Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/tdhms:"
@article{DBLP:journals/tdhms/AycockC15, author = {John Aycock and Daniel Medeiros Nunes de Castro}, title = {Permutation Steganography in {FAT} Filesystems}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {10}, pages = {92--105}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46739-8\_6}, doi = {10.1007/978-3-662-46739-8\_6}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/AycockC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/EchizenYG15, author = {Isao Echizen and Takayuki Yamada and Seiichi Gohshi}, title = {{IR} Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {10}, pages = {38--54}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46739-8\_3}, doi = {10.1007/978-3-662-46739-8\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/EchizenYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/JohnsonSLGB15, author = {Benjamin Johnson and Pascal Sch{\"{o}}ttle and Aron Laszka and Jens Grossklags and Rainer B{\"{o}}hme}, title = {Adaptive Steganography and Steganalysis with Fixed-Size Embedding}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {10}, pages = {69--91}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46739-8\_5}, doi = {10.1007/978-3-662-46739-8\_5}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/JohnsonSLGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LiuC15, author = {Fang Liu and Lee{-}Ming Cheng}, title = {Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {10}, pages = {21--37}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46739-8\_2}, doi = {10.1007/978-3-662-46739-8\_2}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LiuC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/NealE15, author = {Harrison Neal and Hala ElAarag}, title = {A Reliable Covert Communication Scheme Based on VoIP Steganography}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {10}, pages = {55--68}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46739-8\_4}, doi = {10.1007/978-3-662-46739-8\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/NealE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/XiaZFW15, author = {Bingbing Xia and Xianfeng Zhao and Dengguo Feng and Mingsheng Wang}, title = {Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {10}, pages = {1--20}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46739-8\_1}, doi = {10.1007/978-3-662-46739-8\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/XiaZFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2015-10, editor = {Yun Q. Shi}, title = {Transactions on Data Hiding and Multimedia Security {X}}, series = {Lecture Notes in Computer Science}, volume = {8948}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46739-8}, doi = {10.1007/978-3-662-46739-8}, isbn = {978-3-662-46738-1}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2015-10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/CimatoYW14, author = {Stelvio Cimato and James C. N. Yang and Chih{-}Cheng Wu}, title = {Visual Cryptography Based Watermarking}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {91--109}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_6}, doi = {10.1007/978-3-642-55046-1\_6}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/CimatoYW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/FuY14, author = {Zhengxin Fu and Bin Yu}, title = {Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {42--56}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_3}, doi = {10.1007/978-3-642-55046-1\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/FuY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LiuGWY14, author = {Feng Liu and Teng Guo and Chuan Kun Wu and Ching{-}Nung Yang}, title = {Flexible Visual Cryptography Scheme and Its Application}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {110--130}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_7}, doi = {10.1007/978-3-642-55046-1\_7}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LiuGWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LiuYLW14, author = {Feng Liu and Wei Qi Yan and Peng Li and Chuan Kun Wu}, title = {{ESSVCS:} An Enriched Secret Sharing Visual Cryptography}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {1--24}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_1}, doi = {10.1007/978-3-642-55046-1\_1}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LiuYLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/Yamaguchi14, author = {Yasushi Yamaguchi}, title = {Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {25--41}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_2}, doi = {10.1007/978-3-642-55046-1\_2}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/Yamaguchi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/YampolskiyMH14, author = {Roman V. Yampolskiy and Jovan David Rebolledo M{\'{e}}ndez and Musa Hindi}, title = {Password Protected Visual Cryptography via Cellular Automaton Rule 30}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {57--67}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_4}, doi = {10.1007/978-3-642-55046-1\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/YampolskiyMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/YanWESN14, author = {Xuehu Yan and Shen Wang and Ahmed A. Abd El{-}Latif and Jianzhi Sang and Xiamu Niu}, title = {A Novel Perceptual Secret Sharing Scheme}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {68--90}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_5}, doi = {10.1007/978-3-642-55046-1\_5}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/YanWESN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2014-9, editor = {Yun Q. Shi and Feng Liu and WeiQi Yan}, title = {Transactions on Data Hiding and Multimedia Security {IX} - Special Issue on Visual Cryptography}, series = {Lecture Notes in Computer Science}, volume = {8363}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1}, doi = {10.1007/978-3-642-55046-1}, isbn = {978-3-642-55045-4}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2014-9.