Open Access
Issue
SHS Web Conf.
Volume 33, 2017
International Conference on Communication and Media: An International Communication Association Regional Conference (i-COME’16)
Article Number 00036
Number of page(s) 6
DOI https://doi.org/10.1051/shsconf/20173300036
Published online 02 February 2017
  1. J. M. Ahmed Z. M. Ali., IJCSNS 11, 4 (2011) [Google Scholar]
  2. R. Chandramouli, N. D. Memon, Proceeding SPIE Security and Watermarking of Multimedia Contents 5020,173–177 (2003) [CrossRef] [Google Scholar]
  3. C. Y. Chang, S. Clark, The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, 591–599 (2010) [Google Scholar]
  4. H. A. Aboalsamh, H. Mathkour, M. Mursi, G. M. Assassa, Proceedings of the 12th WSEAS International Conference on Computers, 1011–1018 (2008) [Google Scholar]
  5. R. Chandramouli, N. D. Memon, SPIE Security and Watermarking of Multimedia Contents 5020,173–177 (2003) [CrossRef] [Google Scholar]
  6. M. Chapman, G. I. Davida, M. Rennhard, Proceedings of the Information Security Conference (ISC ‘01), Malaga, Spain, 156–165. (2001). [CrossRef] [Google Scholar]
  7. M. Chapman, G. I. Davida, M. Rennhard, Proceedings of the Information Security Conference (ISC ‘01), Malaga, Spain, 156–165 (2001) [CrossRef] [Google Scholar]
  8. D. Huang, H. Yan, IEEE Trans. Circuits and Systems for Video Technology, 11, 1237–1245 (2001) [CrossRef] [Google Scholar]
  9. H. Yang, A. C. Kot, IEEE International Conference on Multimedia and Expo, Taipei, Taiwan, 2, 955–958 (2004) [Google Scholar]
  10. M. Liu, Y. Guo, L. Zhou, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 807–811 (2009) [Google Scholar]
  11. M. V. Nasab, B. M. Shafiei, Aust. j. basic appl. sci, 5, 12 (2011) [Google Scholar]
  12. K. Rabah, Information Technology Journal, 3, 3 (2004) [Google Scholar]
  13. X. Sun, G. Luo, H. Huang, Proceedings of the 3rd ACM International Conference on Information Security, Shanghai, China, 85, 76–81 (2004) [Google Scholar]
  14. M. H. S. Shahreza, M. H. Shahreza, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 1524–1526 (2008) [CrossRef] [Google Scholar]
  15. R. Stutsman, M.J. Atallah, C. Grothoff, K. Grothoff, Proceeding of the 21st Annual ACM Symposium on Applied computing (SAC 2006), Dijon, France, 338–345 (2006) [CrossRef] [Google Scholar]
  16. S. Bhattacharya, P. Indu Duta, S. A. Biswas, G. Sanyal, Journal of Global Research in Computer Science, 2, 3 (2011) [Google Scholar]
  17. S. Dulera, D. Jinwala, A. Dasgupta, IJNSA, 3, 6 (2011) [CrossRef] [Google Scholar]
  18. M. Agarwal, Computer Networks and Communications (NetCom). Springer, New York, 477–488 (2013) [CrossRef] [Google Scholar]
  19. L. Y. Por, D. Beh, T. F. Ang, S. Y. Ong, IAJIT 10, 1 (2013) [Google Scholar]
  20. C. F. Lee, and H. L. Chen, Springer Berlin Heidelberg, 155–179 (2013) [Google Scholar]
  21. P. Akhilandeswari, J. G. George, Proceedings of International Conference on Internet Computing and Information Communications, Springer, India, 1–7 (2014) [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.