Cryptography Reference
In-Depth Information
[Leh82]
D.J. Lehmann. On primality tests. SIAM Journal on
Computing , 11(2), May 1982.
((page numbers are
wrong)).
[LF05]
S. Lyu and H. Farid. How realistic is photorealistic? IEEE
Transactions on Signal Processing , 53(2):845-850, 2005.
[Lia95]
Wilson MacGyver Liaw. Reading gif files. Dr. Dobbs
Journal , Feb 1995.
[LJ83]
Shu Lin and Daniel J. Costello Jr. Error Control Cod-
ing: Fundaments and Applications . Prentice Hall, En-
glewood Cliffs, NJ, 1983.
[LJ00]
Vinicius Licks and R. Jordan. On digital image water-
marking robust to geometric transformations. In IEEE
International Conference on Image Processing 2000,
Vancouver, Canada , 2000.
[LMBO95]
Steve Low, Nicholas Maxemchuk, Jack Brassil, and Larry
O'Gorman. Document marking and identification us-
ing both line and word shifting. In Proceedings of the
1995 Conference on Infocom '95 , April 1995.
[LMSP98]
John Lach, WIlliam H. Mangione-Smith, and Mio-
drag Potkonjak. Fingerprinting digital circuits on pro-
grammable hardware. In InformationHidingWorkshop,
Lecture Notes of Computer Science (1525) ,NewYork,
Heidelberg, 1998. Springer-Verlag.
[Lub02]
Michael Luby. Lt codes.
In FOCS , pages 271-. IEEE
Computer Society, 2002.
[Lyu05]
S. Lyu. Natural Image Statistics for Digital Image Foren-
sics . PhD thesis, Department of Computer Science,
Dartmouth College, Hanover, NH, 2005.
[Mae98]
Maurise Maes. Twin peaks: The histogram attack to
fixed depth image watermarks. In Information Hid-
ing Workshop, Lecture Notes of Computer Science (1525) ,
New York, Heidelberg, 1998. Springer-Verlag.
[Mah95]
Kevin Maher. Texto. circulating on the web, February
1995. http://www.ecn.org/crypto/soft/texto.zip ,
accessed 2005-03-22.
Search WWH ::




Custom Search