copyright protection
-
August 21-25, Vienna, Austria, Oldenbourg Verlag. Also available in PDF format from URL
-
Zhao, J., and E. Koch (1995) "Embedding Robust Labels into Images for Copyright Protection," in Proceedings of the International Conference on Intellectual Property Rights for Specialized Information Knowledge and New Technologies, August 21-25, Vienna, Austria, Oldenbourg Verlag, pp. 242-251. Also available in PDF format from URL http://citeseer.nj.nee.com/ zhao95embedding.html.
-
(1995)
Proceedings of the International Conference on Intellectual Property Rights for Specialized Information Knowledge and New Technologies
, pp. 242-251
-
-
Zhao, J.1
Koch, E.2
-
164
-
-
84892297390
-
-
Zimmermann, Philip (2001) is http://www.philzimmermann. com/.
-
(2001)
-
-
Zimmermann, P.1
-
165
-
-
0017493286
-
A universal algorithm for sequential data compression
-
Ziv, J., and A. Lempel (1977) "A Universal Algorithm for Sequential Data Compression," IEEE Transactions on Information Theory, IT-23(3):337-343.
-
(1977)
IEEE Transactions on Information Theory
, vol.IT-23
, Issue.3
, pp. 337-343
-
-
Ziv, J.1
Lempel, A.2
-
166
-
-
0018019231
-
Compression of individual sequences via variable-rate coding
-
Ziv, J., and A. Lempel (1978) "Compression of Individual Sequences via Variable-Rate Coding," IEEE Transactions on Information Theory IT-24(5):530-536.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, Issue.5
, pp. 530-536
-
-
Ziv, J.1
Lempel, A.2
|