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/Al-AssamASJ12, author = {Hisham Al{-}Assam and Ali J. Abboud and Harin Sellahewa and Sabah Jassim}, title = {Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {8}, pages = {1--18}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31971-6\_1}, doi = {10.1007/978-3-642-31971-6\_1}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/Al-AssamASJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/CaoK12, author = {Hong Cao and Alex C. Kot}, title = {Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {7}, pages = {63--81}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28693-3\_5}, doi = {10.1007/978-3-642-28693-3\_5}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/CaoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/EchizenYG12, author = {Isao Echizen and Takayuki Yamada and Seiichi Gohshi}, title = {{IR} Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {7}, pages = {34--51}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28693-3\_3}, doi = {10.1007/978-3-642-28693-3\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/EchizenYG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/Gloe12, author = {Thomas Gloe}, title = {Feature-Based Forensic Camera Model Identification}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {8}, pages = {42--62}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31971-6\_3}, doi = {10.1007/978-3-642-31971-6\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/Gloe12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/KraetzerD12, author = {Christian Kraetzer and Jana Dittmann}, title = {Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {8}, pages = {80--101}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31971-6\_5}, doi = {10.1007/978-3-642-31971-6\_5}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/KraetzerD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/MakrushinSV12, author = {Andrey Makrushin and Tobias Scheidat and Claus Vielhauer}, title = {Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {8}, pages = {19--41}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31971-6\_2}, doi = {10.1007/978-3-642-31971-6\_2}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/MakrushinSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/MeerwaldU12, author = {Peter Meerwald and Andreas Uhl}, title = {An Efficient Robust Watermarking Method Integrated in {H.264/SVC}}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {7}, pages = {1--14}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28693-3\_1}, doi = {10.1007/978-3-642-28693-3\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdhms/MeerwaldU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/SurRM12, author = {Arijit Sur and Vignesh Ramanathan and Jayanta Mukherjee}, title = {Secure Steganography Using Randomized Cropping}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {7}, pages = {82--95}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28693-3\_6}, doi = {10.1007/978-3-642-28693-3\_6}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/SurRM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/WuC12, author = {Hao{-}Tian Wu and Yiu{-}ming Cheung}, title = {Secure Watermarking on 3D Geometry via {ICA} and Orthogonal Transformation}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {7}, pages = {52--62}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28693-3\_4}, doi = {10.1007/978-3-642-28693-3\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/WuC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/YamadaEY12, author = {Takaaki Yamada and Isao Echizen and Hiroshi Yoshiura}, title = {PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {7}, pages = {15--33}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28693-3\_2}, doi = {10.1007/978-3-642-28693-3\_2}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/YamadaEY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/ZhaoSA12, author = {Hong Zhao and Yun Q. Shi and Nirwan Ansari}, title = {Steganography in Streaming Multimedia over Networks}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {7}, pages = {96--114}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28693-3\_7}, doi = {10.1007/978-3-642-28693-3\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/ZhaoSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/ZmudzinskiSB12, author = {Sascha Zmudzinski and Martin Steinebach and Moazzam Butt}, title = {Watermark Embedding Using Audio Fingerprinting}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {8}, pages = {63--79}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31971-6\_4}, doi = {10.1007/978-3-642-31971-6\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/ZmudzinskiSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2012-7, editor = {Yun Q. Shi}, title = {Transactions on Data Hiding and Multimedia Security {VII}}, series = {Lecture Notes in Computer Science}, volume = {7110}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28693-3}, doi = {10.1007/978-3-642-28693-3}, isbn = {978-3-642-28692-6}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2012-7.