Found: 21
Select item for more details and to access through your institution.
Research advances in data hiding for multimedia security.
- Published in:
- 2011
- By:
- Publication type:
- Editorial
Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 263, doi. 10.1007/s11042-010-0496-0
- By:
- Publication type:
- Article
Statistical analysis of several reversible data hiding algorithms.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 277, doi. 10.1007/s11042-009-0380-y
- By:
- Publication type:
- Article
Huffman table swapping-based steganograpy for MP3 audio.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 291, doi. 10.1007/s11042-009-0430-5
- By:
- Publication type:
- Article
A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 307, doi. 10.1007/s11042-010-0474-6
- By:
- Publication type:
- Article
Lexicographical framework for image hashing with implementation based on DCT and NMF.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 325, doi. 10.1007/s11042-009-0437-y
- By:
- Publication type:
- Article
Wavelet tree based digital image watermarking by adopting the chaotic system for security enhancement.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 347, doi. 10.1007/s11042-010-0475-5
- By:
- Publication type:
- Article
An audio watermarking scheme using singular value decomposition and dither-modulation quantization.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 369, doi. 10.1007/s11042-010-0515-1
- By:
- Publication type:
- Article
Dynamic energy enabled differentiation (DEED) image watermarking based on human visual system and wavelet tree classification.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 385, doi. 10.1007/s11042-009-0422-5
- By:
- Publication type:
- Article
A more secure steganography based on adaptive pixel-value differencing scheme.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 407, doi. 10.1007/s11042-009-0440-3
- By:
- Publication type:
- Article
Minority codes with improved embedding efficiency for large payloads.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 431, doi. 10.1007/s11042-009-0431-4
- By:
- Publication type:
- Article
A novel image copy detection scheme based on the local multi-resolution histogram descriptor.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 445, doi. 10.1007/s11042-009-0438-x
- By:
- Publication type:
- Article
Issues and solution on distortion drift in reversible video data hiding.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 465, doi. 10.1007/s11042-010-0476-4
- By:
- Publication type:
- Article
High capacity audio watermarking using the high frequency band of the wavelet domain.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 485, doi. 10.1007/s11042-010-0495-1
- By:
- Publication type:
- Article
High-capacity reversible data hiding by maximum-span pairing.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 499, doi. 10.1007/s11042-010-0497-z
- By:
- Publication type:
- Article
Subjectively adapted high capacity lossless image data hiding based on prediction errors.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 513, doi. 10.1007/s11042-010-0486-2
- By:
- Publication type:
- Article
A practical design of content protection for H.264/AVC compressed videos by selective encryption and fingerprinting.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 529, doi. 10.1007/s11042-009-0458-6
- By:
- Publication type:
- Article
Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 551, doi. 10.1007/s11042-009-0439-9
- By:
- Publication type:
- Article
Steganography via running short text messages.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 569, doi. 10.1007/s11042-009-0432-3
- By:
- Publication type:
- Article
An image authentication scheme based on digital watermarking and image secret sharing.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 597, doi. 10.1007/s11042-010-0520-4
- By:
- Publication type:
- Article
A new robust reference logo watermarking scheme.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 621, doi. 10.1007/s11042-009-0433-2
- By:
- Publication type:
- Article