David Soukal

According to our database1, David Soukal authored at least 15 papers between 2003 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Intention and Origination: An Inside Look at Large-Scale Bot Queries.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2010
Large-scale bot detection for search engines.
Proceedings of the 19th International Conference on World Wide Web, 2010

2006
Matrix embedding for large payloads.
IEEE Trans. Inf. Forensics Secur., 2006

Wet paper codes with improved embedding efficiency.
IEEE Trans. Inf. Forensics Secur., 2006

On Steganographic Embedding Efficiency.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Writing on wet paper.
IEEE Trans. Signal Process., 2005

Perturbed quantization steganography.
Multim. Syst., 2005

Stochastic approach to secret message length estimation in ±k embedding steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Forensic steganalysis: determining the stego key in spatial domain steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Efficient Wet Paper Codes.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2004
Searching for the stego-key.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Perturbed quantization steganography with wet paper codes.
Proceedings of the 6th workshop on Multimedia & Security, 2004

2003
Quantitative steganalysis of digital images: estimating the secret message length.
Multim. Syst., 2003

Higher-order statistical steganalysis of palette images.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003


  Loading...