Search dblp for Publications

export results for "stream:streams/journals/tdhms:"

 download as .bib file

@article{DBLP:journals/tdhms/AycockC15,
  author       = {John Aycock and
                  Daniel Medeiros Nunes de Castro},
  title        = {Permutation Steganography in {FAT} Filesystems},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {10},
  pages        = {92--105},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46739-8\_6},
  doi          = {10.1007/978-3-662-46739-8\_6},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/AycockC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/EchizenYG15,
  author       = {Isao Echizen and
                  Takayuki Yamada and
                  Seiichi Gohshi},
  title        = {{IR} Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter
                  Detection to Prevent Re-recording of Screen Images},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {10},
  pages        = {38--54},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46739-8\_3},
  doi          = {10.1007/978-3-662-46739-8\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/EchizenYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/JohnsonSLGB15,
  author       = {Benjamin Johnson and
                  Pascal Sch{\"{o}}ttle and
                  Aron Laszka and
                  Jens Grossklags and
                  Rainer B{\"{o}}hme},
  title        = {Adaptive Steganography and Steganalysis with Fixed-Size Embedding},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {10},
  pages        = {69--91},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46739-8\_5},
  doi          = {10.1007/978-3-662-46739-8\_5},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/JohnsonSLGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LiuC15,
  author       = {Fang Liu and
                  Lee{-}Ming Cheng},
  title        = {Wave Atom-Based Perceptual Image Hashing Against Content-Preserving
                  and Content-Altering Attacks},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {10},
  pages        = {21--37},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46739-8\_2},
  doi          = {10.1007/978-3-662-46739-8\_2},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LiuC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/NealE15,
  author       = {Harrison Neal and
                  Hala ElAarag},
  title        = {A Reliable Covert Communication Scheme Based on VoIP Steganography},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {10},
  pages        = {55--68},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46739-8\_4},
  doi          = {10.1007/978-3-662-46739-8\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/NealE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/XiaZFW15,
  author       = {Bingbing Xia and
                  Xianfeng Zhao and
                  Dengguo Feng and
                  Mingsheng Wang},
  title        = {Strengthening Spread Spectrum Watermarking Security via Key Controlled
                  Wavelet Filter},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {10},
  pages        = {1--20},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46739-8\_1},
  doi          = {10.1007/978-3-662-46739-8\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/XiaZFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2015-10,
  editor       = {Yun Q. Shi},
  title        = {Transactions on Data Hiding and Multimedia Security {X}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8948},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46739-8},
  doi          = {10.1007/978-3-662-46739-8},
  isbn         = {978-3-662-46738-1},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2015-10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/CimatoYW14,
  author       = {Stelvio Cimato and
                  James C. N. Yang and
                  Chih{-}Cheng Wu},
  title        = {Visual Cryptography Based Watermarking},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {91--109},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_6},
  doi          = {10.1007/978-3-642-55046-1\_6},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/CimatoYW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/FuY14,
  author       = {Zhengxin Fu and
                  Bin Yu},
  title        = {Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {42--56},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_3},
  doi          = {10.1007/978-3-642-55046-1\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/FuY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LiuGWY14,
  author       = {Feng Liu and
                  Teng Guo and
                  Chuan Kun Wu and
                  Ching{-}Nung Yang},
  title        = {Flexible Visual Cryptography Scheme and Its Application},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {110--130},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_7},
  doi          = {10.1007/978-3-642-55046-1\_7},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LiuGWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LiuYLW14,
  author       = {Feng Liu and
                  Wei Qi Yan and
                  Peng Li and
                  Chuan Kun Wu},
  title        = {{ESSVCS:} An Enriched Secret Sharing Visual Cryptography},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {1--24},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_1},
  doi          = {10.1007/978-3-642-55046-1\_1},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LiuYLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/Yamaguchi14,
  author       = {Yasushi Yamaguchi},