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2012-8, editor = {Yun Q. Shi and Stefan Katzenbeisser}, title = {Transactions on Data Hiding and Multimedia Security {VIII} - Special Issue on Pattern Recognition for {IT} Security}, series = {Lecture Notes in Computer Science}, volume = {7228}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31971-6}, doi = {10.1007/978-3-642-31971-6}, isbn = {978-3-642-31970-9}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2012-8.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LiuYZG11, author = {Shaohui Liu and Hongxun Yao and Shengping Zhang and Wen Gao}, title = {A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {6}, pages = {58--82}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24556-5\_4}, doi = {10.1007/978-3-642-24556-5\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LiuYZG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/SubramanyamE11, author = {A. Venkata Subramanyam and Sabu Emmanuel}, title = {Robust Watermarking of Compressed {JPEG} Images in Encrypted Domain}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {6}, pages = {37--57}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24556-5\_3}, doi = {10.1007/978-3-642-24556-5\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/SubramanyamE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/SutthiwanSZNS11, author = {Patchara Sutthiwan and Yun Q. Shi and Hong Zhao and Tian{-}Tsong Ng and Wei Su}, title = {Markovian Rake Transform for Digital Image Tampering Detection}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {6}, pages = {1--17}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24556-5\_1}, doi = {10.1007/978-3-642-24556-5\_1}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/SutthiwanSZNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/XiangK11, author = {Shijun Xiang and Hyoung{-}Joong Kim}, title = {Histogram-Based Image Hashing for Searching Content-Preserving Copies}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {6}, pages = {83--108}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24556-5\_5}, doi = {10.1007/978-3-642-24556-5\_5}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/XiangK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/YangJK11, author = {Huijuan Yang and Xudong Jiang and Alex C. Kot}, title = {Embedding Binary Watermarks in Dual-Tree Complex Wavelets Domain for Access Control of Digital Images}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {6}, pages = {18--36}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24556-5\_2}, doi = {10.1007/978-3-642-24556-5\_2}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/YangJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2011-6, editor = {Yun Q. Shi and Sabu Emmanuel and Mohan S. Kankanhalli and Shih{-}Fu Chang and Regunathan Radhakrishnan and Fulong Ma and Li Zhao}, title = {Transactions on Data Hiding and Multimedia Security {VI}}, series = {Lecture Notes in Computer Science}, volume = {6730}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24556-5}, doi = {10.1007/978-3-642-24556-5}, isbn = {978-3-642-24555-8}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2011-6.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/ChaK10, author = {Byung{-}Ho Cha and C.{-}C. Jay Kuo}, title = {Collusion-Resistant Fingerprinting Systems: Review and Recent Results}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {5}, pages = {34--50}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14298-7\_3}, doi = {10.1007/978-3-642-14298-7\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/ChaK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/ItoK10, author = {Izumi Ito and Hitoshi Kiya}, title = {Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {5}, pages = {51--69}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14298-7\_4}, doi = {10.1007/978-3-642-14298-7\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/ItoK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LaadjelBKNY10, author = {Moussadek Laadjel and Ahmed Bouridane and Fatih Kurugollu and Omar Nibouche and WeiQi Yan}, title = {Partial Palmprint Matching Using Invariant Local Minutiae Descriptors}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {5}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14298-7\_1}, doi = {10.1007/978-3-642-14298-7\_1}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LaadjelBKNY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/MetternichWS10, author = {Michael J. Metternich and Marcel Worring and Arnold W. M. Smeulders}, title = {Color Based Tracing in Real-Life Surveillance Data}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {5}, pages = {18--33}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14298-7\_2}, doi = {10.1007/978-3-642-14298-7\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdhms/MetternichWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/WeirY10, author = {Jonathan Weir and WeiQi Yan}, title = {A Comprehensive Study of Visual Cryptography}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {5}, pages = {70--105}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14298-7\_5}, doi = {10.1007/978-3-642-14298-7\_5}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/WeirY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/WeirY10a, author = {Jonathan Weir and WeiQi Yan}, title = {Secure Masks for Visual Cryptography}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {5}, pages = {106--128}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14298-7\_6}, doi = {10.1007/978-3-642-14298-7\_6}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/WeirY10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2010-5, editor = {Yun Q. Shi}, title = {Transactions on Data Hiding and Multimedia Security {V}}, series = {Lecture Notes in Computer Science}, volume = {6010}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14298-7}, doi = {10.1007/978-3-642-14298-7}, isbn = {978-3-642-14297-0}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2010-5.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/JiangHT09, author = {Weina Jiang and Anthony T. S. Ho and Helen Treharne}, title = {A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {4}, pages = {65--83}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01757-5\_4}, doi = {10.1007/978-3-642-01757-5\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/JiangHT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LiuT09, author = {Tsung{-}Yuan Liu and Wen{-}Hsiang Tsai}, title = {Robust Watermarking in Slides of Presentations by Blank Space Coloring: {A} New Approach}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {4}, pages = {49--64}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01757-5\_3}, doi = {10.1007/978-3-642-01757-5\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LiuT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/PiperS09, author = {Angela Piper and Reihaneh Safavi{-}Naini}, title = {How to Compare Image Watermarking Algorithms}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {4}, pages = {1--28}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01757-5\_1}, doi = {10.1007/978-3-642-01757-5\_1}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/PiperS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/QiQ09, author = {Xiaojun Qi and Ji Qi}, title = {A Desynchronization Resilient Watermarking Scheme}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {4}, pages = {29--48}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01757-5\_2}, doi = {10.1007/978-3-642-01757-5\_2}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/QiQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/XuanSCTNT09, author = {Guorong Xuan and Yun Q. Shi and Peiqi Chai and Jianzhong Teng and Zhicheng Ni and Xuefeng Tong}, title = {Optimum Histogram Pair Based Image Lossless Data Embedding}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {4}, pages = {84--102}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01757-5\_5}, doi = {10.1007/978-3-642-01757-5\_5}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/XuanSCTNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2009-4, editor = {Yun Q. Shi}, title = {Transactions on Data Hiding and Multimedia Security {IV}}, series = {Lecture Notes in Computer Science}, volume = {5510}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01757-5}, doi = {10.1007/978-3-642-01757-5}, isbn = {978-3-642-01756-8}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2009-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/BierbrauerF08, author = {J{\"{u}}rgen Bierbrauer and Jessica J. Fridrich}, title = {Constructing Good Covering Codes for Applications in Steganography}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {3}, pages = {1--22}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69019-1\_1}, doi = {10.1007/978-3-540-69019-1\_1}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/BierbrauerF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/JamzadK08, author = {Mansour Jamzad and Zahra Zahedi Kermani}, title = {Secure Steganography Using Gabor Filter and Neural Networks}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {3}, pages = {33--49}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69019-1\_3}, doi = {10.1007/978-3-540-69019-1\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/JamzadK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/KorzhikISMG08, author = {Valery I. Korzhik and Hideki Imai and Junji Shikata and Guillermo Morales{-}Luna and Ekaterina Gerling}, title = {On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {3}, pages = {23--32}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69019-1\_2}, doi = {10.1007/978-3-540-69019-1\_2}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/KorzhikISMG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/Venturini08, author = {Ilaria Venturini}, title = {Oracle Channels}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {3}, pages = {50--69}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69019-1\_4}, doi = {10.1007/978-3-540-69019-1\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/Venturini08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/Vila-ForcenVKPP08, author = {Jos{\'{e}}{-}Emilio Vila{-}Forc{\'{e}}n and Sviatoslav Voloshynovskiy and Oleksiy J. Koval and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Thierry Pun}, title = {Quantization-Based Methods: Additive Attacks Performance Analysis}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {3}, pages = {70--90}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69019-1\_5}, doi = {10.1007/978-3-540-69019-1\_5}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdhms/Vila-ForcenVKPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2008-3, editor = {Yun Q. Shi}, title = {Transactions on Data Hiding and Multimedia Security {III}}, series = {Lecture Notes in Computer Science}, volume = {4920}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69019-1}, doi = {10.1007/978-3-540-69019-1}, isbn = {978-3-540-69016-0}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2008-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/AdelsbachHS07, author = {Andr{\'{e}} Adelsbach and Ulrich Huber and Ahmad{-}Reza Sadeghi}, title = {Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {2}, pages = {1--34}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7\_1}, doi = {10.1007/978-3-540-73092-7\_1}, timestamp = {Sat, 02 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdhms/AdelsbachHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/HeK07, author = {Shan He and Darko Kirovski}, title = {An Estimation Attack on Content-Based Video Fingerprinting}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {2}, pages = {35--47}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7\_2}, doi = {10.1007/978-3-540-73092-7\_2}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/HeK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/LuoYWL07, author = {Xiangyang Luo and Chunfang Yang and Daoshun Wang and Fenlin Liu}, title = {{LTSB} Steganalysis Based on Quartic Equation}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {2}, pages = {68--90}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7\_4}, doi = {10.1007/978-3-540-73092-7\_4}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/LuoYWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/Rondao-AlfaceM07, author = {Patrice Rondao{-}Alface and Beno{\^{\i}}t Macq}, title = {From 3D Mesh Data Hiding to 3D Shape Blind and Robust Watermarking: {A} Survey}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {2}, pages = {91--115}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7\_5}, doi = {10.1007/978-3-540-73092-7\_5}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/Rondao-AlfaceM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/YeSC07, author = {Shuiming Ye and Qibin Sun and Ee{-}Chien Chang}, title = {Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {2}, pages = {48--67}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7\_3}, doi = {10.1007/978-3-540-73092-7\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/YeSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2007-2, editor = {Yun Q. Shi}, title = {Transactions on Data Hiding and Multimedia Security {II}}, series = {Lecture Notes in Computer Science}, volume = {4499}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73092-7}, doi = {10.1007/978-3-540-73092-7}, isbn = {978-3-540-73091-0}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2007-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/AdelsbachRS06, author = {Andr{\'{e}} Adelsbach and Markus Rohe and Ahmad{-}Reza Sadeghi}, title = {Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {1}, pages = {73--103}, year = {2006}, url = {https://doi.org/10.1007/11926214\_3}, doi = {10.1007/11926214\_3}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdhms/AdelsbachRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/DittmannMLH06, author = {Jana Dittmann and David Meg{\'{\i}}as and Andreas Lang and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {1}, pages = {1--40}, year = {2006}, url = {https://doi.org/10.1007/11926214\_1}, doi = {10.1007/11926214\_1}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/DittmannMLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/KharraziSM06, author = {Mehdi Kharrazi and Husrev T. Sencar and Nasir D. Memon}, title = {Improving Steganalysis by Fusion Techniques: {A} Case Study with Image Steganography}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {1}, pages = {123--137}, year = {2006}, url = {https://doi.org/10.1007/11926214\_5}, doi = {10.1007/11926214\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdhms/KharraziSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/KosterKLV06, author = {R. Paul Koster and Frank Kamperman and Peter Lenoir and Koen Vrielink}, title = {Identity-Based {DRM:} Personal Entertainment Domain}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {1}, pages = {104--122}, year = {2006}, url = {https://doi.org/10.1007/11926214\_4}, doi = {10.1007/11926214\_4}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdhms/KosterKLV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/Perez-FreireCTP06, author = {Luis P{\'{e}}rez{-}Freire and Pedro Comesa{\~{n}}a and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Watermarking Security: {A} Survey}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {1}, pages = {41--72}, year = {2006}, url = {https://doi.org/10.1007/11926214\_2}, doi = {10.1007/11926214\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/Perez-FreireCTP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/tdhms/2006-1, editor = {Yun Q. Shi}, title = {Transactions on Data Hiding and Multimedia Security {I}}, series = {Lecture Notes in Computer Science}, volume = {4300}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11926214}, doi = {10.1007/11926214}, isbn = {3-540-49071-X}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/2006-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.