Sciweavers

IH
2004
Springer
14 years 3 months ago
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes
In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embe...
Jessica J. Fridrich
IH
2004
Springer
14 years 3 months ago
Relative Generic Computational Forensic Techniques
Jennifer L. Wong, Miodrag Potkonjak
IH
2004
Springer
14 years 3 months ago
Reversing Global and Local Geometrical Distortions in Image Watermarking
A new method improving watermark robustness against both global and local geometrical distortions is presented in this article. The proposed approach is based on a self-reference c...
Dariusz Bogumil
IH
2004
Springer
14 years 3 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
IH
2004
Springer
14 years 3 months ago
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks
Abstract. This paper presents an implementation of the novel watermarking method proposed by Venkatesan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Sof...
Christian S. Collberg, Andrew Huntwork, Edward Car...
Information Technology
Top of PageReset Settings