Digital watermarking

Results: 149



#Item
31Modern Steganalysis Can Detect YASS Jan Kodovskýa , Tomáš Pevnýb ∗, Jessica Fridricha †, a Department of Electrical and Computer Engineering, Binghamton University, State University of New York

Modern Steganalysis Can Detect YASS Jan Kodovskýa , Tomáš Pevnýb ∗, Jessica Fridricha †, a Department of Electrical and Computer Engineering, Binghamton University, State University of New York

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2009-11-28 18:47:02
32DIGITAL “BULLET SCRATCHES” FOR IMAGES Jan Lukáš, Jessica Fridrich, and Miroslav Goljan Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton, NY {jan.lukas, fridrich, mgoljan}@bin

DIGITAL “BULLET SCRATCHES” FOR IMAGES Jan Lukáš, Jessica Fridrich, and Miroslav Goljan Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton, NY {jan.lukas, fridrich, mgoljan}@bin

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-04-26 08:10:19
33fiche tek20 TTX SPECIFICATIONS  - copie.indd

fiche tek20 TTX SPECIFICATIONS - copie.indd

Add to Reading List

Source URL: www.civolution.com

Language: English - Date: 2015-02-03 11:44:16
34STEGANOGRAPHY AND DIGITAL WATERMARKING  Determining the stego algorithm for JPEG images T. Pevny´ and J. Fridrich Abstract: The goal of forensic steganalysis is to detect the presence of embedded data and to eventually

STEGANOGRAPHY AND DIGITAL WATERMARKING Determining the stego algorithm for JPEG images T. Pevny´ and J. Fridrich Abstract: The goal of forensic steganalysis is to detect the presence of embedded data and to eventually

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-10-03 14:01:42
35Novelty Detection in Blind Steganalysis ´ s Pevn´y ∗ Tomaˇ Jessica Fridrich

Novelty Detection in Blind Steganalysis ´ s Pevn´y ∗ Tomaˇ Jessica Fridrich

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2008-07-08 10:33:59
36Proceedings Template - WORD

Proceedings Template - WORD

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-10-02 11:10:02
37Security Brief Friday May 17, 2002 Company News Recent Investments Bluesocket (wireless security) $16m B round

Security Brief Friday May 17, 2002 Company News Recent Investments Bluesocket (wireless security) $16m B round

Add to Reading List

Source URL: signalhill.in

Language: English - Date: 2013-09-25 15:28:43
38Database Forensics in the Service of Information Accountability Kyriacos E. Pavlou Department of Computer Science The University of Arizona P.O. Box

Database Forensics in the Service of Information Accountability Kyriacos E. Pavlou Department of Computer Science The University of Arizona P.O. Box

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2011-11-15 03:32:08
39SECOND GENERATION IMAGE WATERMARKING IN THE WAVELET DOMAIN Thesis submitted for the degree of Doctor of Philosophy to the School of Sciences in the University of Buckingham

SECOND GENERATION IMAGE WATERMARKING IN THE WAVELET DOMAIN Thesis submitted for the degree of Doctor of Philosophy to the School of Sciences in the University of Buckingham

Add to Reading List

Source URL: herbert.the-little-red-haired-girl.org

Language: English - Date: 2011-06-06 16:51:24
40Cambridge University Press to premier Hitachi Solutions’ digital watermarking technology with new Penpals at Home series Cambridge-Hitachi, a joint venture between Cambridge University Press and Hitachi Solutions, toda

Cambridge University Press to premier Hitachi Solutions’ digital watermarking technology with new Penpals at Home series Cambridge-Hitachi, a joint venture between Cambridge University Press and Hitachi Solutions, toda

Add to Reading List

Source URL: www.hitachi-solutions.com

Language: English - Date: 2014-09-23 21:07:34