


default search action
Transactions on Data Hiding and Multimedia Security, Volume 6, 2011
- Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao:
Transactions on Data Hiding and Multimedia Security VI. Lecture Notes in Computer Science 6730, Springer 2011, ISBN 978-3-642-24555-8
Content Protection and Forensics
- Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng
, Wei Su:
Markovian Rake Transform for Digital Image Tampering Detection. 1-17 - Huijuan Yang
, Xudong Jiang
, Alex C. Kot:
Embedding Binary Watermarks in Dual-Tree Complex Wavelets Domain for Access Control of Digital Images. 18-36 - A. Venkata Subramanyam, Sabu Emmanuel:
Robust Watermarking of Compressed JPEG Images in Encrypted Domain. 37-57 - Shaohui Liu
, Hongxun Yao, Shengping Zhang, Wen Gao:
A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units. 58-82
Regular Paper
- Shijun Xiang, Hyoung-Joong Kim:
Histogram-Based Image Hashing for Searching Content-Preserving Copies. 83-108

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.