Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("data hiding")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 222

  • Page / 9
Export

Selection :

  • and

A lossless data hiding scheme based on three-pixel block differencesLIN, Ching-Chiuan; HSUEH, Nien-Lin.Pattern recognition. 2008, Vol 41, Num 4, pp 1415-1425, issn 0031-3203, 11 p.Article

Communication over an acoustic channel using data hiding techniquesLAZIC, Nevena; AARABI, Parham.IEEE transactions on multimedia. 2006, Vol 8, Num 5, pp 918-924, issn 1520-9210, 7 p.Article

Reversible data hidingZHICHENG NI; SHI, Yun-Qing; ANSARI, Nirwan et al.IEEE transactions on circuits and systems for video technology. 2006, Vol 16, Num 3, pp 354-362, issn 1051-8215, 9 p.Article

Reversible data hiding employing histogram shifting using a rotated even―odd difference imageLEE, Sang-Kwang; YOO, Hyang-Mi; SUH, Jae-Won et al.New review of hypermedia and multimedia. 2013, Vol 19, Num 3-4, pp 234-247, issn 1361-4568, 14 p.Article

SmartSearch steganalysisBLOOM, Jeffrey A; ALONSO, Rafael.SPIE proceedings series. 2003, pp 167-172, isbn 0-8194-4820-6, 6 p.Conference Paper

Capacity bounds and constructions for reversible data-hidingKALKER, Ton; WILLEMS, Frans M. J.SPIE proceedings series. 2003, pp 604-611, isbn 0-8194-4820-6, 8 p.Conference Paper

Spatial-domain image hiding using image differencingWU, D. C; TSAI, W. H.IEE proceedings. Vision, image and signal processing. 2000, Vol 147, Num 1, pp 29-37, issn 1350-245XArticle

Fragile imperceptible digital watermark with privacy controlCOPPERSMITH, D; MINTZER, F; TRESSER, C et al.SPIE proceedings series. 1999, Vol 3657, pp 79-84, isbn 0-8194-3128-1Conference Paper

Reversible data hiding exploiting spatial correlation between sub-sampled imagesKIM, Kyung-Su; LEE, Min-Jeong; LEE, Hae-Yeoun et al.Pattern recognition. 2009, Vol 42, Num 11, pp 3083-3096, issn 0031-3203, 14 p.Article

Collusion resistant multimedia fingerprinting: A unified frameworkMIN WU; TRAPPE, Wade; WANG, Z. Jane et al.SPIE proceedings series. 2004, pp 748-759, isbn 0-8194-5209-2, 12 p.Conference Paper

Reversible Data Hiding Based on Median Difference HistogramYANG, Hsien-Wei; LIAO, I-En; CHEN, Chaur-Chin et al.Journal of information science and engineering. 2011, Vol 27, Num 2, pp 577-593, issn 1016-2364, 17 p.Article

Data hiding in image and video: Part II. Designs and applicationsMIN WU; HEATHER YU; BEDE LIU et al.IEEE transactions on image processing. 2003, Vol 12, Num 6, pp 696-705, issn 1057-7149, 10 p.Article

A lossless robust data hiding schemeZENG, Xian-Ting; PING, Ling-Di; PAN, Xue-Zeng et al.Pattern recognition. 2010, Vol 43, Num 4, pp 1656-1667, issn 0031-3203, 12 p.Article

Increasing the data hiding capacity and improving the security of a double-random phase-encoding technique based information hiding schemeJUN SANG; HONG XIANG; NONG SANG et al.Optics communications. 2009, Vol 282, Num 14, pp 2713-2721, issn 0030-4018, 9 p.Article

A novel high-capacity data-embedding systemLAN, Tse-Hua; TEWFIK, Ahmed H.IEEE transactions on image processing. 2006, Vol 15, Num 8, pp 2431-2440, issn 1057-7149, 10 p.Article

Universal image steganalysis using rate-distortion curvesCELIKA, Mehmet U; SHARMA, Gaurav; TEKALP, A. Murat et al.SPIE proceedings series. 2004, pp 467-476, isbn 0-8194-5209-2, 10 p.Conference Paper

Customer identification for MPEG video based on digital fingerprintingDITTMANN, Jana; HAUER, Enrico; VIELHAUER, Claus et al.Lecture notes in computer science. 2001, Vol 2195, pp 383-390, issn 0302-9743, isbn 3-540-42680-9Conference Paper

Steganalysis of additive noise modelable information hidingHARMSEN, Jeremiah J; PEARLMAN, William A.SPIE proceedings series. 2003, pp 131-142, isbn 0-8194-4820-6, 12 p.Conference Paper

Data hiding using run length matchingJUNG, Ki-Hyun; YOO, Kee-Young.International journal of intelligent information and database systems (Print). 2009, Vol 3, Num 3, pp 311-325, issn 1751-5858, 15 p.Article

Encrypted signal-based reversible data hiding with public key cryptosystemCHEN, Yu-Chi; SHIU, Chih-Wei; GWOBOA HORNG et al.Journal of visual communication and image representation (Print). 2014, Vol 25, Num 5, pp 1164-1170, issn 1047-3203, 7 p.Article

Reversible Data Hiding With Optimal Value TransferXINPENG ZHANG.IEEE transactions on multimedia. 2013, Vol 15, Num 2, pp 316-325, issn 1520-9210, 10 p.Article

Pairwise Prediction-Error Expansion for Efficient Reversible Data HidingBO OU; XIAOLONG LI; YAO ZHAO et al.IEEE transactions on image processing. 2013, Vol 22, Num 11-12, pp 5010-5021, issn 1057-7149, 12 p.Article

Low power block-based watermarking algorithmPAI, Yu-Ting; RUAN, Shang-Jang.IEICE transactions on information and systems. 2006, Vol 89, Num 4, pp 1507-1514, issn 0916-8532, 8 p.Article

Data hiding capacity analysis for real images based on stochastic non-stationary geometrical modelsVOLOSHYNOVSKIY, S; KOVAL, O; DEGUILLAUME, F et al.SPIE proceedings series. 2003, pp 580-593, isbn 0-8194-4820-6, 14 p.Conference Paper

Hiding Data Reversibly in an Image via Increasing Differences between Two Neighboring PixelsLIN, Ching-Chiuan; HSUEH, Nien-Lin.IEICE transactions on information and systems. 2007, Vol 90, Num 12, pp 2053-2059, issn 0916-8532, 7 p.Article

  • Page / 9