default search action
Transactions on Data Hiding and Multimedia Security, Volume 3, 2008
- Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security III. Lecture Notes in Computer Science 4920, Springer 2008, ISBN 978-3-540-69016-0 - Jürgen Bierbrauer, Jessica J. Fridrich:
Constructing Good Covering Codes for Applications in Steganography. 1-22 - Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling:
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. 23-32 - Mansour Jamzad, Zahra Zahedi Kermani:
Secure Steganography Using Gabor Filter and Neural Networks. 33-49 - Ilaria Venturini:
Oracle Channels. 50-69 - José-Emilio Vila-Forcén, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Fernando Pérez-González, Thierry Pun:
Quantization-Based Methods: Additive Attacks Performance Analysis. 70-90
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.