From post

Attacks on lexical natural language steganography systems.

, , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6072 из SPIE Proceedings, стр. 607209. SPIE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers., , и . ICNP, стр. 191-196. IEEE Computer Society, (2014)Liveness verifications for citizen journalism videos., , , и . WISEC, стр. 17:1-17:10. ACM, (2015)Natural Language Watermarking and Tamperproofing., , , , , , и . Information Hiding, том 2578 из Lecture Notes in Computer Science, стр. 196-212. Springer, (2002)Information hiding through errors: a confusing approach., , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6505 из SPIE Proceedings, стр. 65050V. SPIE, (2007)A hierarchical protocol for increasing the stealthiness of steganographic methods., , , , , и . MM&Sec, стр. 16-24. ACM, (2004)A Secure Mobile Authentication Alternative to Biometrics., , и . ACSAC, стр. 28-41. ACM, (2017)Human Distinguishable Visual Key Fingerprints., , и . USENIX Security Symposium, стр. 2237-2254. USENIX Association, (2020)ACE-Cost: Acquisition Cost Efficient Classifier by Hybrid Decision Tree with Local SVM Leaves., , и . MLDM, том 6871 из Lecture Notes in Computer Science, стр. 60-74. Springer, (2011)Attacks on lexical natural language steganography systems., , , и . Security, Steganography, and Watermarking of Multimedia Contents, том 6072 из SPIE Proceedings, стр. 607209. SPIE, (2006)Seeing is not believing: visual verifications through liveness analysis using mobile devices., , и . ACSAC, стр. 239-248. ACM, (2013)