Sciweavers

128
Voted
IH
2004
Springer
15 years 7 months ago
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes
In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embe...
Jessica J. Fridrich
IH
2004
Springer
15 years 7 months ago
On the Possibility of Non-invertible Watermarking Schemes
Recently, there are active discussions on the possibility of non-invertible watermarking scheme. A non-invertible scheme prevents an attacker from deriving a valid watermark from a...
Qiming Li, Ee-Chien Chang
IH
2004
Springer
15 years 7 months ago
Threading Software Watermarks
We introduce a new dynamic technique for embedding robust software watermarks into a software program using thread contention. We show the technique to be resilient to many semanti...
Jasvir Nagra, Clark D. Thomborson
IH
2004
Springer
15 years 7 months ago
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks
Abstract. This paper presents an implementation of the novel watermarking method proposed by Venkatesan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Sof...
Christian S. Collberg, Andrew Huntwork, Edward Car...
IH
2004
Springer
15 years 7 months ago
Relative Generic Computational Forensic Techniques
Jennifer L. Wong, Miodrag Potkonjak
Information Technology
Top of PageReset Settings