default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2004
- André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Overcoming the obstacles of zero-knowledge watermark detection. MM&Sec 2004: 46-55 - André Adelsbach, Jörg Schwenk:
Key-assignment strategies for CPPM. MM&Sec 2004: 107-115 - Sylvain Beauget, Michiel van der Veen, Aweke N. Lemma:
Informed detection of audio watermark for resolving playback speed modifications. MM&Sec 2004: 117-123 - Rainer Böhme, Andreas Westfeld:
Statistical characterisation of MP3 encoders for steganalysis. MM&Sec 2004: 25-34 - Michael Brachtl, Andreas Uhl, Werner Dietl:
Key-dependency for a wavelet-based blind watermarking algorithm. MM&Sec 2004: 175-179 - Edward J. Delp:
Multimedia security: the 22nd century approach! MM&Sec 2004: 116 - Jana Dittmann, Jessica J. Fridrich:
Introduction to the ACM multimedia and security workshop. MM&Sec 2004: 1-3 - Gwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé:
Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. MM&Sec 2004: 133-142 - Elke Franz, Antje Schneidewind:
Adaptive steganography based on dithering. MM&Sec 2004: 56-62 - Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Perturbed quantization steganography with wet paper codes. MM&Sec 2004: 4-15 - Emir Ganic, Ahmet M. Eskicioglu:
Robust DWT-SVD domain image watermarking: embedding data in all frequencies. MM&Sec 2004: 166-174 - Rüdiger Grimm, Patrick Aichroth:
Privacy protection for signed media files: a separation-of-duty approach to the lightweight DRM (LWDRM) system. MM&Sec 2004: 93-99 - Chao-Yong Hsu, Chun-Shien Lu:
Geometric distortion-resilient image hashing system and its application scalability. MM&Sec 2004: 81-92 - Mustafa Kesal, Mehmet Kivanç Mihçak, Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking. MM&Sec 2004: 41-45 - Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun:
Quantization-based watermarking performance improvement using host statistics: AWGN attack case. MM&Sec 2004: 35-39 - Zheng Liu, Xue Li, Zhaoyang Dong:
Multimedia authentication with sensor-based watermarking. MM&Sec 2004: 155-159 - Tie Liu, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak:
Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. MM&Sec 2004: 124-132 - Yannick Maret, Touradj Ebrahimi:
Data hiding on 3D polygonal meshes. MM&Sec 2004: 68-74 - David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
An audio watermarking scheme robust against stereo attacks. MM&Sec 2004: 206-213 - Benoit Roue, Patrick Bas, Jean-Marc Chassery:
Improving LSB steganalysis using marginal and joint probabilistic distributions. MM&Sec 2004: 75-80 - Gerrit Schulz, Michael Voigt:
A high capacity watermarking system for digital maps. MM&Sec 2004: 180-186 - Huayin Si, Chang-Tsun Li:
Fragile watermarking scheme based on the block-wise dependence in the wavelet domain. MM&Sec 2004: 214-219 - Maxim Sidorov:
Hidden Markov models and steganalysis. MM&Sec 2004: 63-67 - Martin Steinebach, Sascha Zmudzinski, Fan Chen:
The digital watermarking container: secure and efficient embedding. MM&Sec 2004: 199-205 - Natasa Terzija, Walter Geisselhardt:
Digital image watermarking using complex wavelet transform. MM&Sec 2004: 193-198 - Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene T. Lin, Edward J. Delp:
A hierarchical protocol for increasing the stealthiness of steganographic methods. MM&Sec 2004: 16-24 - Francesca Uccheddu, Massimiliano Corsini, Mauro Barni:
Wavelet-based blind watermarking of 3D models. MM&Sec 2004: 143-154 - Andreas Uhl, Andreas Pommer:
Are parameterised biorthogonal wavelet filters suited (better) for selective encryption? MM&Sec 2004: 100-106 - Ilaria Venturini:
Counteracting Oracle attacks. MM&Sec 2004: 187-192 - Michael Voigt, Bian Yang, Christoph Busch:
Reversible watermarking of 2D-vector data. MM&Sec 2004: 160-165
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-01 14:55 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint