Search dblp for Publications

export results for "toc:db/conf/ih/ih2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ih/AlkabaniKKP08,
  author       = {Yousra Alkabani and
                  Farinaz Koushanfar and
                  Negar Kiyavash and
                  Miodrag Potkonjak},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Trusted Integrated Circuits: {A} Nondestructive Hidden Characteristics
                  Extraction Approach},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {102--117},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_8},
  doi          = {10.1007/978-3-540-88961-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AlkabaniKKP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BarbierA08,
  author       = {Johann Barbier and
                  St{\'{e}}phanie Alt},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Practical Insecurity for Effective Steganalysis},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {195--208},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_14},
  doi          = {10.1007/978-3-540-88961-8\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BarbierA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Bohme08,
  author       = {Rainer B{\"{o}}hme},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Weighted Stego-Image Steganalysis for {JPEG} Covers},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {178--194},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_13},
  doi          = {10.1007/978-3-540-88961-8\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Bohme08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenHYYLZZ08,
  author       = {Zhili Chen and
                  Liusheng Huang and
                  Zhenshan Yu and
                  Wei Yang and
                  Lingjun Li and
                  Xueling Zheng and
                  Xinxin Zhao},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Linguistic Steganography Detection Using Statistical Characteristics
                  of Correlations between Words},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {224--235},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_16},
  doi          = {10.1007/978-3-540-88961-8\_16},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenHYYLZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CraverLYA08,
  author       = {Scott Craver and
                  Enping Li and
                  Jun Yu and
                  Idris M. Atakli},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {A Supraliminal Channel in a Videoconferencing Application},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {283--293},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_20},
  doi          = {10.1007/978-3-540-88961-8\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CraverLYA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Esponda08,
  author       = {Fernando Esponda},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Hiding a Needle in a Haystack Using Negative Databases},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_2},
  doi          = {10.1007/978-3-540-88961-8\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Esponda08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FangC08,
  author       = {Chengfang Fang and
                  Ee{-}Chien Chang},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Information Leakage in Optimal Anonymized and Diversified Data},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_3},
  doi          = {10.1007/978-3-540-88961-8\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/FangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FuronGC08,
  author       = {Teddy Furon and
                  Arnaud Guyader and
                  Fr{\'{e}}d{\'{e}}ric C{\'{e}}rou},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {On the Design and Optimization of Tardos Probabilistic Fingerprinting
                  Codes},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {341--356},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_24},
  doi          = {10.1007/978-3-540-88961-8\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/FuronGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HeZT08,
  author       = {Hongjie He and
                  Jiashu Zhang and
                  Heng{-}Ming Tai},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Block-Chain Based Fragile Watermarking Scheme with Superior Localization},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {147--160},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_11},
  doi          = {10.1007/978-3-540-88961-8\_11},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HeZT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HoC08,
  author       = {Nicholas Zhong{-}Yang Ho and
                  Ee{-}Chien Chang},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Residual Information of Redacted Images Hidden in the Compression
                  Artifacts},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_7},
  doi          = {10.1007/978-3-540-88961-8\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KandiahHK08,
  author       = {Vinayak Kandiah and
                  Dijiang Huang and
                  Harsh Kapoor},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {C-Mix: {A} Lightweight Anonymous Routing Approach},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {294--308},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_21},
  doi          = {10.1007/978-3-540-88961-8\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KandiahHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Ker08,
  author       = {Andrew D. Ker},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Perturbation Hiding and the Batch Steganography Problem},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {45--59},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_4},
  doi          = {10.1007/978-3-540-88961-8\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Ker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KuribayashiM08,
  author       = {Minoru Kuribayashi and
                  Masakatu Morii},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Iterative Detection Method for CDMA-Based Fingerprinting Scheme},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {357--371},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_25},
  doi          = {10.1007/978-3-540-88961-8\_25},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KuribayashiM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MathonBCP08,
  author       = {Benjamin Mathon and
                  Patrick Bas and
                  Fran{\c{c}}ois Cayre and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Distortion Optimization of Model-Based Secure Embedding Schemes for
                  Data-Hiding},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {325--340},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_23},
  doi          = {10.1007/978-3-540-88961-8\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MathonBCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NiZFHWK08,
  author       = {Jiangqun Ni and
                  Rongyue Zhang and
                  Chen Fang and
                  Jiwu Huang and
                  Chuntao Wang and
                  Hyoung{-}Joong Kim},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Watermarking Security Incorporating Natural Scene Statistics},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {132--146},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_10},
  doi          = {10.1007/978-3-540-88961-8\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/NiZFHWK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PevnyF08,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Jessica J. Fridrich},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Benchmarking for Steganography},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {251--267},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_18},
  doi          = {10.1007/978-3-540-88961-8\_18},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/PevnyF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SalamonCR08,
  author       = {Csaba Salamon and
                  Jonathan R. Corney and
                  James M. Ritchie},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Information Hiding through Variance of the Parametric Orientation
                  Underlying a B-rep Face},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {268--282},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_19},
  doi          = {10.1007/978-3-540-88961-8\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SalamonCR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangF08,
  author       = {Weihong Wang and
                  Hany Farid},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Detecting Re-projected Video},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_6},
  doi          = {10.1007/978-3-540-88961-8\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WatanabeNS08,
  author       = {Takashi Watanabe and
                  Hiroto Nagayoshi and
                  Hiroshi Sako},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {A Display Technique for Preventing Electromagnetic Eavesdropping Using
                  Color Mixture Characteristic of Human Eyes},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_1},
  doi          = {10.1007/978-3-540-88961-8\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WatanabeNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Westfeld08,
  author       = {Andreas Westfeld},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Generic Adoption of Spatial Steganalysis to Transformed Domain},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_12},
  doi          = {10.1007/978-3-540-88961-8\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Westfeld08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WuDC08,
  author       = {Hao{-}Tian Wu and
                  Jean{-}Luc Dugelay and
                  Yiu{-}ming Cheung},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {A Data Mapping Method for Steganography and Its Application to Images},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {236--250},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_17},
  doi          = {10.1007/978-3-540-88961-8\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WuDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WuS08,
  author       = {Jiang Wu and
                  Douglas R. Stinson},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Authorship Proof for Textual Document},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {209--223},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_15},
  doi          = {10.1007/978-3-540-88961-8\_15},
  timestamp    = {Fri, 23 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhangZW08,
  author       = {Weiming Zhang and
                  Xinpeng Zhang and
                  Shuozhong Wang},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Maximizing Steganographic Embedding Efficiency by Combining Hamming
                  Codes and Wet Paper Codes},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_5},
  doi          = {10.1007/978-3-540-88961-8\_5},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhangZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaoL08,
  author       = {Xianfeng Zhao and
                  Ning Li},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Reversible Watermarking with Subliminal Channel},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {118--131},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_9},
  doi          = {10.1007/978-3-540-88961-8\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaoL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaoXD08,
  author       = {Xianfeng Zhao and
                  Bingbing Xia and
                  Yi Deng},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Strengthening QIM-Based Watermarking by Non-uniform Discrete Cosine
                  Transform},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {309--324},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_22},
  doi          = {10.1007/978-3-540-88961-8\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaoXD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2008,
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8},
  doi          = {10.1007/978-3-540-88961-8},
  isbn         = {978-3-540-88960-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics