author: fernando pérez gonzález

Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

... order of magnitude is likely to remain stable. (More prudently, we hope that ... audio files. To conclude, this paper is intended to motivate the community ... Goljan for their helpful comments. References. 1. Anderson, R., Petitcolas ...

Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers

... steganography application. In: Proceedings of the International Symposium on ... steganography using document metadata. J. Syst. Softw. 80, 750–764 (2007) 5. Liu ... PowerPoint files. Digit. Invest. 6(1–2), 16–24 (2009) 7. Garfinkel, S.L. ...

Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

... Freenet's get(name) interface where name is its content key. Queries are forwarded to servers hosting names which offer the closest match to name. If the document is found, the server reverse-routes doc back to the client, and each ...

Digital Forensics and Watermarking: 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers

... types with visual cryptography as an authentication medium. Improving efficiency in terms of processing power, when generating shares, favours smaller secret images to begin with. So we can successfully ignore the Code-128 type of ...

Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers

... Operating Systems: Three Easy Pieces. Arpaci-Dusseau Books Inc, Madison (2014) 3. Casey, E.: Digital Evidence and Computer Crime Forensic Science Computers, and the Internet, 3rd edn. Elsevier Inc, London (2011) 4. Casey, E.: Handbook ...

Digital-Forensics and Watermarking: 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers

... OC will be indicated by following formula: OC 1⁄4OC OC Pc OC À 1 OC [P c & ð6Þ When Pre = 1, the prediction mode of current block will not be stored in code stream. For this reason, all the existing IPM-based steganography have ignored ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.