Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers | 0 | 0.34 | 2020 |
Solving the large syndrome calculation problem in steganography. | 0 | 0.34 | 2019 |
Provably Secure Generative Steganography Based On Autoregressive Model | 0 | 0.34 | 2019 |
JPEG Encryption with File Format Preservation and File Size Reduction. | 0 | 0.34 | 2019 |
Reversible Data Hiding in JPEG Images Using Quantized DC. | 1 | 0.35 | 2019 |
Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification. | 0 | 0.34 | 2019 |
Improved reversible data hiding in JPEG images based on new coefficient selection strategy. | 5 | 0.45 | 2017 |
Framework for improving the security performance of ordinary distortion functions of JPEG steganography | 1 | 0.36 | 2016 |
Reversible Data Hiding in JPEG Images. | 26 | 0.98 | 2016 |
A High-Security EEG-Based Login System with RSVP Stimuli and Dry Electrodes. | 14 | 0.65 | 2016 |
ELECTRONIC VOTING SERVICE USING BLOCK-CHALET | 4 | 0.53 | 2016 |
Early width estimation of fragmented JPEG with corrupted header | 0 | 0.34 | 2016 |
Reversible data hiding using least square predictor via the LASSO. | 2 | 0.39 | 2016 |
Improving JPEG-LS Performance Using Location Information. | 0 | 0.34 | 2016 |
Linear collaborative discriminant regression classification for face recognition | 1 | 0.35 | 2015 |
A Cognitive Ensemble of Extreme Learning Machines for Steganalysis Based on Risk-Sensitive Hinge Loss Function. | 9 | 0.49 | 2015 |
Low Bit-Rate and High Fidelity Reversible Data Hiding | 0 | 0.34 | 2015 |
Metadata protection scheme for JPEG privacy & security using hierarchical and group-based models | 0 | 0.34 | 2015 |
Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding | 39 | 1.00 | 2015 |
Local pixel patterns | 1 | 0.35 | 2015 |
Collaborative Representation Classification Ensemble for Face Recognition | 0 | 0.34 | 2015 |
Automatic contrast enhancement using reversible data hiding | 1 | 0.35 | 2015 |
An enhanced (t, n) threshold directed signature scheme. | 0 | 0.34 | 2014 |
Binary Coded Genetic Algorithm with Ensemble Classifier for feature selection in JPEG steganalysis | 1 | 0.37 | 2014 |
Reversible Data Hiding Based On Combined Predictor And Prediction Error Expansion | 1 | 0.36 | 2014 |
Enhanced discriminant linear regression classification for face recognition | 0 | 0.34 | 2014 |
Hybrid real-coded genetic algorithm for data partitioning in multi-round load distribution and scheduling in heterogeneous systems. | 14 | 0.61 | 2014 |
Compressing JPEG compressed image using reversible data hiding technique | 1 | 0.35 | 2013 |
Digital Forensics and Watermarking - 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers | 39 | 2.14 | 2012 |
Modified BCH data hiding scheme for JPEG steganography. | 9 | 0.44 | 2012 |
An Efficient Embedder for BCH Coding for Steganography | 9 | 0.59 | 2012 |
Recognizing numbers from the low-resolution patterns in digital images. | 0 | 0.34 | 2012 |
Scheduling Second-Order Computational Load in Master-Slave Paradigm | 9 | 0.49 | 2012 |
Integrated inventory and transportation decision for ubiquitous supply chain management | 5 | 0.45 | 2012 |
A photographic forensic case study: Myths, principles and techniques | 1 | 0.36 | 2012 |
An attempt to generalize distortion measure for JPEG steganography | 0 | 0.34 | 2012 |
An improved matrix encoding scheme for JPEG steganography | 0 | 0.34 | 2011 |
Histogram-based image hashing for searching content-preserving copies | 3 | 0.40 | 2011 |
Shape-based indexing scheme for camera view invariant 3-D object retrieval | 2 | 0.36 | 2010 |
Ternary data hiding technique for JPEG steganography | 3 | 0.39 | 2010 |
Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting | 20 | 0.90 | 2010 |
A new approach to photography forensics using 3d analysis for correcting perception errors: a case study | 1 | 0.38 | 2010 |
A Fast Implementation of Arithmetic Coding | 0 | 0.34 | 2010 |
An efficient pattern substitution watermarking method for binary images | 0 | 0.34 | 2010 |
Near-optimal solution to pair-wise LSB matching via an immune programming strategy | 19 | 0.82 | 2010 |
An improved section-wise exploiting modification direction method | 17 | 0.84 | 2010 |
Reversible Watermarking Algorithm with Distortion Compensation | 3 | 0.39 | 2010 |
A Pervasive Secret Sharing Scheme For Embedded Visual Communication System | 0 | 0.34 | 2010 |
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. | 45 | 3.16 | 2009 |
Reversible watermarking algorithm using sorting and prediction | 235 | 6.47 | 2009 |