default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2019
- Chang D. Yoo, Yun Qing Shi, Hyoung-Joong Kim, Alessandro Piva, Gwangsu Kim:
Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings. Lecture Notes in Computer Science 11378, Springer 2019, ISBN 978-3-030-11388-9 [contents] - 2018
- Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Michel Cozic:
Secure Multilayer Perceptron Based on Homomorphic Encryption. IWDW 2018: 322-336 - Nicolò Cardamone, Fabrizio d'Amore:
DWT and QR Code Based Watermarking for Document DRM. IWDW 2018: 137-150 - Fan Chen, Yuan Yuan, Yuyu Chen, Hongjie He, Lingfeng Qu:
Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression Coding. IWDW 2018: 216-229 - Yi Dong, Tanfeng Sun, Xinghao Jiang:
A High Capacity HEVC Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks. IWDW 2018: 233-247 - Sondos M. Fadl, Qi Han, Qiong Li:
Surveillance Video Authentication Using Universal Image Quality Index of Temporal Average. IWDW 2018: 337-350 - Chen Gong, Xiaowei Yi, Xianfeng Zhao:
Pitch Delay Based Adaptive Steganography for AMR Speech Stream. IWDW 2018: 275-289 - Yuankun Huang, Shunquan Tan, Bin Li, Jiwu Huang:
VPCID - A VoIP Phone Call Identification Database. IWDW 2018: 307-321 - Jihyeon Kang, Sang-Keun Ji, Heung-Kyu Lee:
Spherical Panorama Image Watermarking Using Viewpoint Detection. IWDW 2018: 95-109 - Hakil Kim, Xuenan Cui, Man-Gyu Kim, Thi Hai Binh Nguyen:
Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial Networks. IWDW 2018: 353-362 - Bin Ma, Xiaoyu Wang, Bing Li, Yun-Qing Shi:
A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding. IWDW 2018: 195-205 - Hannes Mareen, Johan De Praeter, Glenn Van Wallendael, Peter Lambert:
Traitor Tracing After Visible Watermark Removal. IWDW 2018: 110-123 - Akira Nishimura:
A Novel Steganalysis of Steghide Focused on High-Frequency Region of Audio Waveform. IWDW 2018: 69-82 - David Niyitegeka, Gouenou Coatrieux, Reda Bellafqira, Emmanuelle Génin, Javier Franco-Contreras:
Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases - Application to Outsourced Genetic Data. IWDW 2018: 151-166 - Bo Ou, Xiaolong Li, Wei Li, Yun-Qing Shi:
Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification. IWDW 2018: 169-179 - Hyoungwoo Park, Minjeong Ju, Sangkeun Moon, Chang D. Yoo:
Unsupervised Domain Adaptation for Object Detection Using Distribution Matching in Various Feature Level. IWDW 2018: 363-372 - Yinyin Peng, Zhao-Xia Yin:
A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting. IWDW 2018: 206-215 - Chang Song, Yifeng Zhang, Guojun Lu:
Reversible Data Hiding in Encrypted Images Based on Image Partition and Spatial Correlation. IWDW 2018: 180-194 - Théo Taburet, Louis Filstroff, Patrick Bas, Wadih Sawaya:
An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain. IWDW 2018: 290-303 - Muhammad Usama, Dong Eui Chang:
Towards Robust Neural Networks with Lipschitz Continuity. IWDW 2018: 373-389 - Yiming Xue, Kai Mu, Yan Li, Juan Wen, Ping Zhong, Shaozhang Niu:
Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matrices. IWDW 2018: 124-136 - Kuan Yang, Kejiang Chen, Weiming Zhang, Nenghai Yu:
Provably Secure Generative Steganography Based on Autoregressive Model. IWDW 2018: 55-68 - Jingyu Ye, Yuxi Shi, Guanshuo Xu, Yun-Qing Shi:
A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images. IWDW 2018: 3-13 - Xinzhi Yu, Kejiang Chen, Weiming Zhang, Yaofei Wang, Nenghai Yu:
Improving the Embedding Strategy for Batch Adaptive Steganography. IWDW 2018: 248-260 - Shiyang Zhang, Hong Zhang, Xianfeng Zhao, Haibo Yu:
A Deep Residual Multi-scale Convolutional Network for Spatial Steganalysis. IWDW 2018: 40-52 - Qian Zhang, Xianfeng Zhao, Changjun Liu:
Convolutional Neural Network for Larger JPEG Images Steganalysis. IWDW 2018: 14-28 - Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Wenjie Li:
Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine. IWDW 2018: 83-92 - Huilin Zheng, Xuan Li, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis. IWDW 2018: 29-39 - Shijun Zhou, Weixuan Tang, Shunquan Tan, Bin Li:
Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information. IWDW 2018: 261-274
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-28 16:43 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint