Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("data hiding")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 142

  • Page / 6
Export

Selection :

  • and

Communication over an acoustic channel using data hiding techniquesLAZIC, Nevena; AARABI, Parham.IEEE transactions on multimedia. 2006, Vol 8, Num 5, pp 918-924, issn 1520-9210, 7 p.Article

Reversible data hidingZHICHENG NI; SHI, Yun-Qing; ANSARI, Nirwan et al.IEEE transactions on circuits and systems for video technology. 2006, Vol 16, Num 3, pp 354-362, issn 1051-8215, 9 p.Article

Reversible data hiding employing histogram shifting using a rotated even―odd difference imageLEE, Sang-Kwang; YOO, Hyang-Mi; SUH, Jae-Won et al.New review of hypermedia and multimedia. 2013, Vol 19, Num 3-4, pp 234-247, issn 1361-4568, 14 p.Article

Capacity bounds and constructions for reversible data-hidingKALKER, Ton; WILLEMS, Frans M. J.SPIE proceedings series. 2003, pp 604-611, isbn 0-8194-4820-6, 8 p.Conference Paper

Fragile imperceptible digital watermark with privacy controlCOPPERSMITH, D; MINTZER, F; TRESSER, C et al.SPIE proceedings series. 1999, Vol 3657, pp 79-84, isbn 0-8194-3128-1Conference Paper

Reversible data hiding exploiting spatial correlation between sub-sampled imagesKIM, Kyung-Su; LEE, Min-Jeong; LEE, Hae-Yeoun et al.Pattern recognition. 2009, Vol 42, Num 11, pp 3083-3096, issn 0031-3203, 14 p.Article

Collusion resistant multimedia fingerprinting: A unified frameworkMIN WU; TRAPPE, Wade; WANG, Z. Jane et al.SPIE proceedings series. 2004, pp 748-759, isbn 0-8194-5209-2, 12 p.Conference Paper

Data hiding in image and video: Part II. Designs and applicationsMIN WU; HEATHER YU; BEDE LIU et al.IEEE transactions on image processing. 2003, Vol 12, Num 6, pp 696-705, issn 1057-7149, 10 p.Article

A lossless robust data hiding schemeZENG, Xian-Ting; PING, Ling-Di; PAN, Xue-Zeng et al.Pattern recognition. 2010, Vol 43, Num 4, pp 1656-1667, issn 0031-3203, 12 p.Article

Increasing the data hiding capacity and improving the security of a double-random phase-encoding technique based information hiding schemeJUN SANG; HONG XIANG; NONG SANG et al.Optics communications. 2009, Vol 282, Num 14, pp 2713-2721, issn 0030-4018, 9 p.Article

A novel high-capacity data-embedding systemLAN, Tse-Hua; TEWFIK, Ahmed H.IEEE transactions on image processing. 2006, Vol 15, Num 8, pp 2431-2440, issn 1057-7149, 10 p.Article

Universal image steganalysis using rate-distortion curvesCELIKA, Mehmet U; SHARMA, Gaurav; TEKALP, A. Murat et al.SPIE proceedings series. 2004, pp 467-476, isbn 0-8194-5209-2, 10 p.Conference Paper

Customer identification for MPEG video based on digital fingerprintingDITTMANN, Jana; HAUER, Enrico; VIELHAUER, Claus et al.Lecture notes in computer science. 2001, Vol 2195, pp 383-390, issn 0302-9743, isbn 3-540-42680-9Conference Paper

Data hiding using run length matchingJUNG, Ki-Hyun; YOO, Kee-Young.International journal of intelligent information and database systems (Print). 2009, Vol 3, Num 3, pp 311-325, issn 1751-5858, 15 p.Article

Encrypted signal-based reversible data hiding with public key cryptosystemCHEN, Yu-Chi; SHIU, Chih-Wei; GWOBOA HORNG et al.Journal of visual communication and image representation (Print). 2014, Vol 25, Num 5, pp 1164-1170, issn 1047-3203, 7 p.Article

Reversible Data Hiding With Optimal Value TransferXINPENG ZHANG.IEEE transactions on multimedia. 2013, Vol 15, Num 2, pp 316-325, issn 1520-9210, 10 p.Article

Pairwise Prediction-Error Expansion for Efficient Reversible Data HidingBO OU; XIAOLONG LI; YAO ZHAO et al.IEEE transactions on image processing. 2013, Vol 22, Num 11-12, pp 5010-5021, issn 1057-7149, 12 p.Article

Low power block-based watermarking algorithmPAI, Yu-Ting; RUAN, Shang-Jang.IEICE transactions on information and systems. 2006, Vol 89, Num 4, pp 1507-1514, issn 0916-8532, 8 p.Article

Data hiding capacity analysis for real images based on stochastic non-stationary geometrical modelsVOLOSHYNOVSKIY, S; KOVAL, O; DEGUILLAUME, F et al.SPIE proceedings series. 2003, pp 580-593, isbn 0-8194-4820-6, 14 p.Conference Paper

Robust Lossless Image Data Hiding Designed for Semi-Fragile Image AuthenticationZHICHENG NI; SHI, Yun Q; ANSARI, Nirwan et al.IEEE transactions on circuits and systems for video technology. 2008, Vol 18, Num 4, pp 497-509, issn 1051-8215, 13 p.Article

Digital watermarking for telltale tamper proofing and authentication : Identification and protection of multimedia informationKUNDUR, D; HATZINAKOS, D.Proceedings of the IEEE. 1999, Vol 87, Num 7, pp 1167-1180, issn 0018-9219Article

Spread spectrum image steganographyMARVEL, L. M; BONCELET, C. G; RETTER, C. T et al.IEEE transactions on image processing. 1999, Vol 8, Num 8, pp 1075-1083, issn 1057-7149Article

The use of watermarks in the protection of digital multimedia products : Identification and protection of multimedia informationVOYATZIS, G; PITAS, I.Proceedings of the IEEE. 1999, Vol 87, Num 7, pp 1197-1207, issn 0018-9219Article

Steganographic image transformationTAKANO, S; TANAKA, K; SUGIMURA, T et al.SPIE proceedings series. 1999, Vol 3657, pp 365-374, isbn 0-8194-3128-1Conference Paper

Coding and modulation in watermarking and data hidingBO TAO; ORCHARD, M. T.SPIE proceedings series. 1999, Vol 3657, pp 503-510, isbn 0-8194-3128-1Conference Paper

  • Page / 6