Personensuche
X
?
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security ,
1
The Adobe Hidden Feature and its Impact on Sensor Attributi..:
, In:
?
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security ,
2
Analysis and Mitigation of the False Alarms of the Reverse ..:
, In:
?
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security ,
3
Compatibility and Timing Attacks for JPEG Steganalysis:
, In:
?
Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security ,
4
Session details: Session 6: Steganography II:
, In:
?
Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security ,
5
Fighting the Reverse JPEG Compatibility Attack: Pick your S..:
, In:
?
2022 IEEE International Workshop on Information Forensics and Security (WIFS) ,
7
Toward Reliable JPEG Steganalysis (at QF100):
, In:
?
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security ,
8
Revisiting Perturbed Quantization:
, In:
?
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security ,
9
How to Pretrain for Steganalysis:
, In:
?
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security ,
10
Improving EfficientNet for JPEG Steganalysis:
, In:
?
ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) ,
11
Steganography and its Detection in JPEG Images Obtained wit..:
, In:
?
Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security ,
12
Turning Cost-Based Steganography into Model-Based:
, In:
?
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security ,
13
Effect of JPEG Quality on Steganographic Security:
, In:
?
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security ,
14