We are improving our search experience.

As we work to add all features, to check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 30 results
  1. Transactions on Data Hiding and Multimedia Security X

    Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various...
    Book 2015
  2. Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography

    Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various...
    Yun Q. Shi, Feng Liu, Weiqi Yan in Lecture Notes in Computer Science
    Book 2014
  3. On Blind Source Camera Identification

    An interesting and challenging problem in digital image forensics is the identification of the device used to acquire an image. Although the source...
    G. M. Farinella, M. V. Giuffrida, ... S. Battiato in Advanced Concepts for Intelligent Vision Systems
    Conference paper 2015
  4. On the minimum size of complete arcs and minimal saturating sets in projective planes

    The minimum size of a complete arc in the planes PG (2, 31) and PG (2, 32) and of a 1-saturating set in PG (2, 17) and PG (2, 19) is determined. Also,...

    Daniele Bartoli, Giorgio Faina, ... Fernanda Pambianco in Journal of Geometry
    Article 11 September 2013
  5. Transactions on Data Hiding and Multimedia Security VII

    Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various...
    Conference proceedings 2012
  6. Transactions on Data Hiding and Multimedia Security VIII

    Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various...
    Yun Q. Shi, Stefan Katzenbeisser in Lecture Notes in Computer Science
    Conference proceedings 2012
  7. ESSVCS: An Enriched Secret Sharing Visual Cryptography

    Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster...
    Feng Liu, Wei Q. Yan, ... Chuankun Wu in Transactions on Data Hiding and Multimedia Security IX
    Chapter 2014
  8. A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA

    The advent of social networks has made social media sharing in social network easier. However, it can also cause serious security and privacy...
    Conghuan Ye, Hefei Ling, ... Kaibing Zhang in The International Workshop on Digital Forensics and Watermarking 2012
    Conference paper 2013
  9. Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules

    Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance,...
    Phan Trung Huy, Cheonshik Kim, ... Ching-Nung Yang in Grid and Pervasive Computing
    Conference paper 2013
  10. Transactions on Data Hiding and Multimedia Security VI

    Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various...
    Yun Q. Shi, Sabu Emmanuel, ... Li Zhao in Lecture Notes in Computer Science
    Conference proceedings 2011
  11. Plausibility Considerations on Steganalysis as a Security Mechanism – Discussions on the Example of Audio Steganalysis

    Most publications on steganography and steganalysis trivialize the latter into a simple two-class decision problem: either a data object is an...
    Christian Kraetzer, Jana Dittmann in Transactions on Data Hiding and Multimedia Security VIII
    Conference paper 2012
  12. Transactions on Data Hiding and Multimedia Security V

    Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various...

    Book 2010
  13. Matrix Embedding Using Random Linear Codes and Its Steganalysis

    To improve embedding efficiency, one of the most important steganographic scheme isMatrix embedding, otherwise known as syndrome coding. The schemes...
    P. Harmya, S. S. Anju, ... Aishwarya Nandakumar in Advances in Computing and Communications
    Conference paper 2011
  14. Enhancing Accountability in the Cloud via Sticky Policies

    This paper introduces and discusses a data management solution to provide accountability within the cloud as well as addressing privacy issues. The...
    Siani Pearson, Marco Casassa Mont, Gina Kounga in Secure and Trust Computing, Data Management, and Applications
    Conference paper 2011
  15. Improving Code-Based Steganography with Linear Error-Block Codes

    We introduce a steganographic protocol based on linear error block codes. Our method is an extension of Westfeld’s F5 algorithm. It allows to grow...
    Rabiî Dariti, El Mamoun Souidi in Digital Information Processing and Communications
    Conference paper 2011
  16. Plane Transform Visual Cryptography

    Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques....
    Jonathan Weir, WeiQi Yan in Digital Watermarking
    Conference paper 2011
  17. Ensuring Message Embedding in Wet Paper Steganography

    Syndrome coding has been proposed by Crandall in 1998 as a method to stealthily embed a message in a cover-medium through the use of bounded...
    Daniel Augot, Morgan Barbier, Caroline Fontaine in Cryptography and Coding
    Conference paper 2011
  18. Transactions on Data Hiding and Multimedia Security IV

    Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various...

    Book 2009
  19. Basis arrays and successive packing for M-D interleaving

    In this paper, we first present a novel concept of 2-D basis interleaving array (also referred to as basis array for short). That is, an m × m ...

    Xi Min Zhang, Wen-Qing Xu, ... Sankar Basu in Multidimensional Systems and Signal Processing
    Article 04 September 2010
  20. Security Analysis of ISS Watermarking Using Natural Scene Statistics

    Watermarking security has captured great attention from researchers in recent years. The security of watermarking is determined by the difficulty of...
    Dong Zhang, Jiangqun Ni, ... Jiwu Huang in Information Hiding
    Conference paper 2010