Cryptography Reference
In-Depth Information
[Leh82]
D.J. Lehmann. On primality tests.
SIAM Journal on
Computing
, 11(2), May 1982.
((page numbers are
wrong)).
[LF05]
S. Lyu and H. Farid. How realistic is photorealistic?
IEEE
Transactions on Signal Processing
, 53(2):845-850, 2005.
[Lia95]
Wilson MacGyver Liaw. Reading gif files.
Dr. Dobbs
Journal
, Feb 1995.
[LJ83]
Shu Lin and Daniel J. Costello Jr.
Error Control Cod-
ing: Fundaments and Applications
. Prentice Hall, En-
glewood Cliffs, NJ, 1983.
[LJ00]
Vinicius Licks and R. Jordan. On digital image water-
marking robust to geometric transformations. In
IEEE
International Conference on Image Processing 2000,
Vancouver, Canada
, 2000.
[LMBO95]
Steve Low, Nicholas Maxemchuk, Jack Brassil, and Larry
O'Gorman. Document marking and identification us-
ing both line and word shifting. In
Proceedings of the
1995 Conference on Infocom '95
, April 1995.
[LMSP98]
John Lach, WIlliam H. Mangione-Smith, and Mio-
drag Potkonjak. Fingerprinting digital circuits on pro-
grammable hardware. In
InformationHidingWorkshop,
Lecture Notes of Computer Science (1525)
,NewYork,
Heidelberg, 1998. Springer-Verlag.
[Lub02]
Michael Luby. Lt codes.
In
FOCS
, pages 271-. IEEE
Computer Society, 2002.
[Lyu05]
S. Lyu.
Natural Image Statistics for Digital Image Foren-
sics
. PhD thesis, Department of Computer Science,
Dartmouth College, Hanover, NH, 2005.
[Mae98]
Maurise Maes. Twin peaks: The histogram attack to
fixed depth image watermarks. In
Information Hid-
ing Workshop, Lecture Notes of Computer Science (1525)
,
New York, Heidelberg, 1998. Springer-Verlag.
[Mah95]
Kevin Maher. Texto. circulating on the web, February
1995.
http://www.ecn.org/crypto/soft/texto.zip
,
accessed 2005-03-22.