IEE Proceedings - Information Security
Published from 2005-2006, IEE Proceedings - Information Security included original research papers on information security and cryptography.
Latest Published Articles
-
Multipurpose video watermarking algorithm in the hybrid compressed domain
Mon Mar 26 00:00:00 EDT 2007 Mon Mar 26 00:00:00 EDT 2007 -
Achieving higher perceptual quality and robustness in watermarking using julian set patterns
Mon Mar 26 00:00:00 EDT 2007 Mon Mar 26 00:00:00 EDT 2007 -
Cryptanalysis of a public key cryptosystem based on two cryptographic assumptions
Mon Mar 26 00:00:00 EDT 2007 Mon Mar 26 00:00:00 EDT 2007 -
New results on multipartite access structures
Mon Mar 26 00:00:00 EDT 2007 Mon Mar 26 00:00:00 EDT 2007 -
Group signatures with reduced bandwidth
Mon Mar 26 00:00:00 EDT 2007 Mon Mar 26 00:00:00 EDT 2007
Popular Articles
-
AES implementation on a grain of sand
Mon Nov 21 00:00:00 EST 2005 Mon Nov 21 00:00:00 EST 2005 -
Balanced point operations for side-channel protection of elliptic curve cryptography
Mon Nov 21 00:00:00 EST 2005 Mon Nov 21 00:00:00 EST 2005 -
Secure and robust steganography using side information at the encoder
Mon Oct 02 00:00:00 EDT 2006 Mon Oct 02 00:00:00 EDT 2006 -
Editorial Steganography and digital watermarking
Mon Oct 02 00:00:00 EDT 2006 Mon Oct 02 00:00:00 EDT 2006 -
Determining the stego algorithm for JPEG images
Mon Oct 02 00:00:00 EDT 2006 Mon Oct 02 00:00:00 EDT 2006
Publish in this Journal
Popular Documents (March 2018)
Feed
-
AES implementation on a grain of sand
Publication Year: 2005, Page(s):13 - 20
Cited by: Papers (95) | Patents (1) -
Balanced point operations for side-channel protection of elliptic curve cryptography
Publication Year: 2005, Page(s):57 - 65
Cited by: Papers (8) -
Secure and robust steganography using side information at the encoder
Publication Year: 2006, Page(s):87 - 95Two important classes of data hiding methods are the ones established by watermarking and steganographic applications. Whereas in both cases information is concealed inside a host signal subject to an imperceptibility constraint, some of their fundamental requirements differ. Indeed, the design of watermarking schemes is usually guided by the maximum achievable rate with respect to a given attack ... View full abstract»
-
Editorial Steganography and digital watermarking
Publication Year: 2006, Page(s):75 - 76
Cited by: Papers (2)|
PDF (107 KB)
-
Determining the stego algorithm for JPEG images
Publication Year: 2006, Page(s):77 - 86
Cited by: Papers (6)The goal of forensic steganalysis is to detect the presence of embedded data and to eventually extract the secret message. A necessary step towards extracting the data is determining the steganographic algorithm used to embed the data. In the paper, we construct blind classifiers capable of detecting steganography in JPEG images and assigning stego images to six popular JPEG embedding algorithms. ... View full abstract»
-
Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
Publication Year: 2005, Page(s):3 - 12
Cited by: Papers (11) -
Secure buyer-seller watermarking protocol
Publication Year: 2006, Page(s):15 - 18
Cited by: Papers (13)
Aims & Scope
Published from 2005-2006, IEE Proceedings - Information Security included original research papers on information security and cryptography.
Further Links
Aims & Scope
Published from 2005-2006, IEE Proceedings - Information Security included original research papers on information security and cryptography.
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=10348 More »
Frequency: 4
Subjects
- Communication, Networking & Broadcasting
About this Journal
Author Resources
Previous Titles
- ( 2005 - 2006 ) IEE Proceedings - Information Security