  title        = {Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone
                  Images},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {25--41},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_2},
  doi          = {10.1007/978-3-642-55046-1\_2},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/Yamaguchi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/YampolskiyMH14,
  author       = {Roman V. Yampolskiy and
                  Jovan David Rebolledo M{\'{e}}ndez and
                  Musa Hindi},
  title        = {Password Protected Visual Cryptography via Cellular Automaton Rule
                  30},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {57--67},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_4},
  doi          = {10.1007/978-3-642-55046-1\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/YampolskiyMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/YanWESN14,
  author       = {Xuehu Yan and
                  Shen Wang and
                  Ahmed A. Abd El{-}Latif and
                  Jianzhi Sang and
                  Xiamu Niu},
  title        = {A Novel Perceptual Secret Sharing Scheme},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {9},
  pages        = {68--90},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1\_5},
  doi          = {10.1007/978-3-642-55046-1\_5},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/YanWESN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2014-9,
  editor       = {Yun Q. Shi and
                  Feng Liu and
                  WeiQi Yan},
  title        = {Transactions on Data Hiding and Multimedia Security {IX} - Special
                  Issue on Visual Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {8363},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55046-1},
  doi          = {10.1007/978-3-642-55046-1},
  isbn         = {978-3-642-55045-4},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2014-9.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/Al-AssamASJ12,
  author       = {Hisham Al{-}Assam and
                  Ali J. Abboud and
                  Harin Sellahewa and
                  Sabah Jassim},
  title        = {Exploiting Relative Entropy and Quality Analysis in Cumulative Partial
                  Biometric Fusion},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {8},
  pages        = {1--18},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31971-6\_1},
  doi          = {10.1007/978-3-642-31971-6\_1},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/Al-AssamASJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/CaoK12,
  author       = {Hong Cao and
                  Alex C. Kot},
  title        = {Measuring the Statistical Correlation Inconsistencies in Mobile Images
                  for Tamper Detection},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {7},
  pages        = {63--81},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28693-3\_5},
  doi          = {10.1007/978-3-642-28693-3\_5},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/CaoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/EchizenYG12,
  author       = {Isao Echizen and
                  Takayuki Yamada and
                  Seiichi Gohshi},
  title        = {{IR} Hiding: Method for Preventing Illegal Recording of Videos Based
                  on Differences in Sensory Perception between Humans and Devices},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {7},
  pages        = {34--51},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28693-3\_3},
  doi          = {10.1007/978-3-642-28693-3\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/EchizenYG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/Gloe12,
  author       = {Thomas Gloe},
  title        = {Feature-Based Forensic Camera Model Identification},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {8},
  pages        = {42--62},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31971-6\_3},
  doi          = {10.1007/978-3-642-31971-6\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/Gloe12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/KraetzerD12,
  author       = {Christian Kraetzer and
                  Jana Dittmann},
  title        = {Plausibility Considerations on Steganalysis as a Security Mechanism
                  - Discussions on the Example of Audio Steganalysis},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {8},
  pages        = {80--101},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31971-6\_5},
  doi          = {10.1007/978-3-642-31971-6\_5},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/KraetzerD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/MakrushinSV12,
  author       = {Andrey Makrushin and
                  Tobias Scheidat and
                  Claus Vielhauer},
  title        = {Improving Reliability of Biometric Hash Generation through the Selection
                  of Dynamic Handwriting Features},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {8},
  pages        = {19--41},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31971-6\_2},
  doi          = {10.1007/978-3-642-31971-6\_2},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/MakrushinSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/MeerwaldU12,
  author       = {Peter Meerwald and
                  Andreas Uhl},
  title        = {An Efficient Robust Watermarking Method Integrated in {H.264/SVC}},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {7},
  pages        = {1--14},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28693-3\_1},
  doi          = {10.1007/978-3-642-28693-3\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdhms/MeerwaldU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/SurRM12,
