Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ih/ih2008.bht:"
@inproceedings{DBLP:conf/ih/AlkabaniKKP08, author = {Yousra Alkabani and Farinaz Koushanfar and Negar Kiyavash and Miodrag Potkonjak}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Trusted Integrated Circuits: {A} Nondestructive Hidden Characteristics Extraction Approach}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {102--117}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_8}, doi = {10.1007/978-3-540-88961-8\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/AlkabaniKKP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BarbierA08, author = {Johann Barbier and St{\'{e}}phanie Alt}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Practical Insecurity for Effective Steganalysis}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {195--208}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_14}, doi = {10.1007/978-3-540-88961-8\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BarbierA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Bohme08, author = {Rainer B{\"{o}}hme}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Weighted Stego-Image Steganalysis for {JPEG} Covers}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {178--194}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_13}, doi = {10.1007/978-3-540-88961-8\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Bohme08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenHYYLZZ08, author = {Zhili Chen and Liusheng Huang and Zhenshan Yu and Wei Yang and Lingjun Li and Xueling Zheng and Xinxin Zhao}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {224--235}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_16}, doi = {10.1007/978-3-540-88961-8\_16}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChenHYYLZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CraverLYA08, author = {Scott Craver and Enping Li and Jun Yu and Idris M. Atakli}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {A Supraliminal Channel in a Videoconferencing Application}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {283--293}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_20}, doi = {10.1007/978-3-540-88961-8\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CraverLYA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Esponda08, author = {Fernando Esponda}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Hiding a Needle in a Haystack Using Negative Databases}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {15--29}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_2}, doi = {10.1007/978-3-540-88961-8\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Esponda08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FangC08, author = {Chengfang Fang and Ee{-}Chien Chang}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Information Leakage in Optimal Anonymized and Diversified Data}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {30--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_3}, doi = {10.1007/978-3-540-88961-8\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/FangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FuronGC08, author = {Teddy Furon and Arnaud Guyader and Fr{\'{e}}d{\'{e}}ric C{\'{e}}rou}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {341--356}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_24}, doi = {10.1007/978-3-540-88961-8\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/FuronGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HeZT08, author = {Hongjie He and Jiashu Zhang and Heng{-}Ming Tai}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Block-Chain Based Fragile Watermarking Scheme with Superior Localization}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {147--160}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_11}, doi = {10.1007/978-3-540-88961-8\_11}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HeZT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HoC08, author = {Nicholas Zhong{-}Yang Ho and Ee{-}Chien Chang}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Residual Information of Redacted Images Hidden in the Compression Artifacts}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {87--101}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_7}, doi = {10.1007/978-3-540-88961-8\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KandiahHK08, author = {Vinayak Kandiah and Dijiang Huang and Harsh Kapoor}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {C-Mix: {A} Lightweight Anonymous Routing Approach}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {294--308}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_21}, doi = {10.1007/978-3-540-88961-8\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KandiahHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Ker08, author = {Andrew D. Ker}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Perturbation Hiding and the Batch Steganography Problem}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {45--59}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_4}, doi = {10.1007/978-3-540-88961-8\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Ker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KuribayashiM08, author = {Minoru Kuribayashi and Masakatu Morii}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Iterative Detection Method for CDMA-Based Fingerprinting Scheme}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {357--371}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_25}, doi = {10.1007/978-3-540-88961-8\_25}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KuribayashiM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MathonBCP08, author = {Benjamin Mathon and Patrick Bas and Fran{\c{c}}ois Cayre and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {325--340}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_23}, doi = {10.1007/978-3-540-88961-8\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/MathonBCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NiZFHWK08, author = {Jiangqun Ni and Rongyue Zhang and Chen Fang and Jiwu Huang and Chuntao Wang and Hyoung{-}Joong Kim}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Watermarking Security Incorporating Natural Scene Statistics}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {132--146}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_10}, doi = {10.1007/978-3-540-88961-8\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/NiZFHWK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/PevnyF08, author = {Tom{\'{a}}s Pevn{\'{y}} and Jessica J. Fridrich}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Benchmarking for Steganography}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {251--267}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_18}, doi = {10.1007/978-3-540-88961-8\_18}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/PevnyF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SalamonCR08, author = {Csaba Salamon and Jonathan R. Corney and James M. Ritchie}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Information Hiding through Variance of the Parametric Orientation Underlying a B-rep Face}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {268--282}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_19}, doi = {10.1007/978-3-540-88961-8\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/SalamonCR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangF08, author = {Weihong Wang and Hany Farid}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Detecting Re-projected Video}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {72--86}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_6}, doi = {10.1007/978-3-540-88961-8\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WatanabeNS08, author = {Takashi Watanabe and Hiroto Nagayoshi and Hiroshi Sako}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {1--14}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_1}, doi = {10.1007/978-3-540-88961-8\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WatanabeNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Westfeld08, author = {Andreas Westfeld}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Generic Adoption of Spatial Steganalysis to Transformed Domain}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {161--177}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_12}, doi = {10.1007/978-3-540-88961-8\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Westfeld08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WuDC08, author = {Hao{-}Tian Wu and Jean{-}Luc Dugelay and Yiu{-}ming Cheung}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {A Data Mapping Method for Steganography and Its Application to Images}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {236--250}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_17}, doi = {10.1007/978-3-540-88961-8\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WuDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WuS08, author = {Jiang Wu and Douglas R. Stinson}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Authorship Proof for Textual Document}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {209--223}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_15}, doi = {10.1007/978-3-540-88961-8\_15}, timestamp = {Fri, 23 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WuS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangZW08, author = {Weiming Zhang and Xinpeng Zhang and Shuozhong Wang}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {60--71}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_5}, doi = {10.1007/978-3-540-88961-8\_5}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhangZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoL08, author = {Xianfeng Zhao and Ning Li}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Reversible Watermarking with Subliminal Channel}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {118--131}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_9}, doi = {10.1007/978-3-540-88961-8\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoXD08, author = {Xianfeng Zhao and Bingbing Xia and Yi Deng}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine Transform}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {309--324}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_22}, doi = {10.1007/978-3-540-88961-8\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoXD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2008, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8}, doi = {10.1007/978-3-540-88961-8}, isbn = {978-3-540-88960-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.