


default search action
8. Information Hiding 2006: Alexandria, VA, USA
- Jan Camenisch, Christian S. Collberg, Neil F. Johnson, Phil Sallee:

Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers. Lecture Notes in Computer Science 4437, Springer 2007, ISBN 978-3-540-74123-7
Hamiltonian Mechanics
- Patrick Bas, François Cayre:

Natural Watermarking: A Secure Spread Spectrum Technique for WOA. 1-14 - Scott Craver:

An Improved Asymmetric Watermarking System Using Matrix Embedding. 15-25 - Michael Malkin, Ton Kalker:

A Cryptographic Method for Secure Watermark Detection. 26-41 - R. C. Chakinala, Abishek Kumarasubramanian, R. Manokaran, Guevara Noubir, C. Pandu Rangan, Ravi Sundaram:

Steganographic Communication in Ordered Channels. 42-57 - Grzegorz Lewandowski, Norka B. Lucena, Steve J. Chapin:

Analyzing Network-Aware Active Wardens in IPv6. 58-77
Video Watermarking by Using Geometic Warping Without Visible Artifacts
- Dima Pröfrock, Mathias Schlauweg, Erika Müller:

Video Watermarking by Using Geometric Warping Without Visible Artifacts. 78-92 - Shijun Xiang, Jiwu Huang, Rui Yang:

Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. 93-108 - Richard Bergmair, Stefan Katzenbeisser:

Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. 109-123 - Keye Martin, Ira S. Moskowitz:

Noisy Timing Channels with Binary Inputs and Outputs. 124-144 - André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:

A Computational Model for Watermark Robustness. 145-160 - Adam L. Young, Moti Yung:

Hiding Information Hiding. 161-171 - Wolfgang Funk:

Reversible Watermarking of NURBS-Based CAD Models. 172-187 - Hao-Tian Wu, Yiu-ming Cheung:

A High-Capacity Data Hiding Method for Polygonal Meshes. 188-200 - Andreas Westfeld:

Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television. 201-215 - Gang Tan

, Yuqun Chen, Mariusz H. Jakubowski:
Delayed and Controlled Failures in Tamper-Resistant Software. 216-231 - Bertrand Anckaert, Matias Madou, Koen De Bosschere:

A Model for Self-Modifying Code. 232-248 - Yun Q. Shi, Chunhua Chen, Wen Chen:

A Markov Process Based Approach to Effective Attacking JPEG Steganography. 249-264 - Andrew D. Ker:

Batch Steganography and Pooled Steganalysis. 265-281 - Jessica J. Fridrich, Petr Lisonek, David Soukal:

On Steganographic Embedding Efficiency. 282-296 - Tri Van Le, Kaoru Kurosawa:

Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. 297-313 - Younhee Kim, Zoran Duric, Dana Richards:

Modified Matrix Encoding Technique for Minimal Distortion Steganography. 314-327 - Jae-Min Seol, Seong-Whan Kim:

Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. 328-342 - Amir Houman Sadr, Shahrokh Ghaemmaghami:

A Collusion-Resistant Video Watermarking Scheme. 343-354 - Adam L. Young, Moti Yung:

An Elliptic Curve Backdoor Algorithm for RSASSA. 355-374 - Jens-Matthias Bohli, María Isabel González Vasco

, Rainer Steinwandt:
A Subliminal-Free Variant of ECDSA. 375-387

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














