From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The square root law requires a linear key.. MM&Sec, стр. 85-92. ACM, (2009)The Square Root Law in Stegosystems with Imperfect Information.. Information Hiding, том 6387 из Lecture Notes in Computer Science, стр. 145-160. Springer, (2010)A General Framework for Structural Steganalysis of LSB Replacement.. Information Hiding, том 3727 из Lecture Notes in Computer Science, стр. 296-311. Springer, (2005)Optimally weighted least-squares steganalysis.. Security, Steganography, and Watermarking of Multimedia Contents, том 6505 из SPIE Proceedings, стр. 650506. SPIE, (2007)Batch steganography and the threshold game.. Security, Steganography, and Watermarking of Multimedia Contents, том 6505 из SPIE Proceedings, стр. 650504. SPIE, (2007)Resampling and the detection of LSB matching in color bitmaps.. Security, Steganography, and Watermarking of Multimedia Contents, том 5681 из Proceedings of SPIE, стр. 1-15. SPIE, (2005)Fourth-order structural steganalysis and analysis of cover assumptions.. Security, Steganography, and Watermarking of Multimedia Contents, том 6072 из SPIE Proceedings, стр. 607203. SPIE, (2006)The square root law of steganographic capacity., , , и . MM&Sec, стр. 107-116. ACM, (2008)A new paradigm for steganalysis via clustering., и . Media Forensics and Security, том 7880 из SPIE Proceedings, стр. 78800U. SPIE, (2011)From blind to quantitative steganalysis., , и . Media Forensics and Security, том 7254 из SPIE Proceedings, стр. 72540C. SPIE, (2009)