  author       = {Arijit Sur and
                  Vignesh Ramanathan and
                  Jayanta Mukherjee},
  title        = {Secure Steganography Using Randomized Cropping},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {7},
  pages        = {82--95},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28693-3\_6},
  doi          = {10.1007/978-3-642-28693-3\_6},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/SurRM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/WuC12,
  author       = {Hao{-}Tian Wu and
                  Yiu{-}ming Cheung},
  title        = {Secure Watermarking on 3D Geometry via {ICA} and Orthogonal Transformation},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {7},
  pages        = {52--62},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28693-3\_4},
  doi          = {10.1007/978-3-642-28693-3\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/WuC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/YamadaEY12,
  author       = {Takaaki Yamada and
                  Isao Echizen and
                  Hiroshi Yoshiura},
  title        = {PC-Based Real-Time Video Watermark Embedding System Independent of
                  Platform for Parallel Computing},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {7},
  pages        = {15--33},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28693-3\_2},
  doi          = {10.1007/978-3-642-28693-3\_2},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/YamadaEY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/ZhaoSA12,
  author       = {Hong Zhao and
                  Yun Q. Shi and
                  Nirwan Ansari},
  title        = {Steganography in Streaming Multimedia over Networks},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {7},
  pages        = {96--114},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28693-3\_7},
  doi          = {10.1007/978-3-642-28693-3\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/ZhaoSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/ZmudzinskiSB12,
  author       = {Sascha Zmudzinski and
                  Martin Steinebach and
                  Moazzam Butt},
  title        = {Watermark Embedding Using Audio Fingerprinting},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {8},
  pages        = {63--79},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31971-6\_4},
  doi          = {10.1007/978-3-642-31971-6\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/ZmudzinskiSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2012-7,
  editor       = {Yun Q. Shi},
  title        = {Transactions on Data Hiding and Multimedia Security {VII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7110},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28693-3},
  doi          = {10.1007/978-3-642-28693-3},
  isbn         = {978-3-642-28692-6},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2012-7.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2012-8,
  editor       = {Yun Q. Shi and
                  Stefan Katzenbeisser},
  title        = {Transactions on Data Hiding and Multimedia Security {VIII} - Special
                  Issue on Pattern Recognition for {IT} Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {7228},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31971-6},
  doi          = {10.1007/978-3-642-31971-6},
  isbn         = {978-3-642-31970-9},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2012-8.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LiuYZG11,
  author       = {Shaohui Liu and
                  Hongxun Yao and
                  Shengping Zhang and
                  Wen Gao},
  title        = {A Progressive Quality Hiding Strategy Based on Equivalence Partitions
                  of Hiding Units},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {6},
  pages        = {58--82},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24556-5\_4},
  doi          = {10.1007/978-3-642-24556-5\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LiuYZG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/SubramanyamE11,
  author       = {A. Venkata Subramanyam and
                  Sabu Emmanuel},
  title        = {Robust Watermarking of Compressed {JPEG} Images in Encrypted Domain},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {6},
  pages        = {37--57},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24556-5\_3},
  doi          = {10.1007/978-3-642-24556-5\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/SubramanyamE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/SutthiwanSZNS11,
  author       = {Patchara Sutthiwan and
                  Yun Q. Shi and
                  Hong Zhao and
                  Tian{-}Tsong Ng and
                  Wei Su},
  title        = {Markovian Rake Transform for Digital Image Tampering Detection},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {6},
  pages        = {1--17},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24556-5\_1},
  doi          = {10.1007/978-3-642-24556-5\_1},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/SutthiwanSZNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/XiangK11,
  author       = {Shijun Xiang and
                  Hyoung{-}Joong Kim},
  title        = {Histogram-Based Image Hashing for Searching Content-Preserving Copies},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {6},
  pages        = {83--108},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24556-5\_5},
  doi          = {10.1007/978-3-642-24556-5\_5},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/XiangK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/YangJK11,
