Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 40 matches
- 2010
- Wadood Abdul, Philippe Carré, Philippe Gaborit:
Human visual system-based color image steganography using the contourlet transform. Media Forensics and Security 2010: 75410U - Félix Balado:
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations. Media Forensics and Security 2010: 754114 - Dieter Bardyn, Philippe Belet, Tim Dams, Ann Dooms, Peter Schelkens:
Feature point based image watermarking with insertions, deletions, and substitution codes. Media Forensics and Security 2010: 75410A - Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Efficient techniques for sensor fingerprint matching in large image and video databases. Media Forensics and Security 2010: 754109 - Joost van Beusekom, Marco Schreyer, Thomas M. Breuel:
Automatic counterfeit protection system code classification. Media Forensics and Security 2010: 75410F - Scott Craver, Jun Yu:
Subset selection circumvents the square root law. Media Forensics and Security 2010: 754103 - Jennifer L. Davidson, Jaikishan Jalan:
Feature selection for steganalysis using the Mahalanobis distance. Media Forensics and Security 2010: 754104 - Hany Farid, Mary J. Bravo:
Image forensic analyses that elude the human visual system. Media Forensics and Security 2010: 754106 - Xiaoying Feng, Gwenaël J. Doërr:
JPEG recompression detection. Media Forensics and Security 2010: 75410J - Tomás Filler, Jan Judas, Jessica J. Fridrich:
Minimizing embedding impact in steganography using trellis-coded quantization. Media Forensics and Security 2010: 754105 - Claude Fillion, Gaurav Sharma:
Detecting content adaptive scaling of images for forensic applications. Media Forensics and Security 2010: 75410Z - Thomas Gloe, Karsten Borowka, Antje Winkler:
Efficient estimation and large-scale evaluation of lateral chromatic aberration for digital image forensics. Media Forensics and Security 2010: 754107 - Miroslav Goljan, Jessica J. Fridrich, Mo Chen:
Sensor noise camera identification: countering counter-forensics. Media Forensics and Security 2010: 75410S - Miroslav Goljan, Jessica J. Fridrich, Tomás Filler:
Managing a large database of camera fingerprints. Media Forensics and Security 2010: 754108 - Taras Holotyak, Sviatoslav Voloshynovskiy, Fokko Beekhof, Oleksiy J. Koval:
Fast identification of highly distorted images. Media Forensics and Security 2010: 754116 - Tanya Ignatenko, Frans M. J. Willems:
On information leakage in fuzzy commitment. Media Forensics and Security 2010: 75410P - Ajith M. Kamath:
Reversible transformations may improve the quality of reversible watermarking. Media Forensics and Security 2010: 75410C - Eric Kee, Hany Farid:
Digital image authentication from thumbnails. Media Forensics and Security 2010: 75410E - Matthias Kirchner:
Efficient estimation of CFA pattern configuration in digital camera images. Media Forensics and Security 2010: 754111 - Matthias Kirchner, Jessica J. Fridrich:
On detection of median filtering in digital images. Media Forensics and Security 2010: 754110 - Jan Kodovský, Tomás Pevný, Jessica J. Fridrich:
Modern steganalysis can detect YASS. Media Forensics and Security 2010: 754102 - Oleksiy J. Koval, Sviatoslav Voloshynovskiy:
Multimodal object authentication with random projections: a worst-case approach. Media Forensics and Security 2010: 75410D - Wenjun Lu, Avinash L. Varna, Min Wu:
Forensic hash for multimedia information. Media Forensics and Security 2010: 75410Y - Aravind K. Mikkilineni, Nitin Khanna, Edward J. Delp:
Texture based attacks on intrinsic signature based printer identification. Media Forensics and Security 2010: 75410T - Abhishek Nagar, Karthik Nandakumar, Anil K. Jain:
Biometric template transformation: a security analysis. Media Forensics and Security 2010: 75410O - Abhishek Nagar, Shantanu Rane, Anthony Vetro:
Alignment and bit extraction for secure fingerprint biometrics. Media Forensics and Security 2010: 75410N - Lakshmanan Nataraj, Anindya Sarkar, B. S. Manjunath:
Improving re-sampling detection by adding noise. Media Forensics and Security 2010: 75410I - Kun Qian, Christian Krätzer, Michael Biermann, Jana Dittmann:
Audio annotation watermarking with robustness against DA/AD conversion. Media Forensics and Security 2010: 75410W - Alessia De Rosa, Francesca Uccheddu, Andrea Costanzo, Alessandro Piva, Mauro Barni:
Exploring image dependencies: a new challenge in image forensics. Media Forensics and Security 2010: 75410X - Anindya Sarkar, B. S. Manjunath:
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels. Media Forensics and Security 2010: 754113
skipping 10 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-31 19:22 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint