+
+
+@String{elsevier={Elsevier Science Publishers B. V.}}
+
+@String{springer={Springer-Verlag}}
+@String{springer_loc={Berlin}}
+@String{lncs={Lecture Notes in Computer Science}}
+
+@String{ieecs={IEEE Computer Society}}
+@String{ieecs_loc={Washington, DC}}
+
+@String{isoc={The Internet Society}}
+@String{isoc_loc={Washington DC/Reston}}
+
+@String{westpress={Westview Press}}
+@String{westpress_loc={Boulder, CO}}
+
+@String{spie={Society of Photo-Optical Instrumentation Engineers}}
+@String{spie_loc={Bellingham, WA}}
+
+
+
+@String{NC = {Neural Computation}}
+@String{TNN= {IEEE Transactions on Neural Networks}}
+@String{STTT= {International Journal on Software Tools for Technology Transfer}}
+@string{JACM={Journal of ACM}}
+@String{JCAM={Journal of Computational and Applied Mathematics}}
+
+@String{tcs={Theoretical Computer Science}}
+@String{jtb={Journal of Theoretical Biology}}
+@string{prenticeHall={Prentice-Hall, Inc.}}
+@string{discreteapplMath={Discrete Applied Mathematics}}
+@string{advapplMath={Advances in Applied Mathematics}}
+@string{ijma= {International Journal of Mathematical Algorithms}}
+@string{cs= {Cognitive Science}}
+@string{siam={SIAM Journal on Computing}}
+
+
@inproceedings{DBLP:conf/ih/PereiraVMMP01,
editor = {Ira S. Moskowitz},
author = {Shelby Pereira and
Evaluation},
year = {2001},
pages = {340-353},
- series = {Lecture Notes in Computer Science},
- publisher = {Springer},
+ series = lncs,
+ publisher = springer,
+ address = springer_loc,
+ month = apr,
volume = {2137},
}
Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
editor = {Ira S. Moskowitz},
pages = {289-302},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ month=apr,
+ series = lncs,
title = {F5-A Steganographic Algorithm.},
volume = 2137,
year = 2001
MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
year = {2005},
publisher = {ACM},
+ address = {New York, NY, USA},
+ month=aug,
pages = {25-32},
ee = {http://doi.acm.org/10.1145/1073170.1073176},
bibsource = {DBLP, http://dblp.uni-trier.de}
year = {2005},
pages = {296-311},
ee = {http://dx.doi.org/10.1007/11558859_22},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ month= jun,
+ series = lncs,
volume = {3727},
}
author = {Jessica J. Fridrich and
Jan Kodovsk{\'y}},
title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
+ month=may,
year = {2012},
pages = {31-45},
ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
volume = {7692},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
bibsource = {DBLP, http://dblp.uni-trier.de}
}
pages = {27-30},
ee = {http://doi.acm.org/10.1145/1232454.1232466},
publisher = {ACM},
+ address = {New York, NY, USA},
+ month = oct,
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Papers},
year = {2010},
pages = {161-177},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ month=jun,
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {6387},
ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
bibsource = {DBLP, http://dblp.uni-trier.de}
Calgary, AB, Canada, June 28-30, 2010, Revised Selected
Papers},
booktitle = {Information Hiding},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {6387},
year = {2010},
isbn = {978-3-642-16434-7},
isbn = {978-3-540-74123-7},
keywords = {dblp},
pages = {314-327},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ month=jul,
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
timestamp = {2007-09-20T00:00:00.000+0200},
title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
title = {Information Hiding, 8th International Workshop, IH 2006,
Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
booktitle = {Information Hiding},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {4437},
year = {2007},
isbn = {978-3-540-74123-7},
challenges, and opportunities},
pages = {3-14},
ee = {http://doi.acm.org/10.1145/1288869.1288872},
- crossref = {DBLP:conf/mmsec/2007},
editor = {Deepa Kundur and
Balakrishnan Prabhakaran and
Jana Dittmann and
booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
publisher = {ACM},
+ address = {New York, NY, USA},
+ month=sep,
year = {2007},
isbn = {978-1-59593-857-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
-@proceedings{DBLP:conf/mmsec/2007,
-
-}
pages = {754105},
ee = {http://dx.doi.org/10.1117/12.838002},
bibsource = {DBLP, http://dblp.uni-trier.de},
- publisher = {SPIE},
+ publisher = spie,
+ address = spie_loc,
+ month = jan,
series = {SPIE Proceedings},
volume = {7541},
}
Electronic Imaging Symposium, San Jose, CA, USA, January
18-20, 2010, Proceedings},
booktitle = {Media Forensics and Security},
- publisher = {SPIE},
+ publisher = spie,
+ address = spie_loc,
series = {SPIE Proceedings},
volume = {7541},
year = {2010},
Manuel Blum and
Mike Shub},
title = {Comparison of Two Pseudo-Random Number Generators},
- booktitle = {CRYPTO},
- year = {1982},
- pages = {61-78},
- crossref = {DBLP:conf/crypto/1982},
- bibsource = {DBLP, http://dblp.uni-trier.de}
-}
-@proceedings{DBLP:conf/crypto/1982,
editor = {David Chaum and
Ronald L. Rivest and
Alan T. Sherman},
- title = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
+ booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
Barbara, California, USA, August 23-25, 1982},
- booktitle = {CRYPTO},
- publisher = {Plenum Press, New York},
+ pages = {61-78},
+ bibsource = {DBLP, http://dblp.uni-trier.de},
+ publisher = {Plenum Press},
+ address={New York, NY, USA},
+ month=aug,
year = {1983},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Shafi Goldwasser},
title = {An Efficient Probabilistic Public-Key Encryption Scheme
Which Hides All Partial Information},
+ month=aug,
year = {1985},
pages = {289-302},
editor = {G. R. Blakley and
David Chaum},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {196}
}
OPTcrossref = {},
OPTkey = {},
booktitle = {Proc. SPIE 6819},
+ publisher = spie,
+ address = spie_loc,
pages = {12},
year = {2008},
OPTeditor = {},
OPTcrossref = {},
OPTkey = {},
booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
+ publisher = spie,
+ address = spie_loc,
+ month=feb,
+ pages = {78800L-78800L-13},
OPTpages = {},
year = {2011},
OPTeditor = {},
@inproceedings{Tyan1993,
abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
- address = {{San Francisco, CA, USA}},
+ address = ieecs_loc,
+ publisher=ieecs,
author = {Tyan, C. Y. and Wang, P. P.},
booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
citeulike-article-id = {7936501},
pages = {600--605},
posted-at = {2010-10-01 17:27:48},
priority = {0},
+ month=apr,
title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
volume = {1},
year = {1993}
Prague, Czech Republic, May 18-20, 2011, Revised Selected
Papers},
booktitle = {Information Hiding},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {6958},
year = {2011},
isbn = {978-3-642-24177-2},
Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2011, Revised Selected Papers},
booktitle = {IWDW},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {7128},
year = {2012},
isbn = {978-3-642-32204-4},