  author       = {Huijuan Yang and
                  Xudong Jiang and
                  Alex C. Kot},
  title        = {Embedding Binary Watermarks in Dual-Tree Complex Wavelets Domain for
                  Access Control of Digital Images},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {6},
  pages        = {18--36},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24556-5\_2},
  doi          = {10.1007/978-3-642-24556-5\_2},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/YangJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2011-6,
  editor       = {Yun Q. Shi and
                  Sabu Emmanuel and
                  Mohan S. Kankanhalli and
                  Shih{-}Fu Chang and
                  Regunathan Radhakrishnan and
                  Fulong Ma and
                  Li Zhao},
  title        = {Transactions on Data Hiding and Multimedia Security {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6730},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24556-5},
  doi          = {10.1007/978-3-642-24556-5},
  isbn         = {978-3-642-24555-8},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2011-6.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/ChaK10,
  author       = {Byung{-}Ho Cha and
                  C.{-}C. Jay Kuo},
  title        = {Collusion-Resistant Fingerprinting Systems: Review and Recent Results},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {5},
  pages        = {34--50},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14298-7\_3},
  doi          = {10.1007/978-3-642-14298-7\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/ChaK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/ItoK10,
  author       = {Izumi Ito and
                  Hitoshi Kiya},
  title        = {Phase-Only Correlation Based Matching in Scrambled Domain for Preventing
                  Illegal Matching},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {5},
  pages        = {51--69},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14298-7\_4},
  doi          = {10.1007/978-3-642-14298-7\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/ItoK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LaadjelBKNY10,
  author       = {Moussadek Laadjel and
                  Ahmed Bouridane and
                  Fatih Kurugollu and
                  Omar Nibouche and
                  WeiQi Yan},
  title        = {Partial Palmprint Matching Using Invariant Local Minutiae Descriptors},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {5},
  pages        = {1--17},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14298-7\_1},
  doi          = {10.1007/978-3-642-14298-7\_1},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LaadjelBKNY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/MetternichWS10,
  author       = {Michael J. Metternich and
                  Marcel Worring and
                  Arnold W. M. Smeulders},
  title        = {Color Based Tracing in Real-Life Surveillance Data},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {5},
  pages        = {18--33},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14298-7\_2},
  doi          = {10.1007/978-3-642-14298-7\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdhms/MetternichWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/WeirY10,
  author       = {Jonathan Weir and
                  WeiQi Yan},
  title        = {A Comprehensive Study of Visual Cryptography},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {5},
  pages        = {70--105},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14298-7\_5},
  doi          = {10.1007/978-3-642-14298-7\_5},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/WeirY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/WeirY10a,
  author       = {Jonathan Weir and
                  WeiQi Yan},
  title        = {Secure Masks for Visual Cryptography},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {5},
  pages        = {106--128},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14298-7\_6},
  doi          = {10.1007/978-3-642-14298-7\_6},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/WeirY10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2010-5,
  editor       = {Yun Q. Shi},
  title        = {Transactions on Data Hiding and Multimedia Security {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6010},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14298-7},
  doi          = {10.1007/978-3-642-14298-7},
  isbn         = {978-3-642-14297-0},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2010-5.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/JiangHT09,
  author       = {Weina Jiang and
                  Anthony T. S. Ho and
                  Helen Treharne},
  title        = {A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking
                  Incorporating Perceptual Quality Metrics},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {4},
  pages        = {65--83},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01757-5\_4},
  doi          = {10.1007/978-3-642-01757-5\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/JiangHT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LiuT09,
  author       = {Tsung{-}Yuan Liu and
                  Wen{-}Hsiang Tsai},
  title        = {Robust Watermarking in Slides of Presentations by Blank Space Coloring:
                  {A} New Approach},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {4},
  pages        = {49--64},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01757-5\_3},
  doi          = {10.1007/978-3-642-01757-5\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LiuT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/PiperS09,
  author       = {Angela Piper and
                  Reihaneh Safavi{-}Naini},
  title        = {How to Compare Image Watermarking Algorithms},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {4},
  pages        = {1--28},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01757-5\_1},
  doi          = {10.1007/978-3-642-01757-5\_1},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/PiperS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/QiQ09,
  author       = {Xiaojun Qi and
                  Ji Qi},
  title        = {A Desynchronization Resilient Watermarking Scheme},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {4},
  pages        = {29--48},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01757-5\_2},
  doi          = {10.1007/978-3-642-01757-5\_2},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/QiQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/XuanSCTNT09,
  author       = {Guorong Xuan and
                  Yun Q. Shi and
                  Peiqi Chai and
                  Jianzhong Teng and
                  Zhicheng Ni and
                  Xuefeng Tong},
  title        = {Optimum Histogram Pair Based Image Lossless Data Embedding},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {4},
  pages        = {84--102},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01757-5\_5},
  doi          = {10.1007/978-3-642-01757-5\_5},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/XuanSCTNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2009-4,
  editor       = {Yun Q. Shi},
  title        = {Transactions on Data Hiding and Multimedia Security {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5510},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01757-5},
  doi          = {10.1007/978-3-642-01757-5},
  isbn         = {978-3-642-01756-8},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2009-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/BierbrauerF08,
  author       = {J{\"{u}}rgen Bierbrauer and
                  Jessica J. Fridrich},
  title        = {Constructing Good Covering Codes for Applications in Steganography},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {3},
  pages        = {1--22},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69019-1\_1},
  doi          = {10.1007/978-3-540-69019-1\_1},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/BierbrauerF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/JamzadK08,
  author       = {Mansour Jamzad and
                  Zahra Zahedi Kermani},
  title        = {Secure Steganography Using Gabor Filter and Neural Networks},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {3},
  pages        = {33--49},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69019-1\_3},
  doi          = {10.1007/978-3-540-69019-1\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/JamzadK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/KorzhikISMG08,
  author       = {Valery I. Korzhik and
                  Hideki Imai and
                  Junji Shikata and
                  Guillermo Morales{-}Luna and
                  Ekaterina Gerling},
  title        = {On the Use of Bhattacharyya Distance as a Measure of the Detectability
                  of Steganographic Systems},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {3},
  pages        = {23--32},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69019-1\_2},
  doi          = {10.1007/978-3-540-69019-1\_2},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/KorzhikISMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/Venturini08,
  author       = {Ilaria Venturini},
  title        = {Oracle Channels},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {3},
  pages        = {50--69},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69019-1\_4},
  doi          = {10.1007/978-3-540-69019-1\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/Venturini08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/Vila-ForcenVKPP08,
  author       = {Jos{\'{e}}{-}Emilio Vila{-}Forc{\'{e}}n and
                  Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Thierry Pun},
  title        = {Quantization-Based Methods: Additive Attacks Performance Analysis},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {3},
  pages        = {70--90},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69019-1\_5},
  doi          = {10.1007/978-3-540-69019-1\_5},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdhms/Vila-ForcenVKPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2008-3,
  editor       = {Yun Q. Shi},
  title        = {Transactions on Data Hiding and Multimedia Security {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4920},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69019-1},
  doi          = {10.1007/978-3-540-69019-1},
  isbn         = {978-3-540-69016-0},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2008-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/AdelsbachHS07,
  author       = {Andr{\'{e}} Adelsbach and
                  Ulrich Huber and
                  Ahmad{-}Reza Sadeghi},
  title        = {Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {2},
  pages        = {1--34},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7\_1},
  doi          = {10.1007/978-3-540-73092-7\_1},
  timestamp    = {Sat, 02 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdhms/AdelsbachHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/HeK07,
  author       = {Shan He and
                  Darko Kirovski},
  title        = {An Estimation Attack on Content-Based Video Fingerprinting},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {2},
