Technique
History
Math
Linguistics
Computers
Social Sciences
Psychology
Free Algorithms and Data Structures: Digital watermarks Books
RHCSA Red Hat Enterprise Linux 8 (UPDATED): Training and Exam Preparation Guide (EX200) Asghar Ghori
femtard chips
A Meliorated Kashida Based Approach for Arabic Text Steganography
Применение российского законодательства об электронной подписи: нормы полезные и проблемные
Длительное архивное хранение электронных документов: правовые особенности и технологические решения
Аутсорсинг электронной подписи
Применение квалифицированной электронной подписи в современной эпохе
Удостоверяющие центры: пределы доверия. Практика авторизации удостоверяющих центров при федеральных операторах электронных торговых площадок и АЭТП
Ниши применения для различных видов электронной подписи
Цифровая подпись - как это делается
Комментарий к ФЗ об электронной цифровой подписи (постатейный)
Стеганография
Diagnostic Imaging Genitourinary
Теоретический минимум и алгоритмы цифровой подписи : учебное пособие для студентов, обучающихся по направлению ''Прикладные математика и физика'', а также смежным направлениям и специальностям в области математики и естественных наук и в области техники и технологии
Intelligent Watermarking Techniques with Source Code (Innovative Intelligence Volume 7)
Digital Signatures
Sweet Dream Baby
On Watermarking Semi-Structures
On Watermarking Numeric Sets
Attacking Digital Watermarks
Shiftable Multi-scale Transforms
Robustness and Efficiency of Non-linear Side-Informed Watermarking
An Implementation of Key-Based Digital Signal Steganography
A Visually Significant Two Dimensional Barcode
Watermark Rate and the Distortion of Error Diffused Halftones
Attacks on Watermarking Systems
More Efficient Provably Secure Steganography
Digital Processing Of Speech Signals
On the public key watermarking issue
Digital Image Watermarking in the Real World
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
Efficient and Secure Source Authentication for Multicast
Multidimensional Distortion-Compensated Dither Modulation
Second generation benchmarking and application oriented evaluation
Robust Digital Image Watermarking
Tartan Threads A Method for the Real-time Digital Recognition
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression
Facial feature extraction and pose determination
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
Robust Public Key Watermarking of Digital Images
Generalized Unequal Length Lapped Orthogonal Transform for Subband Image Coding
Dirty-paper trellis codes forwatermarking
Applying Informed Coding and Embedding to Design a Robust, High Capacity Watermark
A review of watermarking principles and practices
On Random Coding Error Exponents of Watermarking Codes
Protecting Digital MediaContent
Facsimile
Digital Watermark
An image registration technique for recovering rotation, scale and translation parameters
Object-based image steganography using affine transformation
Fair Evaluation Methods for Image Watermarking Systems
Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression
Audio Watermark Robustness to Desynchronization via Beat Detection
Robust Image Watermark Using Radon Transform and Bispectrum Invariants
Audio Watermarking Techniques
A Relationship Between Quantization and Watermarking Rates in the Presence of Gaussian Attacks
Provably Secure Steganography
The Watermark Template Attack
Hartung Su Girod - Spread Spectrum Watermarking Malicious Attacks and Counterattacks
Hartung Girod - Watermarking of Uncompressed and Compressed Video
Wide spread spectrum watermarking with side information and interference cancellation
Resynchronization methods for audio watermarking
Matching with Invariant Features
Memonc Shended Wonge - On the security of the Yeung-Mintzer authentication watermark
Direct Embedding and Detection of RST Invariant Watermarks
Watermark Detection after Quantization Attacks
Quantization Watermarking
Quantization Effects on Digital Watermarks
Estimation Of Amplitude Modifications before SCS Watermark Detection
Information Embedding and Digital Watermarking
Digital Watermarking Theoretic Foundation and Applications
Efficient Watermark Detection and Collusion Security
Wu Su Kuo - Robust and efficient digital audio watermarking using audio content analysis
Detecting Low Embedding Rates
The JPEG Still Picture Compression Standard
Digital Image Watermarking using Mixing Systems
Attacks on Digital Watermarks Classification, Estimation-based Attacks and Benchmarks
Blur-Deblur Attack against Document Protection Systems Based on Digital Watermarking
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks
Theoretic performance analysis of a watermarking system
Directional processing of color images theory and experimental results
Audio Watermarking An Overview
Audio Watermarking for Live Performance
Multiresolution Scene-Based Video Watermarking Using Perceptual Models
Robust audio watermarking using perceptual masking
Practical Capacity of DigitalWatermarks
A Channel Model for a Watermark Attack
Su Eggers Girod - Analysis of digital watermarks subjected to optimum linear filtering and additive noise
Stone Tao McGuire - Analysis of image registration noise due to rotationally dependent aliasing
Automatic Detection of a Watermarked Document Using a Private Key
Detection of LSB Steganography via Sample Pair Analysis
Switching Between Orthogonal Watermarks for Enhanced Security Against Collusion in Video
Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking
Secure Video Watermarking Via Embedding Strength Modulation
Secure Background Watermarking Based on Video Mosaicing
Public Key Broadcast Encryption for Stateless Receivers
Compact Image Coding from Multiscale Edges
Craver - On Public-Key Steganography in the Presence of an Active Warden
Watermarking Capacity for Gaussian Sources
The Gaussian Watermarking Game
Go to Page
GO
Technique
History
Math
Linguistics
Computers
Social Sciences
Psychology