Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ti.\*:("IH 2004 : information hiding (Toronto ON, 23-25 May 2004, revised selected papers)")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 26

  • Page / 2
Export

Selection :

  • and

IH 2004 : information hiding (Toronto ON, 23-25 May 2004, revised selected papers)Fridrich, Jessica.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-24207-4, IX, 369 p, isbn 3-540-24207-4Conference Proceedings

Threading software watermarksNAGRA, Jasvir; THOMBORSON, Clark.Lecture notes in computer science. 2004, pp 208-223, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

An implementation of, and attacks on, zero-knowledge watermarkingCRAVER, Scott; LIU, Bede; WOLF, Wayne et al.Lecture notes in computer science. 2004, pp 1-12, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

Empirical and theoretical evaluation of active probing attacks and their countermeasuresXINWEN FU; GRAHAM, Bryan; DONG XUAN et al.Lecture notes in computer science. 2004, pp 266-281, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

Covert channels for collusion in online computer gamesMURDOCH, Steven J; ZIELINSKI, Piotr.Lecture notes in computer science. 2004, pp 355-369, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Exploiting preserved statistics for steganalysisBÖHME, Rainer; WESTFELD, Andreas.Lecture notes in computer science. 2004, pp 82-96, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Statistical tools for digital forensicsPOPESCU, Alin C; FARID, Hany.Lecture notes in computer science. 2004, pp 128-147, issn 0302-9743, isbn 3-540-24207-4, 20 p.Conference Paper

The hitting set attack on anonymity protocolsKESDOGAN, Dogan; PIMENIDIS, Lexi.Lecture notes in computer science. 2004, pp 326-339, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper

On the possibility of non-invertible watermarking schemesQIMING LI; CHANG, Ee-Chien.Lecture notes in computer science. 2004, pp 13-24, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

Improved detection of LSB steganography in grayscale imagesKER, Andrew D.Lecture notes in computer science. 2004, pp 97-115, issn 0302-9743, isbn 3-540-24207-4, 19 p.Conference Paper

Information hiding in finite state machineLIN YUAN; GANG QU.Lecture notes in computer science. 2004, pp 340-354, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Relative generic computational forensic techniquesWONG, Jennifer L; POTKONJAK, Miodrag.Lecture notes in computer science. 2004, pp 148-163, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

Syntax and semantics-preserving application-layer protocol steganographyLUCENA, Norka B; PEASE, James; YADOLLAHPOUR, Payman et al.Lecture notes in computer science. 2004, pp 164-179, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

Graph Theoretic Software watermarks: Implementation, analysis, and attacksCOLLBERG, Christian; HUNTWORK, Andrew; CARTER, Edward et al.Lecture notes in computer science. 2004, pp 192-207, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

Soft IP protection: Watermarking HDL codesLIN YUAN; PARI, Pushkin R; GANG QU et al.Lecture notes in computer science. 2004, pp 224-238, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

An asymmetric security mechanism for navigation signalsKUHN, Markus G.Lecture notes in computer science. 2004, pp 239-252, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper

Reversing global and local geometrical distortions in image watermarkingBOGUMIŁ, Dariusz.Lecture notes in computer science. 2004, pp 25-37, issn 0302-9743, isbn 3-540-24207-4, 13 p.Conference Paper

Statistical disclosure or intersection attacks on anonymity systemsDANEZIS, George; SERJANTOV, Andrei.Lecture notes in computer science. 2004, pp 293-308, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

Reasoning about the anonymity provided by pool mixes that generate dummy trafficDIAZ, Claudia; PRENEEL, Bart.Lecture notes in computer science. 2004, pp 309-325, issn 0302-9743, isbn 3-540-24207-4, 17 p.Conference Paper

A method of linguistic steganography based on collocationally-verified synonymyBOLSHAKOV, Igor A.Lecture notes in computer science. 2004, pp 180-191, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

An improved sample pairs method for detection of LSB embeddingPEIZHONG LU; XIANGYANG LUO; QINGYANG TANG et al.Lecture notes in computer science. 2004, pp 116-127, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

On achievable regions of public multiple-access Gaussian watermarking systemsWEI SUN; YANG, En-Hui.Lecture notes in computer science. 2004, pp 38-51, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper

Optimization and evaluation of randomized c-secure CRT code defined on polynomial ringMURATANI, Hirofumi.Lecture notes in computer science. 2004, pp 282-292, issn 0302-9743, isbn 3-540-24207-4, 11 p.Conference Paper

Analysis of COT-based fingerprinting schemes: New approach to design practical and secure fingerprinting schemeCHOI, Jae-Gwi; PARK, Ji-Hwan; KWON, Ki-Ryong et al.Lecture notes in computer science. 2004, pp 253-265, issn 0302-9743, isbn 3-540-24207-4, 13 p.Conference Paper

Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemesFRIDRICH, Jessica.Lecture notes in computer science. 2004, pp 67-81, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

  • Page / 2