  pages        = {35--47},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7\_2},
  doi          = {10.1007/978-3-540-73092-7\_2},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/HeK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/LuoYWL07,
  author       = {Xiangyang Luo and
                  Chunfang Yang and
                  Daoshun Wang and
                  Fenlin Liu},
  title        = {{LTSB} Steganalysis Based on Quartic Equation},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {2},
  pages        = {68--90},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7\_4},
  doi          = {10.1007/978-3-540-73092-7\_4},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/LuoYWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/Rondao-AlfaceM07,
  author       = {Patrice Rondao{-}Alface and
                  Beno{\^{\i}}t Macq},
  title        = {From 3D Mesh Data Hiding to 3D Shape Blind and Robust Watermarking:
                  {A} Survey},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {2},
  pages        = {91--115},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7\_5},
  doi          = {10.1007/978-3-540-73092-7\_5},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/Rondao-AlfaceM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/YeSC07,
  author       = {Shuiming Ye and
                  Qibin Sun and
                  Ee{-}Chien Chang},
  title        = {Statistics- and Spatiality-Based Feature Distance Measure for Error
                  Resilient Image Authentication},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {2},
  pages        = {48--67},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7\_3},
  doi          = {10.1007/978-3-540-73092-7\_3},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/YeSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2007-2,
  editor       = {Yun Q. Shi},
  title        = {Transactions on Data Hiding and Multimedia Security {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4499},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73092-7},
  doi          = {10.1007/978-3-540-73092-7},
  isbn         = {978-3-540-73091-0},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2007-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/AdelsbachRS06,
  author       = {Andr{\'{e}} Adelsbach and
                  Markus Rohe and
                  Ahmad{-}Reza Sadeghi},
  title        = {Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection
                  in Multimedia Data},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {1},
  pages        = {73--103},
  year         = {2006},
  url          = {https://doi.org/10.1007/11926214\_3},
  doi          = {10.1007/11926214\_3},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdhms/AdelsbachRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/DittmannMLH06,
  author       = {Jana Dittmann and
                  David Meg{\'{\i}}as and
                  Andreas Lang and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Theoretical Framework for a Practical Evaluation and Comparison of
                  Audio Watermarking Schemes in the Triangle of Robustness, Transparency
                  and Capacity},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {1},
  pages        = {1--40},
  year         = {2006},
  url          = {https://doi.org/10.1007/11926214\_1},
  doi          = {10.1007/11926214\_1},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/DittmannMLH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/KharraziSM06,
  author       = {Mehdi Kharrazi and
                  Husrev T. Sencar and
                  Nasir D. Memon},
  title        = {Improving Steganalysis by Fusion Techniques: {A} Case Study with Image
                  Steganography},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {1},
  pages        = {123--137},
  year         = {2006},
  url          = {https://doi.org/10.1007/11926214\_5},
  doi          = {10.1007/11926214\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdhms/KharraziSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/KosterKLV06,
  author       = {R. Paul Koster and
                  Frank Kamperman and
                  Peter Lenoir and
                  Koen Vrielink},
  title        = {Identity-Based {DRM:} Personal Entertainment Domain},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {1},
  pages        = {104--122},
  year         = {2006},
  url          = {https://doi.org/10.1007/11926214\_4},
  doi          = {10.1007/11926214\_4},
  timestamp    = {Sat, 19 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdhms/KosterKLV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/Perez-FreireCTP06,
  author       = {Luis P{\'{e}}rez{-}Freire and
                  Pedro Comesa{\~{n}}a and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Watermarking Security: {A} Survey},
  journal      = {Trans. Data Hiding Multim. Secur.},
  volume       = {1},
  pages        = {41--72},
  year         = {2006},
  url          = {https://doi.org/10.1007/11926214\_2},
  doi          = {10.1007/11926214\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/Perez-FreireCTP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2006-1,
  editor       = {Yun Q. Shi},
  title        = {Transactions on Data Hiding and Multimedia Security {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4300},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11926214},
  doi          = {10.1007/11926214},
  isbn         = {3-540-49071-X},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdhms/2006-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics