Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2003
- Fabien A. P. Petitcolas:
Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers. Lecture Notes in Computer Science 2578, Springer 2003, ISBN 3-540-00421-1 [contents] - 2002
- Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg:
Natural Language Watermarking and Tamperproofing. Information Hiding 2002: 196-212 - Oliver Benedens:
Robust Watermarking and Affine Registration of 3D Meshes. Information Hiding 2002: 177-195 - Jack Brassil:
Tracing the Source of a Shredded Document. Information Hiding 2002: 387-399 - Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. Information Hiding 2002: 400-414 - Richard Clayton, George Danezis:
Chaffinch: Confidentiality in the Face of Legal Threats. Information Hiding 2002: 70-86 - Scott Craver, Bede Liu, Wayne H. Wolf:
Detectors for Echo Hiding Systems. Information Hiding 2002: 247-257 - Sorina Dumitrescu, Xiaolin Wu, Zhe Wang:
Detection of LSB Steganography via Sample Pair Analysis. Information Hiding 2002: 355-372 - Gina Fisk, Mike Fisk, Christos Papadopoulos, Joshua Neil:
Eliminating Steganography in Internet Traffic with Active Wardens. Information Hiding 2002: 18-35 - Peter A. Fletcher, Kieran G. Larkin:
Direct Embedding and Detection of RST Invariant Watermarks. Information Hiding 2002: 129-144 - Elke Franz:
Steganography Preserving Statistical Properties. Information Hiding 2002: 278-294 - Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea:
Steganalysis of JPEG Images: Breaking the F5 Algorithm. Information Hiding 2002: 310-323 - Dogan Kesdogan, Dakshi Agrawal, Stefan Penz:
Limits of Anonymity in Open Environments. Information Hiding 2002: 53-69 - Hyungshin Kim, Yunju Baek, Heung-Kyu Lee, Young-Ho Suh:
Robust Image Watermark Using Radon Transform and Bispectrum Invariants. Information Hiding 2002: 145-159 - Darko Kirovski, Hagai Attias:
Audio Watermark Robustness to Desynchronization via Beat Detection. Information Hiding 2002: 160-176 - Tri Van Le, Yvo Desmedt:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. Information Hiding 2002: 213-225 - Qiming Li, Ee-Chien Chang:
Security of Public Watermarking Schemes for Binary Sequences. Information Hiding 2002: 119-128 - Siwei Lyu, Hany Farid:
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. Information Hiding 2002: 340-354 - Mehmet Kivanç Mihçak, Ramarathnam Venkatesan, Mustafa Kesal:
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks. Information Hiding 2002: 226-246 - Richard E. Newman, Ira S. Moskowitz, Liwu Chang, Murali M. Brahmadesam:
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. Information Hiding 2002: 258-277 - Hideki Noda, Jeremiah Spaulding, Mahdad Nouri Shirazi, Michiharu Niimi, Eiji Kawaguchi:
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression. Information Hiding 2002: 295-309 - Fernando Pérez-González, Félix Balado:
Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation. Information Hiding 2002: 87-105 - Andrei Serjantov, Roger Dingledine, Paul F. Syverson:
From a Trickle to a Flood: Active Attacks on Several Mix Types. Information Hiding 2002: 36-52 - Boris Shimanovsky, Jessica Feng, Miodrag Potkonjak:
Hiding Data in DNA. Information Hiding 2002: 373-386 - Guenole C. M. Silvestre, Neil J. Hurley, Teddy Furon:
Robustness and Efficiency of Non-linear Side-Informed Watermarking. Information Hiding 2002: 106-118 - Kymie M. C. Tan, John McHugh, Kevin S. Killourhy:
Hiding Intrusions: From the Abnormal to the Normal and Beyond. Information Hiding 2002: 1-17 - Christian Tobias:
Practical Oblivious Transfer Protocols. Information Hiding 2002: 415-426 - Andreas Westfeld:
Detecting Low Embedding Rates. Information Hiding 2002: 324-339
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-31 19:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint