![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Transactions on Data Hiding and Multimedia Security, Volume 1, 2006
- Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security I. Lecture Notes in Computer Science 4300, Springer 2006, ISBN 3-540-49071-X - Jana Dittmann, David Megías, Andreas Lang, Jordi Herrera-Joancomartí
:
Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity. 1-40 - Luis Pérez-Freire, Pedro Comesaña
, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Watermarking Security: A Survey. 41-72 - André Adelsbach, Markus Rohe, Ahmad-Reza Sadeghi:
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data. 73-103 - R. Paul Koster, Frank Kamperman, Peter Lenoir, Koen Vrielink:
Identity-Based DRM: Personal Entertainment Domain. 104-122 - Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
:
Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography. 123-137
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.