EURASIP Journal on Information Security

Titel Veröffentlichungsdatum Sprache Zitate
Broken Arrows2008/01/01English11
Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique2011/01/01English8
An Efficient Watermarking Technique for the Protection of Fingerprint Images2008/01/01English7
Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication2008/01/01English3
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing2007/01/01English1
Multimedia Encryption with Joint Randomized Entropy Coding and Rotation in Partitioned Bitstream2007/01/01English1
Oblivious Neural Network Computing via Homomorphic Encryption2007/01/01English1
A Survey of Homomorphic Encryption for Nonspecialists2007/01/01English1
Secure Steganography in Multimedia Content2009/01/01English
High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts2009/01/01English
One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images2009/01/01English
Anonymous Biometric Access Control2009/01/01English
Video Data Hiding for Managing Privacy Information in Surveillance Systems2009/01/01English
Enhancing Privacy Protection in Multimedia Systems2009/01/01English
An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT2009/01/01English
Compression Independent Reversible Encryption for Privacy in Video Surveillance2009/01/01English
Improving the Security of CardSpace2009/01/01English
A Novel Image Data Hiding Scheme with Diamond Encoding2009/01/01English
Encrypted Domain DCT Based on Homomorphic Cryptosystems2009/01/01English
Recoverable Privacy Protection for Video Content Distribution2009/01/01English
Steganography in 3D Geometries and Images by Adjacent Bin Mapping2009/01/01English
How Reed-Solomon Codes Can Improve Steganographic Schemes2009/01/01English
Peak-Shaped-Based Steganographic Technique for JPEG Images2009/01/01English
Design and Evaluation of a Pressure-Based Typing Biometric Authentication System2008/01/01English
Riding the saddle point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing2014/01/01English
Joint Encryption and Compression of Correlated Sources with Side Information2007/01/01English
An Efficient Objective Intelligibility Measure for Frequency Domain Scramblers2007/01/01English
Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks2007/01/01English
Secure Multiparty Computation between Distrusted Networks Terminals2007/01/01English
A Workbench for the BOWS Contest2007/01/01English