Login / Signup
Trans. Data Hiding Multim. Secur.
2006
2009
2012
2015
2006
2015
Keyphrases
Publications
volume 10, 2015
John Aycock
,
Daniel Medeiros Nunes de Castro
Permutation Steganography in FAT Filesystems.
Trans. Data Hiding Multim. Secur.
10 (2015)
Fang Liu
,
Lee-Ming Cheng
Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks.
Trans. Data Hiding Multim. Secur.
10 (2015)
Bingbing Xia
,
Xianfeng Zhao
,
Dengguo Feng
,
Mingsheng Wang
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter.
Trans. Data Hiding Multim. Secur.
10 (2015)
Benjamin Johnson
,
Pascal Schöttle
,
Aron Laszka
,
Jens Grossklags
,
Rainer Böhme
Adaptive Steganography and Steganalysis with Fixed-Size Embedding.
Trans. Data Hiding Multim. Secur.
10 (2015)
Isao Echizen
,
Takayuki Yamada
,
Seiichi Gohshi
IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images.
Trans. Data Hiding Multim. Secur.
10 (2015)
Harrison Neal
,
Hala ElAarag
A Reliable Covert Communication Scheme Based on VoIP Steganography.
Trans. Data Hiding Multim. Secur.
10 (2015)
volume 9, 2014
Yasushi Yamaguchi
Extended Visual Cryptography Scheme for Multiple-Secrets Continuous-Tone Images.
Trans. Data Hiding Multim. Secur.
9 (2014)
Zhengxin Fu
,
Bin Yu
Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares.
Trans. Data Hiding Multim. Secur.
9 (2014)
Roman V. Yampolskiy
,
Jovan David Rebolledo Méndez
,
Musa Hindi
Password Protected Visual Cryptography via Cellular Automaton Rule 30.
Trans. Data Hiding Multim. Secur.
9 (2014)
Feng Liu
,
Teng Guo
,
Chuan Kun Wu
,
Ching-Nung Yang
Flexible Visual Cryptography Scheme and Its Application.
Trans. Data Hiding Multim. Secur.
9 (2014)
Stelvio Cimato
,
James C. N. Yang
,
Chih-Cheng Wu
Visual Cryptography Based Watermarking.
Trans. Data Hiding Multim. Secur.
9 (2014)
Xuehu Yan
,
Shen Wang
,
Ahmed A. Abd El-Latif
,
Jianzhi Sang
,
Xiamu Niu
A Novel Perceptual Secret Sharing Scheme.
Trans. Data Hiding Multim. Secur.
9 (2014)
Feng Liu
,
Wei Qi Yan
,
Peng Li
,
Chuan Kun Wu
ESSVCS: An Enriched Secret Sharing Visual Cryptography.
Trans. Data Hiding Multim. Secur.
9 (2014)
volume 8, 2012
Hisham Al-Assam
,
Ali Abboud
,
Harin Sellahewa
,
Sabah Jassim
Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion.
Trans. Data Hiding Multim. Secur.
8 (2012)
Sascha Zmudzinski
,
Martin Steinebach
,
Moazzam Butt
Watermark Embedding Using Audio Fingerprinting.
Trans. Data Hiding Multim. Secur.
8 (2012)
Christian Kraetzer
,
Jana Dittmann
Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis.
Trans. Data Hiding Multim. Secur.
8 (2012)
Andrey Makrushin
,
Tobias Scheidat
,
Claus Vielhauer
Improving Reliability of Biometric Hash Generation through the Selection of Dynamic Handwriting Features.
Trans. Data Hiding Multim. Secur.
8 (2012)
Thomas Gloe
Feature-Based Forensic Camera Model Identification.
Trans. Data Hiding Multim. Secur.
8 (2012)
volume 7, 2012
Hao-Tian Wu
,
Yiu-ming Cheung
Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation.
Trans. Data Hiding Multim. Secur.
7 (2012)
Hong Zhao
,
Yun Q. Shi
,
Nirwan Ansari
Steganography in Streaming Multimedia over Networks.
Trans. Data Hiding Multim. Secur.
7 (2012)
Hong Cao
,
Alex C. Kot
Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection.
Trans. Data Hiding Multim. Secur.
7 (2012)
Takaaki Yamada
,
Isao Echizen
,
Hiroshi Yoshiura
PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing.
Trans. Data Hiding Multim. Secur.
7 (2012)
Peter Meerwald
,
Andreas Uhl
An Efficient Robust Watermarking Method Integrated in H.264/SVC.
Trans. Data Hiding Multim. Secur.
7 (2012)
Arijit Sur
,
Vignesh Ramanathan
,
Jayanta Mukherjee
Secure Steganography Using Randomized Cropping.
Trans. Data Hiding Multim. Secur.
7 (2012)
Isao Echizen
,
Takayuki Yamada
,
Seiichi Gohshi
IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices.
Trans. Data Hiding Multim. Secur.
7 (2012)
volume 6, 2011
Shaohui Liu
,
Hongxun Yao
,
Shengping Zhang
,
Wen Gao
A Progressive Quality Hiding Strategy Based on Equivalence Partitions of Hiding Units.
Trans. Data Hiding Multim. Secur.
6 (2011)
A. Venkata Subramanyam
,
Sabu Emmanuel
Robust Watermarking of Compressed JPEG Images in Encrypted Domain.
Trans. Data Hiding Multim. Secur.
6 (2011)
Shijun Xiang
,
Hyoung-Joong Kim
Histogram-Based Image Hashing for Searching Content-Preserving Copies.
Trans. Data Hiding Multim. Secur.
6 (2011)
Huijuan Yang
,
Xudong Jiang
,
Alex C. Kot
Embedding Binary Watermarks in Dual-Tree Complex Wavelets Domain for Access Control of Digital Images.
Trans. Data Hiding Multim. Secur.
6 (2011)
Patchara Sutthiwan
,
Yun Q. Shi
,
Hong Zhao
,
Tian-Tsong Ng
,
Wei Su
Markovian Rake Transform for Digital Image Tampering Detection.
Trans. Data Hiding Multim. Secur.
6 (2011)
volume 5, 2010
Izumi Ito
,
Hitoshi Kiya
Phase-Only Correlation Based Matching in Scrambled Domain for Preventing Illegal Matching.
Trans. Data Hiding Multim. Secur.
5 (2010)
Michael J. Metternich
,
Marcel Worring
,
Arnold W. M. Smeulders
Color Based Tracing in Real-Life Surveillance Data.
Trans. Data Hiding Multim. Secur.
5 (2010)
Byung-Ho Cha
,
C.-C. Jay Kuo
Collusion-Resistant Fingerprinting Systems: Review and Recent Results.
Trans. Data Hiding Multim. Secur.
5 (2010)
Jonathan Weir
,
WeiQi Yan
Secure Masks for Visual Cryptography.
Trans. Data Hiding Multim. Secur.
5 (2010)
Moussadek Laadjel
,
Ahmed Bouridane
,
Fatih Kurugollu
,
Omar Nibouche
,
WeiQi Yan
Partial Palmprint Matching Using Invariant Local Minutiae Descriptors.
Trans. Data Hiding Multim. Secur.
5 (2010)
Jonathan Weir
,
WeiQi Yan
A Comprehensive Study of Visual Cryptography.
Trans. Data Hiding Multim. Secur.
5 (2010)