Export 508 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
S. Vicini, Alberti, F., Notario, N., Crespo, A., Troncoso-Pastoriza, J. R., and Sanna, A., Co-creating Security-and-Privacy-by-Design Systems, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Worst case additive attack against quantization-based data-hiding methods, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pérez-González, F., and Pun, T., Quantization-Based Methods: Additive Attacks Performance Analysis, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
J. E. Vila-Forcén, Voloshynovskiy, S., Koval, O., Pun, T., and Pérez-González, F., Worst case additive attack against quantization-based watermarking techniques, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
S. Voloshynovskiy, Koval, O., Topak, E., Vila-Forcén, J. E., Comesaña, P., and Pun, T., On reversibility of random binning techniques: multimedia perspectives, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.PDF icon cms05.pdf (267.92 KB)